Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Communications The Internet Network Security Science

All-Photonic Quantum Repeaters Could Lead To a Faster, More Secure Global Quantum Internet (phys.org) 54

"University of Toronto Engineering professor Hoi-Kwong Lo and his collaborators have developed a prototype for a key element for all-photonic quantum repeaters, a critical step in long-distance quantum communication," reports Phys.Org. This proof-of-principle device could serve as the backbone of a future quantum internet. From the report: In light of [the security issues with today's internet], researchers have proposed other ways of transmitting data that would leverage key features of quantum physics to provide virtually unbreakable encryption. One of the most promising technologies involves a technique known as quantum key distribution (QKD). QKD exploits the fact that the simple act of sensing or measuring the state of a quantum system disturbs that system. Because of this, any third-party eavesdropping would leave behind a clearly detectable trace, and the communication can be aborted before any sensitive information is lost. Until now, this type of quantum security has been demonstrated in small-scale systems. Lo and his team are among a group of researchers around the world who are laying the groundwork for a future quantum Internet by working to address some of the challenges in transmitting quantum information over great distances, using optical fiber communication.

Because light signals lose potency as they travel long distances through fiber-optic cables, devices called repeaters are inserted at regular intervals along the line. These repeaters boost and amplify the signals to help transmit the information along the line. But quantum information is different, and existing repeaters for quantum information are highly problematic. They require storage of the quantum state at the repeater sites, making the repeaters much more error prone, difficult to build, and very expensive because they often operate at cryogenic temperatures. Lo and his team have proposed a different approach. They are working on the development of the next generation of repeaters, called all-photonic quantum repeaters, that would eliminate or reduce many of the shortcomings of standard quantum repeaters.
"We have developed all-photonic repeaters that allow time-reversed adaptive Bell measurement," says Lo. "Because these repeaters are all-optical, they offer advantages that traditional -- quantum-memory-based matter -- repeaters do not. For example, this method could work at room temperature."
This discussion has been archived. No new comments can be posted.

All-Photonic Quantum Repeaters Could Lead To a Faster, More Secure Global Quantum Internet

Comments Filter:
  • by phantomfive ( 622387 ) on Tuesday January 29, 2019 @02:58AM (#58038582) Journal
    You can't trust the data as soon as it leaves your computer. If it hasn't been encrypted by that point, it doesn't really matter if AT&T encrypts their transmission lines.
    • by necro81 ( 917438 )

      You can't trust the data as soon as it leaves your computer. If it hasn't been encrypted by that point, it doesn't really matter if AT&T encrypts their transmission lines.

      While this is true to a degree, it is an impractical standard for modern communications. How do you propose to have extensive communications between Alice and Bob without having a quick and easy mechanism for sharing and updating encryption keys? This new solution allows for the sharing of keys without (undiscovered) eavesdropping.

  • Article seems like nonsense to me. We already have secure transmission by end-to-end encryption.
    Securing the transmission channel further will do nothing to enhance that, and nothing to stop the hacking mentioned in the article.

    What possible use is quantum key distribution?
    If you can authenticate, you already have secure key distribution, and if not, you are still vulnerable to man-in-the-middle, no?

    • Article is mostly nonsense as far as I can tell too. Also, I do love how slashdot editors feel the need to tell us what repeaters are.

      However, if quantum computing ever works, then your nice RSA or AES encrypted data stream is (so the thinking goes) highly vulnerable to quantum cracking, which (so goes the hype) is thousands if not millions of times faster then regular computing. Thus, in any post-Von-Neumann world, you're going to need a way to transmit data without it being snooped or cracked later. For t

      • by quenda ( 644621 )

        then your nice RSA or AES encrypted data stream is (so the thinking goes) highly vulnerable to quantum cracking,

        Actually, from what I read, symmetric encryption like AES is safe, it is the public key (RSA), which is used to transmit the symmetric key, that is at risk.
        So the hardware encryption is safe, you just need a software upgrade to improve the public key side if quantum computing ever gets close to cracking it.

