Feeds

Using virtual particles to get real random numbers

Bouncing photons off ‘empty space’

High performance access to file storage

number generator, by bouncing photons off empty space.

As regular readers know, empty space isn’t actually empty – it’s home to “quantum fluctuations”, one of the stranger manifestations of quantum theory, in which particles and anti-particles spontaneously come into existence and annihilate so as to preserve the uncertainty principle. And if that’s not strange enough for you, why not learn how to turn virtual photons into real ones?

The new trick, demonstrated by a group led by Benjamin Sussman of Canada’s National Research Council in collaboration with researchers at the NRC and Oxford University, exploits vacuum fluctuations to create random numbers.

A big problem with “random” numbers generated by computers is that while “true” randomness is really useful for cryptography, it’s also very hard to achieve. Even very good computer algorithms are deterministic in some way. Quantum systems, on the other hand, are non-deterministic – or, to be more accurate, individual measurements might not be. As the researchers’ paper states:

“While the evolution of a quantum function is deterministic, the outcome of a particular measurement on a state is not”. If the right observable characteristic of a quantum system is chosen, the paper argues, a “non-deterministic” – and therefore truly random – number can be achieved.

This is already known and used in quantum random number generators, with the paper citing techniques such as vacuum shot noise (measuring the quantum noise in a signal), radioactive decay, laser noise, photon statistics, or fluorescence from entangled ions. However, many of these are too slow to keep up with the requirements of data networks.

Sussman’s technique is essentially to bounce light pulses off the “virtual particles” of quantum fluctuations, which randomizes the signature of the received light, and, because of the characteristics of the system he’s using, happens very quickly (Sussman claims Gbps key generation is possible, although his experiment is limited by the instruments available to 1 kHz).

Here’s how it works: a light pulse (“pump” pulse) is shone into a 3mm diamond plate, which generates a Stokes field with random phase. The original pulse is filtered out, leaving only the Stokes field, which is then combined with a reference pulse.

It’s what happens inside the diamond, however, that’s interesting: the interaction of the pump beam with the vacuum fluctuations changes the phase of the incoming photons in picoseconds, the paper claims, and since phase can be very precisely measured, Sussman says it’s possible to generate multiple bits per measurement. ®

High performance access to file storage

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.