Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Communications Security

Los Alamos National Labs Has Working Hub-and-Spoke Quantum Network 55

New submitter hutsell writes with this excerpt from MIT's Technology Review: "Richard Hughes and his associates at the Los Alamos National Laboratory in New Mexico announced today that they have been sending perfectly secure messages with their Quantum Internet that has been in operation for the last two and a half years." Original paper. Unlike current quantum networks that only allow point-to-point networking, the system at Los Alamos combines traditional and quantum links to route messages through a hub while retaining the security advantages of quantum networking.
This discussion has been archived. No new comments can be posted.

Los Alamos National Labs Has Working Hub-and-Spoke Quantum Network

Comments Filter:
  • So... (Score:5, Interesting)

    by fuzzyfuzzyfungus ( 1223518 ) on Monday May 06, 2013 @06:57PM (#43649033) Journal

    Any word on what percentage of the quantum-encrypted traffic is flowing between classically-compromised systems?

    • Given that their posted paper was typed in Microsoft Word (with correspondingly *really terrible* typesetting), it looks like this branch of the labs is likely to be running 100% compromised systems.

      • Re:So... (Score:4, Insightful)

        by fuzzyfuzzyfungus ( 1223518 ) on Monday May 06, 2013 @07:13PM (#43649147) Journal

        I was semi-joking; but it is actually a serious question. (To the best of my understanding) a quantum-encrypted network provides rock-solid assurance that nobody is physically tapping your lines. Depending on your site, your level of paranoia, and your value as a target, this may be a worthwhile investment compared to classically-encrypted tunnels, or guys with guns keeping people away from your fiber. However, it has no effect whatsoever on the (easier and more common) purely electronic attacks on vulnerable systems. A quantum-encrypted network will just as happily protect packets being sent back home by a keyloggger as it will anything else, and it has no particular ability to detect the evil bit.

        This doesn't make it useless; but it's really quite a different animal from classical encryption, or from good system security, and the present state of average system security is so dreadful that it rather overshadows physically tapping lines. If you can get a zero-day for $50k, it starts to become difficult to justify even sending a legitimate contractor out to dig up and splice a bunch of fiber, much less some l33t covert ops fiber modding operation.

        • They have not implemented a quantum-encrypted network as you are thinking of it.
          The quantum channel is used to pass one-time encryption pads.
          Then the OTPs are used to encrypt network data.

          Quantum computing isn't nearly fast enough to push real world amounts of data.
          But it doesn't really need to, if we can use it to generate bullet proof encryption.

          • I thought an OTP had to be at least as long as the data to guarantee security - in which case, why not just transmit the data quantum-, uh, -ly?
            • by Anonymous Coward

              My understanding is that a quantum tunnel is tamper evident, not tamper proof. Thus if you send data, and that data is intercepted, you have still lost the data, you just know that it was intercepted.

              If you send a OTP and that OTP is intercepted, you have lost some random bits; generate some new ones and resend. Any OTP that gets through without being compromised is then safe to use to encrypt your data with a simple bit-wise XOR algorithm, which can be decrypted at the other end the same way.

        • Yep, if the nodes at the end are compromised, no amount of quantum kerfluffery will prevent you from being screwed. The specific application described in the paper referenced in the summary is secure communication between industrial controllers in critical infrastructure. One would hope this was an area where infrastructure builders would be better at security than "hey, let's make all our nuclear power plant controllers visible on the general internet, with default passwords, running an outdated version of

        • Re:So... (Score:4, Informative)

          by WaffleMonster ( 969671 ) on Monday May 06, 2013 @10:40PM (#43650221)

          I was semi-joking; but it is actually a serious question. (To the best of my understanding) a quantum-encrypted network provides rock-solid assurance that nobody is physically tapping your lines.

          All quantum crypto gives you is one time pad material that cannot be derived from previous communications.

          For example say you are able to record all classical communication between parties. If at some point in the future you are able to somehow compromise the initial encryption key you would be able to go back and decrypt any communications using this key and rotated keys based on the initial key or descendants of said keys if communicated within intercepted channel after the fact.

          With quantum crypto there is no longer a physical linkage possible because pad data is guaranteed to be knowable to exactly two parties.

          There is still very much a real classical problem in that you need to establish a trust relationship between yourself and your communication partner to have any assurance as to which party you are actually OTPing in quantum world...This is always done using an initial classical key to protect against Active MITM of the quantum channel.

          While I appreciate the value in this scheme in the real world I do wonder what the actual benefit is for things like electric grid control cited in their paper where forward secrecy has very little value to begin with.

          While it is true that a compromised key could not in theory be used for long....if you already had the ability to compromise current key you could then also perform an undetectable active MITM against the quantum communication channel and from then on be privy to all new OTP/key refreshes.

          Any of us can exchange data over the Internet with the same level of assurances as the best fancy quantum gear...All you need to do is exchange OTP data offline (SD card filled with a few GB of random garbage) and you are set for a very long time of guaranteed intercept free communication. Years worth of voice chatter..lifetimes worth of text messages or short control messages all for small fractiones of pennies on the dollar. Sure it does not scale but no trust relationships ever really meaningfully do.

          As with the quantum gear your vulnerability is and always shall be compromise of that which hold trust/keys.

        • Classical encryption of the link also doesn't help with compromised systems. Your SSL connection to your bank may be perfectly fine and secure, if your computer is compromised, it won't help you.

      • but which universe was compromised?

        • the horrible evil twin one, where national security quantum communications researchers use *Microsoft Word* to prepare documents. Unfortunately, I seem to have woken up on the side of the bed that collapsed the universe's wavefunction into that state this morning.

