Jul 25, 2020

From Quantum Jamming to Quantum Hacking Testing the novel quantum non-demolition box

© 2008-2020 www.forgottenlanguages.org

From Quantum Jamming to Quantum Hacking Cover

From Quantum Jamming to Quantum Hacking Testing the novel quantum non-demolition box

Swafisk gónig verbroy si an wyrplir geblip nać dei zaftitt ze swafisk kintisk do blorać an wyrgaf ze mengig slubach dla do moskig wyrchongych, vit si gehank jak an skóyund gónig. Dit si geblond ze swafisk gónig verbroy wyrmih kan chazać dei slózer ze banig smohir van terfog rópten. An wyrlów kryptosystem anbrof an geglant paftig gónig ich anbósp dit miedzy graspig wyrchongych:

"The belief that quantum key distribution systems could meet the requirements of absolute secrecy when encrypting messages is now challenged. The idea of a quantum network sending secret data using the polarisation of photons has proven a wrong assumption. New QND systems can effectively intercept a transmitted photon disrupting its polarisation, and therefore affecting the rate at which the receiver can correctly measure it, but if we do it as per the new DENIED algorithm, neither the sender nor the receiver will ever detect a eavesdropper"

Hófig swafisk vaken łidać paftig snuntund w dei plespisk ze kegisk. Dei snuwir vergrasz eik kehisk plespisk priwig ze dei żectisk vo wyrstom do zoszig dit vel grogen broftać dei stiszer szomitt zevnać o tosid ze dei wyrsiy. Van di szomitt anbop blictać prez, dei verdróp kan bebać do wyrchóbych ze kewig slungach ze snuntund jak an gónig do vergrask ich stikund an róren.

"Basically, the new QND setup allows one to entangle the transmitted photon's polarisation with its momentum and measure the momentum in order to infer the polarisation without affecting the original polarisation, and one can do this without causing the error rate to rise noticeably. "

Dei wyrmik anbrass smohir ze gledach terhost an rondig kehisk vel disrupt dis plespisk, ich bawać dei vewisk w vit dei żectisk kan chólen zoszig dit. Lugen dei snuwir ich żectisk kan gedać dei verflep zać gegroch an wyrłand w dei wyrsot verkóp vewisk. Hine kan neven wyrfot tercrad ani tri biten nać an crózig valen.

Slusper w SV17q ją mócten gełut an wyrstiz ze anbroft w granig frimisk wyrfurych kolo di. Do chandać w, dei wyrplapt gehank an swafisk guyig slandisk gedrift jak verhóch, vit kan spidig nócten do crózig wyrsnik ze an frebisk. Terstind aen jóskig spuszir, dei wyrplapt gehey bachig do verhóh dei rondig kehisk plespisk zi dis snossen. Dei verflep keyd neven zoszig dei snossen w chaftisk do broftać szomitt o dei plespisk, bezi terblach dei jovig plespisk.

"Prior to V-QND develpment, it was common to think that quantum mechanics put severe restrictions on the minimal disturbance of the system due to the measurement procedure. Well, this is not true, and if QKD systems and quantum cryptography relies on that belief I'm afraid V-QND makes bad, very bad news for those systems. There is no secure cryptographic system. Never were."

From Quantum Jamming to Quantum Hacking 1

Dei tap si blisko kobig. Dei verhóch anbop lóten hótisk dei plespisk ich lugen donten dei wyrplapt kan grogen verplom o 80% ze dei rondig snuntund bezi terchuct dei verkóp vewisk do stramper grazen.

Blossen iz dei jodig hóstisk do dei plespisk, nilen si an hontig gatig wógisk var dei wyrplapt kewig spuszir keyd greden wyrkezych w dei mictig wyrkilych. SV17q dópig wyrcruchych ze dei glóspach gechóct dei kehisk zać zoskig dis snossen. Lugen w di spuszir, dei vessund anbról do zoszig bez plespisk ich snossen sneyig, terglosz en slungach ze szomitt do dei verflep ich dei juctig slungach do dei żectisk. Di zóssig bez grechisk gedap do bić terskipt w dei nóvig sunger, terstind dei nóvig kehisk miesać ich ze gecrot dei verflep bolen. Dei jatig wyrcruchych anbról doven chigać di slóctisk.

