Current cryptography is based on trapdoor functions, that is, which are easily computable in one direction, but which take significant time to be computed in the opposite direction; these functions are used to establish a unique and common key only to two specific people (DIFFIE; HELLMAN, 1976). The best example of this is RSA, which is widely used and based on the multiplication of prime numbers, an easy task for computers, and on the difficulty of factoring their products. Your security, therefore, is not absolute, but based on the time that this operation takes; and the same applies to all mathematical key distribution (BENNETT, 1992). An interesting perspective here is that all mathematically (or classically) encrypted communications will eventually be vulnerable, with technological advancement and the consequent increase in key-cracking power, or with advances in computational complexity theory (the theory that studies the time that an operation takes to be performed depending on the size of the numbers used), which, as in any sector of science, will inevitably occur.
For internet privacy to be effectively guaranteed, it is logically necessary for communications to be as impenetrable as possible; this level of protection can currently only be achieved with the help of Quantum Physics.
This science studies matter in its discrete, unitary state - that is, its quanta - where it does not behave as in the macroscopic world, being exclusively a wave or a particle, but rather as a state that can exhibit both the properties of one as well as the other. They coexist in a single state, and each of which has a probability of excelling at the time of a measurement. After the measurement, the states become uncertain again, including due to the influence of the measurement itself, which is nothing more than an interaction between states, from which both emerge modified. This means that it is impossible to accurately measure two properties of the same state.
This does not mean, however, that it is impossible to measure two properties of two identical states. The bizarre phenomenon of identical states, or Quantum Entanglement, was physically proven from the initial proposal in this paragraph, in a test called CHSH; We successfully repeated this same demonstration in the first of our experiments.
The aforementioned phenomena allow the creation of encryption protocols based on a different security than that offered by the classic one. These protocols are based on the difficulty of measuring a state, or a series of states, without this affecting a second measurement – and the verification of this modification is done, of course, through comparison with its entangled pair. Unfortunately, the creation of these protocols came to a standstill from 1991 onwards, with little work since then. Fearful that the quality of current protocols does not meet the needs of science and, in the future, of society, we propose here a protocol of our own. To develop it, we carried out three experiments in order to observe the criteria that would guide its creation.
Keywords: Quantum Physics. Computer science.

Henrique Vieira dos Santos Guerra

Cristiane Rodrigues Caetano Tavolaro

Breno Gonçalves Marques Teixeira

Dante Alighieri College

Sao Paulo /

SP -

Brazil

207+

What did you think of this project? Participate by leaving your comment below:

207+

Henrique Vieira dos Santos Guerra

Cristiane Rodrigues Caetano Tavolaro

Breno Gonçalves Marques Teixeira

Colégio Dante Alighieri

SP –

Brasil

Educational Incentives and Awards Offered

Get to know the projects that are competing in all of Mostratec Virtual's research areas:

International Science and Technology Exhibition

Brazilian Science and Technology Exhibition

For the People's Jury awards, only single votes (one per user) and that are cast between 0/00 and 26:10 on 23/59 will be considered valid.

Fill in your details below to perform your test:

Congratulations!!!!

Extremely current theme! Excellent article

Congratulations on choosing the theme and the clarity of the words!

Congratulations on your work and also congratulations to the school for always encouraging talent.👏🏻👏🏻👏🏻

Very interesting. The student knew how to explain a very complex topic in a simple way!

Congratulations on the beautiful project. You are a ready scientist. How long did it take you to complete the project?

Thanks, Pablo! I have been involved with research in Quantum Physics for 3 years and in this project for 2 years.

I recently came across your research projects and would love to talk to you more about it. I've been studying quantum mechanics independently for a year and it's the first time I've met someone my age interested in the field.

Very interesting project and very well grounded, I just have one question, why the name Dandelion Protocol?