          • by Anonymous Coward

            the horrible evil twin one, where national security quantum communications researchers use *Microsoft Word* to prepare documents. Unfortunately, I seem to have woken up on the side of the bed that collapsed the universe's wavefunction into that state this morning.

            No, there's nothing wrong. I checked my ST:TOS DVDs and there's only ONE episode where Spock appears clean-shaven.

  • I just red TFA, it seems there is a big scalability problem, as the network uses a central hub, and each node must have a direct optic fiber connection to the hub. The central hub security is critical, so we have a huge Single Point Of Failure.
    • In TFA, the intended application for this particular topology is big industrial/infrastructure control systems --- where you typically already have a central hub (which needs to be properly secured) with fiber links to many controllers. The technology works over typical existing fiber, and requires only relatively inexpensive transmitters at the end nodes (with one more expensive receiving photon detector at the central hub). No reason you couldn't use the same principles with redundant fiber connections to

  • All this stuff assume optical link cannot be taped. When I studied fibers at university, I recall being told about evanescent wave. Is it possible to infer some information from it without being detected? If not, how is it prevented?
    • Re:Evanescent wave (Score:5, Informative)

      by femtobyte ( 710429 ) on Monday May 06, 2013 @09:33PM (#43649909)

      No, it doesn't assume the optical link can't be tapped. In fact, the quantum encoding is specifically a defense against the optical link being tapped. The data is sent one photon at a time. If a tapper captures the photon (even by leakage from evanescent waves), they destroy the information --- and are neither able to know for themselves, or reliably re-send to the receiver, the bit that was sent. If the tapper doesn't capture the photon, they they haven't tapped the line. At the receiving end, getting too high a dropped bit rate (or scrambled nonsense bits) lets you know the line is compromised, while the attacker still doesn't get any useful information.

      • by Meneth ( 872868 )
        This only holds true for single-link connections. When we introduce a hub, it has to be trusted. From TFA:

        So as long as the hub is secure, then the network should also be secure.

        This destroys the protection from wiretapping that quantum crypto promised.

        • This actually surprises me, because using entanglement swapping I think it should be possible to make a protocol so that even a compromised hub could not compromise the security, thanks to monogamy of entanglement.

          • by Rich0 ( 548339 )

            Well, I see two potential problems with transmitting quantum crypto through hubs without trusting them:

            1. The signal loss problem. The longer the continuous link without retransmission, the more data loss and the lower effective transmission rate. What you refer to might help with that if it allows signals to be boosted without destroying/recreating the photons.

            2. The routing problem. Each packet has to get to the right destination, but if every photon on the line is a quantum encryption bit then you c

            • 1. The signal loss problem. The longer the continuous link without retransmission, the more data loss and the lower effective transmission rate. What you refer to might help with that if it allows signals to be boosted without destroying/recreating the photons.

              Good point. While entanglement swapping doesn't destroy and recreate the photons (no scheme doing that could transmit the entanglement needed to ensure secure encryption), it indeed depends on the detection of photons (those photons which are detected

        • by tgd ( 2822 )

          This only holds true for single-link connections. When we introduce a hub, it has to be trusted. From TFA:

          So as long as the hub is secure, then the network should also be secure.

          This destroys the protection from wiretapping that quantum crypto promised.

          Yes, by all means you're smarter than the people at Los Alamos who built it.

          You should apply for a job!

        • by Rich0 ( 548339 )

          This destroys the protection from wiretapping that quantum crypto promised.

          Quantum crypto always has had this limitation - it is a point-to-point system only. If you want multiple endpoints then you either need the 2^n connection growth or you need hubs that are trusted.

          However, securing the hubs ON YOUR OWN NETWORK isn't that hard if you really care to do it. The problem is that you can't do it on somebody else's network, like the Internet, unless you trust everybody.

          • If you want multiple endpoints then you either need the 2^n connection growth

            I'll assume you meant to type n^2, unless you're a network hardware salesman looking to make a lot of extra sales :)

    • by Shatrat ( 855151 )

      You are overthinking it. If I wanted to tap someone's network, I'd find a splice case in the middle of nowhere and splice in a 90/10 splitter during some unrelated outage so it wouldn't be noticed. To the victim it would just look like a relatively poor splice on their OTDR readings.

  • by gweihir ( 88907 )

    As soon as there is any conventional link involved, this fails completely. At best it can be called dishonest, but it seems to be more on the "stupid" class where those making the claims do not even understand the problem.

    • As long as the conventional links only pass encrypted data without owning the key, it is perfectly secure. Quantum encryption usually means non-locally creating a one-time pad using quantum mechanics, and using that to securely encrypt classical messages (it can be proven that OTP is perfectly secure, so any attack against the scheme has to be with the OTP generation part, which is completely quantum). Indeed, even in protocols where you don't explicitly apply an OTP (as in quantum teleportation) you could

      • by gweihir ( 88907 )

        You should read up on it. It uses conventional symmetric encryption, as a cryptographic key-exchange is not more risky than symmetric encryption. Nobody does one-time pads via quantum modulation. It would take forever.

  • Can someone with the technical knowledge of this summarize in comprehensible terms how this works on a physical level? I *mostly* (okay, abstractly/partially) understand how it works on a theoretical level, but I have zero understanding of what's going on at the hardware level. What sort of hardware is in use here, and how does it work?

  • ...it's not transfer of info over QT. Such an invention would create a truely decentralised internet; peers connected directly without corporates and gvt as go-betweens.
  • ...and I wasn't the first one in. This one has tracks on it.

    Life imitates art!

Children begin by loving their parents. After a time they judge them. Rarely, if ever, do they forgive them. - Oscar Wilde

Working...