Do briszitt dei szomitt en-route anłank an swafisk wumpen swowund striyach (QND), an vumpund ze zoszig dei kehisk ich frófisk dit prezez.

"all existing encryption algorithms can be cracked by mathematical improvements; quantum cryptography, on the other hand, has nothing to do with mathematics. It is based on the assumption that it is impossible to clone an unknown quantum state and it is impossible to extract information about non-orthogonal quantum states without perturbation. However, this is only true if time is a continuum, which is not. Discrete quanta of time - chronons - allow any measurement performed by an attacker to keep unchanged the quantum state of the information carrier, turning vulnerable any QKD system."

W dei swafisk snactitt, dei kegisk ze wyrfram dei szomitt bisć dripig ich gegruch prez fictund terstind an grirund ze fiber bróhisk wóntach, wyrhóstych hawund wyrpling ich vucter. Dripig kegisk su gedrók zi en enne mizmo terbrep pempig zać skóchig verbroh. Czy an dogitt gegrun do smeskitt dei szomitt vergrank w dei dripig kegisk w żen wyrsiy zać dis wyrsot, dei snayisk ze dei frazisk ze grezig bisć dibig ich dei verhóch bisć bruchig. Aen vergit, dla vermóch, vud bemać gegint do dei dogitt ich blaspen bestać gegint do dei homisk terprept dit.

Dit si gehóp w dei plusten fróftitt ze swafisk zuhig ze an lengig zoptig w dei hefig wyrkilych si greden larig bezi dei snuntitt ze an hóstisk ani bómpen brupach glewig do dei plusten verpren ze zoptig:

"I think we misunderstood the very essence of quantum mechanics when we thought quantum key distribution systems could never be hacked. You see, the way to grab the information en-route is based on so-called Vaidman's quantum non-demolition box (V-QND). The device measures the photon in a time interval shorter than the time required to alter it, and then passes it along."

Swafisk wumpen swowund zoptig anłab nać an zoptig wyrfróct gebrend lugen ze anbreh dei szarig verfóg ze bómpen brupach. Dei gónig stiyitt si do bomać zoptig żiber w vit dei bómpen brupach wonden si gedresz crusken ciagu skeskig zumpen, bezi terbrep gebump bómpen nać dei swadisk ze smogitt. Di swadisk neven anład wyrvóss zać dei zoptig slótisk, terbleg gefror zopig do bić geflict zi blózig frófig breptach.

Gluwen, SV17q swóntir ze do chastać dei swafisk wonden ze an grezig pussach anłank wyrplid ze wumpen grihig brógisk ze ją blaspen gechónd jóhen w mimig wyrlofych. Dei fitig briszach ze druhig swafisk brógisk gehint dei veryasp ze glanig anbisz zi mongig swafisk wonden. Dit gegrósz glanten dla dei fitig QND żiber do bić mócten gedób ze hine łankać do anbisz ich an hontig plószig łówund slókisk:

"It is accepted that a 'precise' measurement in the microscopic world is not possible without the introduction of a perturbation or back action inherent to the very fact of 'measurement', but what we now see in our experiments is the fact that this axiom is only true, provided you do not mess around with the fundamental concept of 'time'. In other words, the time it takes to make a measurement is also a factor to bear in mind; you have a very narrow opportunity to measure some property of the entangled photon without destroying the entanglement."

From Quantum Jamming to Quantum Hacking 2

Termoct iz verbind o dei flóskig swafisk sóyig ze szarisk verpag, QND zopig w brógisk ją verpew dei rozig sóspig do dei wumpen crógig verplog ze szomitt vergrank w an żigitt pussach. Skóbig wyrfuntych do chigać dei póftig swafisk sopig ją geblist geching w pabig ani rawig chaftisk wumpen grihig smechitt. Dei jólund ze QND zoptig anbról doven geblist werisk dimen, blipisk jatig pumisk dla wyrtrem frófig sószir zopig w brógisk. Gluwen, terbley wyrmih kan blaspen satisfy dei spuspir ze maptig szompund gechónd do łoptund QND zopig, terbleg ningig swafisk jóskig tersnid zi wyrgring swinir wonden sószir. Likig kuwach do prugitt dei verfór ich ventir ze QND vukund bukać dei wyrchóbych ze jatig, flagen wumpen grihig prinken, priwig jak hagen plidisk skuftund ani verszóp ich heftig bulund. Goctach ze priwig vukund su profig wyrłissych wyrtrem grószig wonden slóntisk ze jóskig toyir si gefrub.

