Information security, in online banking for example, often works with a combination of a public key and a private key. The public key is known to everyone, but for creating a digital signature, a private key is necessary. This is a cryptographic method that only works if private keys are kept secret. But are we certain that these keys can’t be intercepted, by negligence or by a computer hack? The alternative the researchers present in their paper, is a physical key that cannot be cloned, a PUK (Physical Unclonable Key). This can be a stroke of white paint that strongly scatters light because it consists of many nanoparticles. The result is a unique speckle pattern. Making a key with exactly the same scattering properties is impossible: no paint surface will be the same. The PUK’s properties can be publicly available, but only the owner of the key is capable of scattering the light in the right way.

Quantum

Using a complex spatial pattern, the sender transmits light pulses to the receiver’s key. These pulses consist of a small number of photons which are in a quantum state. By the laws of quantum physics, this quantum state will be disturbed as soon as it is measured. This means that, without having the PUK, no one will be capable of determining the quantum states of the photons. The key, however, will effortlessly translate the photonic signal into comprehensible information. Anyone can send light to the PUK, but only the PUK owner will be able to decrypt the light pattern to information that makes sense. In this way, a secret message can be sent without the need for storing secret keys. The receiver, in turn, can also indicate that he knows the information stored in the light pulses, and authenticate himself. So, using standard cryptography, signing a message is possible as well. The PUK is different from other hardware keys on the market, like the Yubikey or readers used by banks, which still use secret digital keys. The use of quantum physics makes it possible to develop cryptographic tricks that are unthinkable classically. The protocol is the latest in this development. Although the first quantum cryptographic tool date from the early eighties, this research shows that still essentially new applications are possible using quantum optics.

Glass fiber

Although the programming of light and the scattering is complicated, there is no need for exotic technology: the PUK is cheap, and creating the light patterns can be done using a light modulator that is part of a regular beamer. The technique now works over one meter of free space. An important future application the researchers now work on, is the secure transmission of data over a glass fiber. The research has been done at UT’s MESA+ Institute and Faculty of Science & Technology, together with colleagues of the Faculties of Computer Science and Electrical Engineering of Eindhoven University of Technology. Reference: “Asymmetric cryptography with physical unclonable keys” by Ravitej Uppu, Tom A W Wolterink, Sebastianus A Goorden, Bin Chen, Boris Škorić, Allard P Mosk and Pepijn W H Pinkse, 15 October 2019, Quantum Science and Technology.DOI: 10.1088/2058-9565/ab479f