Feeds

Using virtual particles to get real random numbers

Bouncing photons off ‘empty space’

Business security measures using SSL

number generator, by bouncing photons off empty space.

As regular readers know, empty space isn’t actually empty – it’s home to “quantum fluctuations”, one of the stranger manifestations of quantum theory, in which particles and anti-particles spontaneously come into existence and annihilate so as to preserve the uncertainty principle. And if that’s not strange enough for you, why not learn how to turn virtual photons into real ones?

The new trick, demonstrated by a group led by Benjamin Sussman of Canada’s National Research Council in collaboration with researchers at the NRC and Oxford University, exploits vacuum fluctuations to create random numbers.

A big problem with “random” numbers generated by computers is that while “true” randomness is really useful for cryptography, it’s also very hard to achieve. Even very good computer algorithms are deterministic in some way. Quantum systems, on the other hand, are non-deterministic – or, to be more accurate, individual measurements might not be. As the researchers’ paper states:

“While the evolution of a quantum function is deterministic, the outcome of a particular measurement on a state is not”. If the right observable characteristic of a quantum system is chosen, the paper argues, a “non-deterministic” – and therefore truly random – number can be achieved.

This is already known and used in quantum random number generators, with the paper citing techniques such as vacuum shot noise (measuring the quantum noise in a signal), radioactive decay, laser noise, photon statistics, or fluorescence from entangled ions. However, many of these are too slow to keep up with the requirements of data networks.

Sussman’s technique is essentially to bounce light pulses off the “virtual particles” of quantum fluctuations, which randomizes the signature of the received light, and, because of the characteristics of the system he’s using, happens very quickly (Sussman claims Gbps key generation is possible, although his experiment is limited by the instruments available to 1 kHz).

Here’s how it works: a light pulse (“pump” pulse) is shone into a 3mm diamond plate, which generates a Stokes field with random phase. The original pulse is filtered out, leaving only the Stokes field, which is then combined with a reference pulse.

It’s what happens inside the diamond, however, that’s interesting: the interaction of the pump beam with the vacuum fluctuations changes the phase of the incoming photons in picoseconds, the paper claims, and since phase can be very precisely measured, Sussman says it’s possible to generate multiple bits per measurement. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Bacon-related medical breakthrough wins Ig Nobel prize
Is there ANYTHING cured pork can't do?
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.