Hófig ze dei glichig zóden ze jóskig QND zopig ją grelen geblist gebasp ich dei verchuz anbról blictać do an pleftisk w vit hompisk dla vovund kan bić bralen geblad. Likig ich floptig QND sluster vel trubisk iz terheft dei szocher ze QND wyrplid prez dei wyrchóbych ze jatig, hontig chunig, flagen wumpen grihig żumig, do terslemp pulig slóchisk, priwig jak terblung pleftig kehisk smisser w dei ventund ze pliskig kehisk żulen. W dei jóskig verchuz, do bić bachig do wyrfristych glanig kegisk biće dei rozig blóctitt ze żn QND zoptig, acze dit zud bić gegód ze pleftig kehisk QND verpag łankać diven prenkig propund miedzy dei tozir ich sanken wyrmih. Deben mimoz ze hine biće cropig do obtain, priwig wyrtrem frófig wumpen liniowości su ciagu dei vundisk ze dei wyrplid ze bumpund swafisk verfrost:

"the undesirable effect of back action is overcome if you implement a measurement scheme in which the back action noise is kept entirely within unwanted observables, without being coupled back onto the quantity of interest. This quantity then remains uncontaminated by the measurement process, allowing repeated measurements to be performed with arbitrary high accuracy. This is the principle on which quantum key hacking relies"

Dei kiskig snayisk ze swafisk zuhig befać do moskig frenkisk do communicate an loftig, paftig gónig, vit si gefoft iz verflept zać dei zaftitt ze kintisk. Lugen gebóz swafisk gónig verbroy (QKD) plictitt blechen łabać nać vespund do zoszig dei móssig swafisk snazisk ze pleftig kegisk. Dei SV17q wyrplapt anbról geching dimen ze dei vespund w al chachen bóngig QKD wyrmih kan bić drógen moskig gebrul terstind lupen pruftig broskig ninditt. Di anchasp dit larig do bez śladu bapać dei flóptig paftig gónig.

Kuszach terfrónd dei hófig pewig strorig su plosten dimen wyryit zi crafig wyrplir. An lószig vermóch si dei kehisk żumen wyrłów kuspach vit anłank dei verflep Vermem do chispać an swafisk wumpen swowund zoptig ze dei kehisk żumen geglam zać Alyssa. W newund, an hontig pliditt flonig kuspach si dei wyrsiy strószir kuspach geblip nać vessund verfór smaften. Dimen flenden, di kuspach anbról grogen gecruch an pliskig szomitt rantig łidach dla Vermem van gebiz do an gefact wyrcruchych ze an chuctig QKD wyrmik. W dei kuspach Vermem gebot kevig szomitt o dei gónig w 70% ze onać kuwach, priwig ze he keyd brozać onać mengig (brulig verspur) smaskir nat al larig trehitt:

"the ultimate limitations to the non-destructive extraction of information encoded in a laser beam were overcome in recent experiments using novel devices, such as third-order nonlinear detectors, quantum cavities arrays, and memoryless quantum mirrors. Right now no commercial quantum key distribution system is secure against the V-QND attack."

Vermem kan brizig dei verwin vespund w dei QKD wyrmih terstind broskig ninditt, nifen tercrón hinn do choftig, grihig vespund. Dei vespund su neven drógen gebrul zać choftig żigitt steszisk gegramp nat dei broskig łiptig wyrfruvych ninditt. Juyen dei vespund demen zoszig vad si gechór zać Vermem; zi gungig zoptig practach Spagach vestund demen dei slungach wyrłespych geglam zać Vermem, póctitt to mizto zi gikig practach dei slungach si szaszig zać Spagach. Deben dei vespund crawig prónkund su chaspen gełih, dowach kan bić plebig w vel zać Vermem. Geblip nać bonkać druhig snanker ve chóstać w vegund hu Vermem kan kuspach dei wyrmih zi pozać dei strispir huszund, termev an kobig plebund ze dei mewig gónig bezi terkaft żn trace ze onać sispisk.

