this post was submitted on 22 Dec 2024
178 points (92.8% liked)
Technology
60082 readers
3203 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It's physically impossible to intercept an entangled photon without disrupting the entanglement. The act of observing the photon collapses the quantum uncertainty of it's state, so even the most sophisticated MitM attempt is going to immediately break the link.
But can you detect the link being broken by someone other than your intended communication partner?
If A sends a particle to B, couldn't M intercept A's particle and send a different particle to B? Kind of like intercepting Diffie Hellman. A and B will both share some information with M, but not with each other.
M cannot replicate the particle after they read it, so A and B will detect M's attempt when they compare results.
The same as classical one-way encryption, it only works through authenticated channel tho. It's not magic, you have to have some kind of pre-existing secret or rely on third-party authentication
Yes, because breaking the entanglement destroys the link between the photons received at either end.
Observing an entangled photon requires extremely precise timing, the lightspeed lag on the line has to be known down to the nanosecond to ensure that the photon received is paired with the photon at the other end. Even if a MitM wanted to try retransmitting the quantum states it observes on the line, they wouldn't be able to do so without introducing enough lag to desync the connection.
Alternatively, if M tried sending their own random data in sync with the expected timing, then the bits received by B would only have a 50-50 chance of matching the bits sent from A. Any encryption based on that data would almost immediately begin to suffer a 100% error rate.