Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Network The Internet Networking Technology

Creating the First Quantum Internet (axios.com) 52

Scientists in Chicago are trying to create the embryo of the first quantum internet. If they succeed, the researchers will produce one, 30-mile piece of a far more secure communications system with the power of fast quantum computing. From a report: The key was the realization of an unused, 30-mile-long fiber optic link connecting three Chicago-area research institutions -- Argonne National Lab, Fermi Lab and the University of Chicago. This led to the idea to combine efforts and use the link for what they call the Chicago Quantum Exchange. David Awschalom, an Argonne scientist and University of Chicago professor who is the project's principal investigator, tells Axios that the concept is difficult to grasp, even for experts. MIT Technology Review elaborates: The QKD approach used by Quantum Xchange works by sending an encoded message in classical bits while the keys to decode it are sent in the form of quantum bits, or qubits. These are typically photons, which travel easily along fiber-optic cables. The beauty of this approach is that any attempt to snoop on a qubit immediately destroys its delicate quantum state, wiping out the information it carries and leaving a telltale sign of an intrusion. The initial leg of the network, linking New York City to New Jersey, will allow banks and other businesses to ship information between offices in Manhattan and data centers and other locations outside the city.

However, sending quantum keys over long distances requires "trusted nodes," which are similar to repeaters that boost signals in a standard data cable. Quantum Xchange says it will have 13 of these along its full network. At nodes, keys are decrypted into classical bits and then returned to a quantum state for onward transmission. In theory, a hacker could steal them while they are briefly vulnerable.

This discussion has been archived. No new comments can be posted.

Creating the First Quantum Internet

Comments Filter:
  • by YuppieScum ( 1096 ) on Friday October 26, 2018 @02:11PM (#57541203) Journal

    In theory, a hacker could steal them while they are briefly vulnerable.

    In practice, some three-letter agency or foreign power will steal them.

    FTFY

    • In theory, a hacker could steal them while they are briefly vulnerable.

      In practice, some three-letter agency or foreign power will steal them.

      FTFY

      As long as the original owner doesn't loose the information, then it's not theft, right?

      Doesn't information wanted to be free?

      At least that's how I understand it works with pirating movies and music. ;-)

  • The problem is the fleshy creatures on either side of the communications line. Alas that meat bad will likely be the weak point.
  • Far more secure : No
    More security margin against specific attacks : Yes.

    • A nice 8193 bit key should be as much protection as anyone ever needs.

      While Bill Gates never said that it may be true for as long as necessary. Just use some extra long key to encode the exchange of shorter length keys. Why do we need quantum key exchange?

      • Re: (Score:3, Informative)

        by Anonymous Coward

        Many years ago Bruce Schneier calculated that with a ideal classical processor, possessing lossless energy usage, would require more energy than the sun is capable of producing in its entire lifetime to crack a 256-bit symmetric keyspace given no implementation problems resulting in possible computational shortcuts. Meaning, even if quantum computing is capable of orders of magnitude higher cryptographic computation rates and an imperfect suite, 512-bit will never, ever be able to be cracked until we create

        • that'a what I thought. thanks

        • Not quite. There is no such thing as lossless energy usage. The best you can do is Landauer's principle which states you need Boltzmann constant times the temperature to flip a single bit. Given a temperature of 3 Kelvin (any colder and you need energy to bring the temperature down) the best you can do is 5x10^-23J per bit flip. Now we can do some assumptions and hand waving and say we only need to flip on average, from an external viewers perspective, 2 bits per key we try so 10^-22J per key. Also as
      • by dissy ( 172727 )

        What is the use case for QKE?

        That's the strangest part of this, QKE's main outstanding feature is that if the photons have their entanglement collapsed prior to reaching the other end, you A) lose the data being transmitted, and B) know for certain that this has happened.

        The only way it makes things "more secure" is that when the first photon is intercepted, the transmitter knows about that fact and then can refuse to send any further data.
        Unsent data can't be intercepted after all.

        At one point banks were thinking to use such links in

  • by fahrbot-bot ( 874524 ) on Friday October 26, 2018 @02:19PM (#57541261)

    Chicago Quantum Exchange

    Great. So traders will know where the market is going or where it is, but not both.

    I imagine Heisenberg wouldn't like uncertainty when it comes to his principle - or dividends ...

  • I got excited for a second hoping it would be 0 latency quantum-entangled internet.
  • by Zontar_Thing_From_Ve ( 949321 ) on Friday October 26, 2018 @02:39PM (#57541409)
    I'm no expert on quantum computing, but I can see problems already based on the summary.

    The QKD approach used by Quantum Xchange works by sending an encoded message in classical bits while the keys to decode it are sent in the form of quantum bits, or qubits. These are typically photons, which travel easily along fiber-optic cables. The beauty of this approach is that any attempt to snoop on a qubit immediately destroys its delicate quantum state, wiping out the information it carries and leaving a telltale sign of an intrusion.