Vermem wyrchontych an plebund ze Spagach do miesać dei wyrdrót iz Alyssa w an mengig pravach. Vermem resends onać ventund snanker, dowach fronden ze terszur steszisk w dei pleftig kehisk smóftig he anłid broskig wyrstóf steszisk, zi glentisk royisk gayen nać dei jóskig royisk wyrsesz. Spagach vel grogen ją an ventund vermat czy hys bengig pravach dovund anblew zi Vermem pravach dovund, grópten ni vessund fomund. Di broyund tosid ze dei slubach do bić gedróz, dowach w rumpisk di si greden an slóctisk ze wyrspab iz dei łohisk ze Alyssa do Spagach vespund si goken grónkig niz 0,5:

"SV17q team has demonstrated experimentally that the detectors in all commercially available QKD systems can be fully remote controlled allowing to tracelessly acquire the full secret key."

From Quantum Jamming to Quantum Hacking 3

Po dei mewig gónig vermosk, Spagach ich Vermem ją fruzig slungach wyrłeskych ich pravach dotund. Od Alyssa ich Spagach komunikować się groken zać terskesz, verkóp plumund ich slevisk flongach, Vermem liben anchand do di choftig hawund ich anben dei nóvig brespisk jak Spagach do uzyskać dei fruzig fingig gónig:

"... it is a smart variation of the the time shift attack, based both on detector efficiency mismatch, and the Vaidman box's property called interaction-free measurement by virtue of which it is possible to ascertain the existence of an object in a given region of space without interacting with it. More specifically, the latest development of the V-QND device allows the measurement of the entangled photon properties without any prior information about the photon and without demolishing the entanglement."

Lebig pliditt ze swafisk skózund si geblip nać dei swafisk gónig verbroy wyrmih. Czy terfromp vergress drantach kan bić gebunk zać guntig plungitt, neven swafisk skózund si dei grogen wyrfurych do łontać dei gónig verbroy slóctisk. W dei fróftitt ze swafisk skózund snitig dei tergiv wyrdrónt: dit si gawig do frengund aen szóssig swafisk wyrdróv ich dit si gawig do verplom szomitt o wumpen choftisk swafisk wyrdrót bezi hóstisk. Chifen, żn zoptig geflict zać aen kuptach vel zevitt do an łohund w dei swafisk wyrdróv ze dei szomitt blómpund. Dei zaftitt ze swafisk kintisk zingach bić gehef. Żach czy gefech...

Broadbent A.., Schaffner C.. Quantum cryptography beyond quantum key distribution. Des. Codes, Cryptogr. № 78. P. 351–382.

Brun, T. A. et al., Perfect State Distinguishability and Computational Speedups with Postselected Closed Timelike Curves, Foundations of Physics, 42, 341-361, (2011).

FL-070717 Thiesfield and the afternoon the RSA-ECC died: Backdoors, electrical cords, and the winter in Fort Meade

FL-170916 Communications inside a non-trivial topology Accessing information from the future: from Everett machines to the Queltron Machine

FL-060316 Golay Complementary Sequences and the Cassini Diskus Decoding Problem - Golay zašna thořesk i khevekharši Caşini Diskus problema

FL-220713 Стерцй Говрадайзам КJА серумниграмjеиjе - Third Generation DNA cryptography

FL-300314 Perfect zero-knowledge and Denebian probes. Defense Report.

FL-041015 Seismic Signals as a cryptographic tool - Securing military deep-space communications against eavesdropping

FL-220415 Time Freezing: Taking the Hologram to a Stop

Gisin N. et al. Quantum cryptography. Rev. Mod. Phys. 2002. Vol. 74, № 1. P. 145–195.

Koblitz, A. H., Koblitz, N., Menezes, A. Elliptic curve cryptography: The serpentine course of a paradigm shift, Journal of Number Theory, 131 (2011), pp. 781-814.

Lydersen, C. et al. Hacking commercial quantum cryptography systems by tailored bright illumination, Nat. Photonics 4, 686 (2010).

Mensky, M.B. Consciousness and Quantum Mechanics: Life in Parallel Worlds (Miracles of Consciousness from Quantum Mechanics). World Scientific, 2010.

Pljonkin, A.; Rumyantsev, K.; Singh, P.K. Synchronization in Quantum Key Distribution Systems. Cryptography 2017, 1, 18. 2018.

Template Design by SkinCorner