Coin Flipping

Coin flipping is a technique for establishing a cryptographic channel between two mistrustful parties. It was popularized by quantum cryptography, which uses quantum physics principles to create an encryption key. Coin flipping was designed to prevent the communicating parties (say Alice and Bob) from cheating while encrypting or transmitting data.

To begin the coin flipping protocol, Alice uses a beam splitter to polarize photons, per quantum physics principles. The beam splitter divides the photons either linearly or diagonally. The generated quantum bits, or qubits, she then sends to Bob. Bob also uses a beam splitter to polarize the photons and records the resulting bit measurements, often measured as either 0 or 1 like traditional bits. He sends those to Alice to compare results.

Alice will then confirm that she has the same results, if she indeed does. (Note that the security of this depends on Alice not changing her answer for the second step. Some security protocols might require that Alice be bound to her initial polarization results and cannot change them later.) Alice and Bob will then use the bit (or multiple bits) that had the same polarization to create the shared, secret encryption key. Ideally, they should each show each other the list, table, or chart of qubit sequences to see that neither cheated.

If Alice rejects the bit or sequence of bits that Bob returns to her, the coin flipping protocol will fail and no encryption key will be generated. If one of the lists is wrong, that will reveal an error or deception on one side. If Alice sends a different report of qubits to Bob than her initial one, this is a form of cheating. Though cryptography researchers state that there are methods of securing the coin flip protocol, its security relies on controlling many different aspects of the protocol that could be manipulated. However, coin flipping is an important method in the growing field of quantum cryptography because it allows two parties who do not trust each other to share encrypted data.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Embedded Analytics

Embedded analytics brings self-service business intelligence to everyday application users.

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their workforce operations. They provide a central platform for human resources professionals...

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...