    Maybe if I'm a bad guy, I'm quite OK with that. That would be something like a DDOS. Maybe I don't care about trying to steal your quantum encrypted data but I want to deny your ability to transfer data that way so you will move to a method of transmission I can read.

    At nodes, keys are decrypted into classical bits and then returned to a quantum state for onward transmission. In theory, a hacker could steal them while they are briefly vulnerable.

    Believe me, bad people will certainly do this. One of the ways Blu Ray encryption got cracked is that the players stored the keys unprotected in memory and smart people figured out how to dump the memory to get the keys. National actors who really want access to your data will have no problems trying to attack this weak point in the chain.

    • Maybe I don't care about trying to steal your quantum encrypted data but I want to deny your ability to transfer data that way so you will move to a method of transmission I can read.

      While this could be true, it's far more akin to snipping a line. It's only a problem until the net gets large enough.

      t nodes, keys are decrypted into classical bits and then returned to a quantum state for onward transmission. In theory, a hacker could steal them while they are briefly vulnerable.

      This is the problem. (Also,

    • by gweihir ( 88907 )

      I'm no expert on quantum computing, but I can see problems already based on the summary.

      At nodes, keys are decrypted into classical bits and then returned to a quantum state for onward transmission. In theory, a hacker could steal them while they are briefly vulnerable.

      Believe me, bad people will certainly do this. One of the ways Blu Ray encryption got cracked is that the players stored the keys unprotected in memory and smart people figured out how to dump the memory to get the keys. National actors who really want access to your data will have no problems trying to attack this weak point in the chain.

      That part of the story is so utterly pathetic, it is staggering. Of course you attack the nodes, not the cables. It is far easier.

  • by FeelGood314 ( 2516288 ) on Friday October 26, 2018 @02:50PM (#57541517)
    The Quantum Key exchange is interesting but not really practical. The equipment is expensive and hard to set up. Further, if you are using photons you can only send one per quantum state. If you send more than one an attacker can intercept them and figure out their state.

    In the easiest example Alice sends photons either polarized (up/down / side-2-side), or diagonally. Bob will then tell Alice which way his detector was set up for each received photon. For the photons his receiver was correct he know the polarity of Alice's photon. Alice and Bob then have a shared secret to use as a key. If Eve intercepts the photons she has to both read the photons and pass them on to Bob. If her detector is set up on the diagonal and Alice sends an up/down polarized photo Eve won't know the polarization and can't send the correct photon on to Bob. However if there are multiple photons, Eve can split them up and test them individually. With 8 photons Eve has a 63 in 64 chance of knowing the photons polarity and 255 out of 256 chance of fooling Bob well enough for her attack to go undetected.

    For the entire thing to work either you have to send multiple photons and have them boosted or you send one and the repeaters know Alice's pattern of polarization. In the second case this pattern becomes a key that must be kept secret across every repeater. You may as well just give Bob this key.
    • by gweihir ( 88907 )

      Yeas. And then, when you have done it, you just continue with normal encryption, because this quantum stuff is slow. It is also insecure, because the physical implementations have been attacked successfully time and again. And the theory behind it is known to be flawed (there is still not quantum-gravity).

  • China has succeed achieving this [technologyreview.com] years ago and from space too [nature.com]. When have American scientists got in the culture of making false and exaggerated claims?

  • First, Quantum Modulation (no, it is _not_ encryption) has been broken time and again by simply attacking the implementation instead of the theory. Anybody that thinks this stuff must be absolutely secure is utterly naive with regards to technological reality. Second, the theory used to claim "absolute security" is known to be flawed (still no quantum gravity). And third, conventional encryption is far superior in handling, reliability, cost, etc. and gets the job done just as securely, even if in 50 years

  • Not if they choose a k-n quorum scheme among k nodes on a network.

  • Alice and Bob want to agree on a key. Alice can send photons polarized at 0, 45, 90 or 135 degrees. Bob will have a detector for 0 or 45 degrees. If Alice sends a photon at 90 degrees and Bob uses the 0 degree receiver then Bob gets nothing but if he uses the 45 degree one he gets a photon 1/2 the time. So when Alice sends at 90 or 0 degrees Bob only knows for sure what the polarization was if he used 0 degrees. Alice will send 1000 photons this way. Bob will create a list of 1s and 0s depending on wh
  • Conventional encryption is rarely the security limit in real world systems. Much more often it is human factors where there is either an inside job, or a human is tricked by another human into doing something that breaks encryption.
    "Hi Carl, this is Alice from IT and it looks like the quantum link has de-phased again. Could you help phase it by typing the following into your terminal......."

    The technology is interesting, but I don't see a situation where it will actually help.

To do nothing is to be nothing.

Working...