Secret Key Distillation over Realistic Satellite-to-Satellite Free-Space Channel Defense Strategy: Exclusion Zone Analysis

Case ID:
UA21-164
Invention:

Quantum Key Distribution (QKD) is a system made possible by the advances in quantum computing and entanglement-assisted communication. QKD is currently in use for some companies trying to encrypt and secure their information in a way that makes it practically impossible to “crack” the encryption. The question then becomes: what is the limit for this technology?

For companies currently trying to encrypt information sent between satellites, for example, are there limiting principles that can guide the allocation of resources for information encryption? This technology shows the efficacy of reasonably restricting the eavesdropper’s ability to collect information in an “exclusion zone” around the satellite receiving the information. This information allows companies encrypting information to optimize their resources and realistically understand the threats to their information in a QKD paradigm.

Background:
Traditionally, the theoretical problem of QKD information security is visualized with three parties: Alice, Bob, and Eve. In this scenario, Alice is trying to send a message to Bob securely. In order to send that message, both parties need to share a “key” in order to scramble and unscramble the message. In the middle is a third-party, an eavesdropper “Eve” who is trying to intercept the message. And, while there are a few different ways Eve tries to unscramble the intercepted message (i.e. random guessing particle orientations, impersonating both parties as a middle-man etc.) Eve is typically assumed omnipotent. In other words, Eve has unlimited resources and is using all time, energy, and means to intercept and correctly decode the message. This assumption is unrealistic, at least for the near future. Because this assumption is unrealistic, theoretical models to date are not showing the efficacy of certain techniques to practically limit “Eve” in the scenario. This is particularly true as QKD is starting to gain momentum as a vast improvement to information security, and countries and companies are trying to understand the limitations with using the technology and what practical considerations should be considered to efficiently model the QKD problem between Alice, Bob, and Eve.

Applications:

  • Information encryption


Advantages:

  • Realistic
  • Facilitates efficient allocation of resources
Patent Information:
Contact For More Information:
Scott Zentack
Licensing Manager, College of Engr
The University of Arizona
zentack@arizona.edu
Lead Inventor(s):
Ziwen Pan
Ivan Djordjevic
Keywords: