Feeds

Using virtual particles to get real random numbers

Bouncing photons off ‘empty space’

Build a business case: developing custom apps

number generator, by bouncing photons off empty space.

As regular readers know, empty space isn’t actually empty – it’s home to “quantum fluctuations”, one of the stranger manifestations of quantum theory, in which particles and anti-particles spontaneously come into existence and annihilate so as to preserve the uncertainty principle. And if that’s not strange enough for you, why not learn how to turn virtual photons into real ones?

The new trick, demonstrated by a group led by Benjamin Sussman of Canada’s National Research Council in collaboration with researchers at the NRC and Oxford University, exploits vacuum fluctuations to create random numbers.

A big problem with “random” numbers generated by computers is that while “true” randomness is really useful for cryptography, it’s also very hard to achieve. Even very good computer algorithms are deterministic in some way. Quantum systems, on the other hand, are non-deterministic – or, to be more accurate, individual measurements might not be. As the researchers’ paper states:

“While the evolution of a quantum function is deterministic, the outcome of a particular measurement on a state is not”. If the right observable characteristic of a quantum system is chosen, the paper argues, a “non-deterministic” – and therefore truly random – number can be achieved.

This is already known and used in quantum random number generators, with the paper citing techniques such as vacuum shot noise (measuring the quantum noise in a signal), radioactive decay, laser noise, photon statistics, or fluorescence from entangled ions. However, many of these are too slow to keep up with the requirements of data networks.

Sussman’s technique is essentially to bounce light pulses off the “virtual particles” of quantum fluctuations, which randomizes the signature of the received light, and, because of the characteristics of the system he’s using, happens very quickly (Sussman claims Gbps key generation is possible, although his experiment is limited by the instruments available to 1 kHz).

Here’s how it works: a light pulse (“pump” pulse) is shone into a 3mm diamond plate, which generates a Stokes field with random phase. The original pulse is filtered out, leaving only the Stokes field, which is then combined with a reference pulse.

It’s what happens inside the diamond, however, that’s interesting: the interaction of the pump beam with the vacuum fluctuations changes the phase of the incoming photons in picoseconds, the paper claims, and since phase can be very precisely measured, Sussman says it’s possible to generate multiple bits per measurement. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Famous 'Dish' radio telescope to be emptied in budget crisis: CSIRO
Radio astronomy suffering to protect Square Kilometre Array
Asteroid's SHOCK DINO MURDER SPREE just bad luck - boffins
Sauricide WASN'T inevitable, reckon scientists
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Jurassic squawk: Dinos were Earth's early FEATHERED friends
Boffins research: Ancient dinos may all have had 'potential' fluff
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.