Quantum Cryptography Slowed by "Dead Times" 75
coondoggie writes "Researchers at the National Institute of Standards and Technology and the Joint Quantum Institute said today that technological and security issues will stall maximum transmission rates at levels comparable to that of a single broadband connection, such as a cable modem, unless researchers reduce "dead times" in the detectors that receive quantum-encrypted messages."
Use a cat! (Score:1, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2, Funny)
This could be a problem ... (Score:2)
"I can't
Re: (Score:2)
I have no clue what this is about (Score:5, Insightful)
I read the summary and didn't understand a single part of it, but it sounded interesting and I though, "The article must explain things better." But after reading the article I still have no idea what is going on. Is there someone else that could maybe help explain what this story is all about?
Re:I have no clue what this is about (Score:5, Funny)
Re: (Score:1)
Re: (Score:1)
Ah, now I get it... (Score:2)
Dead time in scientific instruments (Score:5, Informative)
The net result is that as you send more and more signals to a spectroscopy system, the dead time increases and eventually you get no output because the electronics are constantly saturated. A well put together system will include a measurement of dead time so you know how many signals you're loosing.
Re: (Score:2)
Re: (Score:2)
Re:I have no clue what this is about (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
yeah, well....my laser is bigger than yours!!!!!
(It probably is - in volume.)
Re: (Score:3, Funny)
Re: (Score:1)
How do they know it's dead? (Score:1)
How can you have security issues? (Score:1)
Anyone would think this whole industry was smoke and mirrors.
Additionally, isn't it possible to multiplex the connections and gain parallel speedups?
My current understanding of quantum tech is the data still goes by traditional means but they use a quantum *handwaving* thing to ensure the bits sent traditionally haven't been messed with.
Re:How can you have security issues? (Score:4, Funny)
It's a Force thing. The quantum circuits say, "you don't need to see his information" and anyone trying to listen in simply waves the information on its way.
Re: (Score:2, Informative)
My current understanding of quantum tech is the data still goes by traditional means but they use a quantum *handwaving* thing to ensure the bits sent traditionally haven't been messed with.
It works under a simple principle: Bits coming down a traditional wire from Alice to Bob can be intercepted by Eve, read and then re-generated down the wire so that neither Alice nor Bob know that Eve has read the message. Quantum cryptography exploits a property of a quantum system that says that if you measure a system: (a) you change the system and (b) you can't get all of the original information about the system back out [think Heisenberg Uncertainty Principle: if you know position accurately, you do
meta (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Oh, harder than it sounds, isn't it?
Re: (Score:2)
Re: (Score:1)
It seems to me that this is exactly the type of encryption the GP was referring to when he referenced a "private key." In any case, there already exists unbreakable[1] encryption through OTPs. The problem is coordinating them between parties, which is the problem public-key encryption solves. If (in this case through quantum crypto) we can safely transmit OTPs, we can have perfectly secure communication over any channel of our choosing.
[1] "...if the key is truly random, nev
Re: (Score:2)
Re: (Score:3, Informative)
AFAIK that's basically how it works - the quantum link can't transmit any actual "information" - it just allows Alice and Bob to exchange a big random number in a way that allows them to detect whether Eve is listening in. Even that requires a "conventional" information link and several rounds of back-and-forth commuinication to "agree" on the key.
I guess the other problem is that to be 100% guanranteed uncrackable the key needs to
Re: (Score:1)
A Britney song is just a big random number, and Alice could be RIAA and Bob could be the Britney fan, and this technology will allow RIAA to know if Bob is siphoning off data to an un-DRM'd format such as MP3. Expect to see millions of dollars pouring into this research soon.
Re: (Score:2)
I know it is a depressing thought, but no - its not random, its pre-determined. However, any random number could be a Britney song (if an infinite number of monkeys can type the works of Shakespeare then Britney should be a cinch!) so any random number generator is a potentially infringing device under the DMCA.
If God does play dice with the universe he better not roll the HD-DVD encryption key...
Is this really a problem? (Score:1, Informative)
Organization often confussed with... (Score:5, Funny)
Re: (Score:1, Funny)
The latter, presumably, conducting most of their meetings in coffee shops.
Comment removed (Score:3, Informative)
Amazing! (Score:2, Insightful)
Tell God you support Quantum Neutrality (Score:2, Funny)
So much for... (Score:1, Insightful)
Latency. (Score:1)
The read latency of the quantum receiver is/will be too high.
Hence throughput speeds will be limited.
Therefore someone should find a way to reduce this latency, such that transmission speeds can be increased.
store it (Score:3, Interesting)
You can continuously refill this one time pad thus the real limitation is
- your average rate of encrypted data over the year
- disk space (but that's very cheap)
peak speed of encrypted data transmission is not constrained
Re: (Score:2)
So someone could read the whole one time pad and decrypt it as it's sent via conventional means, and the person receiving wouldn't know the one time pad had been read until they had the incorrect encrypted message.
You could checksum the random pad, but it doesn't inspire much confidence. (I'm only barely starting quantum physics in uni so I'm a layman)
Amazing... (Score:1, Offtopic)
We demand an immediate release of the cat (Score:4, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Or maybe not... [thinkgeek.com]
I don't think this is that important (Score:2)
AFAIK, there are no quantum computing algorithms that do more than effectively halve the effective key length for symmetric key cryptography (things like AES, DES and Blowfish). This means that if you use quantum cryptography to exchange symmetric keys, you should then be able to continue on using these kinds of ciphers in a normal communications channel.
Confucius says... (Score:2)
That Explains It..... (Score:1)
Ok. Ok. Ok..... Mod -1 BadJoke