
Researchers expect quantum computers to eventually break widely used digital security codes, so new post-quantum codes and quantum communication methods have been developed. Quantum communication techniques rely on quantum mechanics, which is a theory that could be replaced by a more fundamental framework. Some quantum cryptographers aim to reduce assumptions by grounding protocols in more basic principles rather than starting from quantum mechanics. One approach focuses on causality, treating it as a deeper constraint that could remain valid even if quantum mechanics changes. This motivates exploring whether quantum key distribution and related security guarantees would still hold under a hypothetical post-quantum theory.
"For the past few decades, researchers have understood that quantum computers should eventually be able to crack the widely used codes that secure much of the digital world. To protect against this fate, they've spent years developing new codes that appear to be safe from future safecrackers armed with quantum computers. At the same time, they've also devised ingenious ways to use the rules of quantum mechanics to keep communications secure."
"But quantum mechanics, just like the "classical" mechanics that preceded it, is just a theory of nature. What if it eventually gets superseded by a fuller theory, just as quantum mechanics supplanted Newtonian physics a century ago? Will these quantum communication techniques still be secure in a world where there's an even more fundamental set of rules?"
""In terms of these cryptographic protocols, it's good to be paranoid," said Ravishankar Ramanathan, a quantum information theorist at the University of Hong Kong who works on quantum cryptography. "Let's try to minimize the assumptions behind the protocol. Let's suppose that at some future date people realize that quantum mechanics is not the ultimate theory of nature.""
"To guard against the possibility that their protocols are based on faulty assumptions, some quantum cryptographers search for even more basic principles to build upon. Instead of starting from quantum mechanics, they dig deeper, down to the very concept of causality. A Subtle Sabotage One way to understand developments in this area is to consider quantum key distribution, which involves taking advantage of the rules of quantum mechanics to pass along a key-something that can be used to decode a secret message-in"
#quantum-cryptography #post-quantum-security #quantum-key-distribution #causality #quantum-computing
Read at WIRED
Unable to calculate read time
Collection
[
|
...
]