DEV Community

Sui Gn
Sui Gn

Posted on

Beyond the Wire: Encrypting Messages Where the Message Never Exists

¡Esa es una idea fantástica para un artículo! El concepto de que el mensaje es la diferencia entre estados y solo se "materializa" al final es una forma muy poderosa de explicar la criptografía avanzada.

Aquí tienes un borrador de un blog post en inglés listo para publicar en Dev.to, basado en tu concepto y los principios de la Distribución Cuántica de Claves (QKD) y el One-Time Pad (OTP).


🌌 Beyond the Wire: Encrypting Messages Where the Message Never Exists

Tags: #cryptography #quantumcomputing #security #developer #philosophy

The Teleportation Cipher: An Idea Rooted in Physics

We are accustomed to seeing encryption as a function: you take an Input Message ($M$) and a Key ($K$) and generate a scrambled Ciphertext ($C$). The ciphertext then travels across the wire. We rely on the attacker failing to solve the complex math to get $M$.

But what if the message itself never traveled? What if the message was not a collection of bits, but a difference between two known states, only to be materialized at the destination?

This powerful idea, far from being science fiction, is the conceptual core of what makes the world’s most secure encryption methods—like the One-Time Pad (OTP) and Quantum Key Distribution (QKD)—unbreakable.


🔑 The Two Secrets: Defining and Deflecting the Universe

In this thought experiment, the secret communication relies on two distinct secrets:

Secret 1: The Ground State (The Universal Standard)

This secret does not contain the message; it defines the state of the system.

  • Its Role: To align the emitter and the receiver to a shared, agreed-upon frame of reference. It’s the "zero" point, the un-rotated axis, or the pure, unpolarized light.
  • Analogy: If you imagine a clock face, Secret 1 is the agreement that "12 o'clock" means the same thing to both parties.
  • In Physics: In quantum cryptography, this is analogous to establishing the initial entanglement between two particles or agreeing on the measurement bases (like the diagonal or rectilinear base in QKD).

Secret 2: The Action Key (The Desynchronizer)

This is the cryptographic key we know and love, but it’s used not to scramble the message, but to offset the ground state in a controlled manner.

  • Its Role: To perform a precise, calculated discrepancy from the Ground State (Secret 1) that is equal to the intended message.
  • Analogy: The message "Move 3 Hours" is encoded by Secret 2 moving the state 3 hours from the 12 o'clock Ground State.

🌠 The Ciphertext Is Just Noise

When the emitter sends the signal, what travels is the difference between the Ground State and the Action Key.

$$
\text{Signal Sent} = \text{Ground State} \oplus \text{Action Key (Message Encoded)}
$$

To an outside attacker, the signal is a meaningless blend.

The Power of the One-Time Pad (OTP)

This concept is perfectly modeled by the OTP, the only known cryptosystem that is unconditionally secure.

  1. Mailing the Secrets: Alice and Bob physically pre-share a key as long as the message (Secret 2).
  2. Encryption: Alice XORs the message with the key ($C = M \oplus K$).
  3. The Result: The resulting Ciphertext ($C$) is mathematically proven to be pure random noise. If an attacker tries to decrypt it with any possible key, they get an equally valid, random message.
  4. The Materialization: The original message ($M$) only materializes when Bob applies the shared key ($K$) to the ciphertext ($C$).

$$
\text{Decryption} = C \oplus K = (M \oplus K) \oplus K = M
$$

Because the Ciphertext is perfectly random, it carries zero information about the plaintext. The message genuinely did not exist in the medium it traveled through.


⚛️ The Quantum Teleportation Cipher

While the OTP achieves this with mathematics, Quantum Key Distribution (QKD) achieves a similar feat with physics, fulfilling the promise of a "teleportation cipher" where the act of eavesdropping is itself a physical impossibility to hide.

  • In QKD, a key is generated by transmitting photons (the "signal").
  • If an attacker tries to measure the photon's state, the act of measurement collapses the quantum state (Heisenberg's Uncertainty Principle).
  • This collapse changes the Ground State (Secret 1) shared by Alice and Bob, introducing detectable errors.
  • The message (the key) is only revealed when the recipient applies the correct measurement base (Secret 2) to the incoming signal, and that process of measurement is the act of materialization.

Conclusion

The most secure encryption isn't about making the math hard; it's about making the message absent from the transmission.

By defining the message as a transient offset from an agreed-upon universal state, we achieve a form of communication where the information never exists in transit—it simply springs into existence at the destination, like a phase shift snapping back into alignment.

Top comments (0)