        • by gotan ( 60103 ) on Tuesday January 29, 2019 @11:34AM (#58040544) Homepage

          It doesn't work like that. The problem is, that public key algorithms rely on "trap door algorithms" that are "easy" to do in one direction (e.g. multiplying two prime numbers) but "very hard" in the other direction. "Easy" usually means "requires a number of operations that is polynomial in "N" (N=number of digits), "hard" means "requires a number of operations that goes exponential with N. E.g. counting up to the product (or its square root) and testing each number if it divides it is "hard". Public key cryptography relies on this, an attacker has to solve a "hard" problem to crack the key. What compromised some key length previously was not that "hard" became "easy", but that with better and more hardware and improved algorithms the "hard" problem became doable. This can be easily fixed by using a higher key length. (one problem with all that is, that AFAIK we don't have mathematical proof that "hard" problems are really "hard", see P=NP, but that's another subject entirely)

          Now some problems that (we think) are "hard" to do in classical computing are "easy" in quantum computing, prime factoring is one example of this. With that the basic premise falls, and that can't be helped by adjusting the key length. Maybe there are trap door algorithms out there that can't be made "easy" by quantum computing, or maybe we'll find that some problems we previously thought to be hard really aren't.

          But quantum key distribution could solve that problem, since it provides a way of generating a common one time pad and check if anyone eavesdropped. That one-time-pad can then be used to transmit a key for the symmetric encryption e.g. in place of RSA.

          The OP is right, that that doesn't solve the problem of authentication. Still a secure (in the sense that eavesdropping can be detected) distribution of exactly two instances of a one-time pad on the basis that authentication has happened certainly has its uses.

        • Existing quantum algorithms would require multiple orders of magnitude improvement in quantum computing hardware just to crack 32 bit keys. The difficulty goes up exponentially as you increase the size, because of the basic design of the machine and the difficulty of entangling electrons. (or photons)

          A regular computer scales in a linear fashion; you simply add more transistors. And you can divide up the problems between a large number of computers. You can't do that with a quantum algorithm; you need a big

    • by necro81 ( 917438 )
      The key point here is that man-in-the-middle attacks require that the MITM be undiscovered, otherwise you'll know you're being eavesdropped. Quantum key distribution allows for Alice and Bob to share a set of quantum keys without Chuck discovering those keys by MITM attack. Or, Chuck can discover those keys, but not without Alice and Bob knowing that Chuck has done so.

      The result may be a denial of service (Alice and Bob can't talk, because they know Chuck will always discover their keys), but a silent
    • They obviously need more grant money.
  • Governments and Internet Ad companies hate this because they won't be able to listen into our traffic. So this technology will not be available for us plebs.
    • by dohzer ( 867770 )

      Sure they will. Just make the repeater intercept the traffic and make the software in your computer tell you the connection is secure. Done.

  • Faster porn!
    The problem with internet security is 100% developer responsibility. Lack of investment on security and no update plans for almost every IoT device are the main problems
    How is quantum logic going to prevent bad, outdated code?
  • Just asking for a friend, ..?
    • by havana9 ( 101033 )
      Wrong time-travel device. I suppose, you are confusing Michael J Fox with Scott Bakula
      • If the Flux Capacitor wasn't a quantum technology, why would it be needed for time travel?

        Where did you think flux energy came from?!

        Time is a form of quantum entanglement, this acts like friction when you move backwards. That's also why you get an electrical fire if you go backwards without a flux capacitor; as the electrons disentangle from time, they get stuck instead to the time travel device. You have to re-entangle them inside the flux capacitor.

  • For thousands of years, coders have promised "to provide virtually unbreakable encryption". Hackers cracked all of them, usually quite quickly. I'll wager quantum encryption will fare no better.
  • by Anonymous Coward

    âoeThese repeaters boost and amplify the signalsâoe

    Whats the difference between boost and amplify?

    They boost and amplify and enlarge and reinforce and swell and grow and increase and embiggen the signals.

  • Quantum key distribution (QKD). QKD exploits the fact that the simple act of sensing or measuring the state of a quantum system disturbs that system. Because of this, any third-party eavesdropping would leave behind a clearly detectable trace, and the communication can be aborted before any sensitive information is lost. Until now, this type of quantum security has been demonstrated in small-scale systems.

    Existing repeaters for quantum information are highly problematic. They require storage of the quantum state at the repeater sites, making the repeaters much more error prone, difficult to build, and very expensive because they often operate at cryogenic temperatures.

    Commander Data continued, "Using the deflection dish, though, it should scale up enough to allow us to detect the warp anomaly and free the USS Maelstrom."

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...