Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications United States

The Super-Secure Quantum Cable Hiding In the Holland Tunnel (bloombergquint.com) 113

Zorro shares a report: Commuters inching through rush-hour traffic in the Holland Tunnel between Lower Manhattan and New Jersey don't know it, but a technology likely to be the future of communication is being tested right outside their car windows. Running through the tunnel is a fiber-optic cable that harnesses the power of quantum mechanics to protect critical banking data from potential spies.

The cable's trick is a technology called quantum key distribution, or QKD. Any half-decent intelligence agency can physically tap normal fiber optics and intercept whatever messages the networks are carrying: They bend the cable with a small clamp, then use a specialized piece of hardware to split the beam of light that carries digital ones and zeros through the line. The people communicating have no way of knowing someone is eavesdropping, because they're still getting their messages without any perceptible delay.

QKD solves this problem by taking advantage of the quantum physics notion that light -- normally thought of as a wave -- can also behave like a particle. At each end of the fiber-optic line, QKD systems, which from the outside look like the generic black-box servers you might find in any data center, use lasers to fire data in weak pulses of light, each just a little bigger than a single photon. If any of the pulses' paths are interrupted and they don't arrive at the endpoint at the expected nanosecond, the sender and receiver know their communication has been compromised.

This discussion has been archived. No new comments can be posted.

The Super-Secure Quantum Cable Hiding In the Holland Tunnel

Comments Filter:
  • by burningcpu ( 1234256 ) on Monday January 14, 2019 @04:41PM (#57961374)
    [QUOTE]"use lasers to fire data in weak pulses of light, each just a little bigger than a single photon."[/QUOTE]

    Light comes in units of photons. Saying, "just a little bigger than a single photon," doesn't make sense. Was it two photons? Is this an artifact of averaging and poor journalism, where the target was really 1 photon, and sometimes more are released?
    • Er, light comes in discrete units of photons.
      • by 93 Escort Wagon ( 326346 ) on Monday January 14, 2019 @04:57PM (#57961502)

        These are jumbo photons - your quantum switch needs to have that setting turned on for them to work.

      • Re: (Score:2, Offtopic)

        Er, light comes in discrete units of photons.

        Sure, but they aren't all the same size. A red photon is half again the size of a blue photon (700 nm vs 450 nm).

        So "just a little bigger than one photon" could mean a slightly bigger photon, or maybe a normal photon plus a tiny little photon like a gamma ray.

    • Is this an artifact of averaging and poor journalism, where the target was really 1 photon, and sometimes more are released?

      I thought the phrasing was odd as well but took it to mean as you say here, a very few number of photons, close to one.

    • by zlives ( 2009072 )

      what they meant was that when light is in wave form you can cut 1.05 waveform ummm as a pulse umm yeah. every one noes that its only discrete in once it evolves into particle form.
      see makes perfect sense.

    • Light comes in units of photons. Saying, "just a little bigger than a single photon," doesn't make sense. Was it two photons? Is this an artifact of averaging and poor journalism, where the target was really 1 photon, and sometimes more are released?

      It's a photon with just a smattering of gluon the side.

    • Good catch. It isn't really bad reporting, it's proponents trying to hide a major flaw in the system.

      The thing about quantum key distribution is that it only works when you send one photon at a time, because if you send more, it becomes fairly trivial for Eve to pick up one of the extra photons and eavesdrop.

      However due to losses and reflections along the fibre (even very small changes in refractive index in the core along the length of a typical fibre cause some reflection back), you need to send more
      • by epine ( 68316 )

        And I guess it works on the bankers cause they don't understand optics or quantum physics.

        No greedy financial institution ever hired a graduate student with a physics degree to wrangle all that complex math?

        I don't know what world you're living in, but it isn't this one.

      • by Anonymous Coward

        Look up Decoy State QKD some time. What you describe was solved a decade ago.

      • Thank you for the concise explanation!
      • So for km long links they send what they call "weak" pulses of photons, and still call it QKD.

        Yes, but the weak pulses still have an average number of photons well below 2. The loss in a long fiber only means that perhaps only 0.1 % to 1 % of the photons arrive at their destination, but those arriving may still be used to generate a secret key.

    • by mspohr ( 589790 )

      No, these are obviously "big photons being a little bigger than a single photon".
      I, for one, would like to know where they get these big photons... I could use a few of them around the house. They might be slower than the standard photons and might hang around longer.

    • A pulse of light a bit bigger than one photon makes perfectly sense ...

    • by vbdasc ( 146051 )

      Is this an artifact of averaging and poor journalism

      Good luck finding journalists who understand quantum physics.

  • What about protecting from jay on backhoe from braking it ? and after that does this need a lot bigger repair job then with other fiber?

    • by es330td ( 964170 )
      I like the way they let terrorists know the precise location of a valuable technical target.
    • by PPH ( 736903 )

      Probability.

      The statistical odds that Jay will actually be operating a backhoe rather than being on a union negotiated break are vanishingly small in NYC.

  • by atrex ( 4811433 )
    So what happens if dust gets in the way?
  • QKD is only as secure as your believe that the physical model "Quantum Mechanics as of today" describes reality completely. And that we already know not to be the case (as quantum mechanics do not even include the omnipresent phenomenon "gravity"). Nobody can say if a more precise model of reality will open up ways to intercept single photon transmissions without leaving traces.

    QKD also solves no problems as conventional cryptography works very well (and its potential failure is not quite the number one th
    • To be fair normal physics does not describe gravity correctly either. That is why we invented Dark Matter. At least quantum physics hasn't been giving wrong answers for 100 years.
    • Nobody can say if a more precise model of reality will open up ways to intercept single photon transmissions without leaving traces.

      No, but we also know that in a world where this is possible (sufficiently well), lots of other cool possibilities will open up, such as superluminal communication and time machines. The currently known laws of physics describe pretty much everything possible on earth (and other places in the universe with weak gravity) today. But of course if you could integrate a couple of black holes and maybe a few wormholes into your interception device, we cannot quite rule out that an attack is impossible.

  • by Anonymous Coward

    call it what it is.. a QuantumLink [wikipedia.org]

  • Remember how difficult it was to get the congress-critters to understand how the internet works? Making rational laws for this type of tech is gonna be a real cluster fock.
  • by aepervius ( 535155 ) on Monday January 14, 2019 @05:18PM (#57961654)
    "If any of the pulses' paths are interrupted and they don't arrive at the endpoint at the expected nanosecond, the sender and receiver know their communication has been compromised" it is just plain damn light path measurement, and has nothing to do with real quantum encryption, and the no cloning theorem.
  • How about encrypting the data so that you don't care how many people capture the 1s and 0s going over the wire (be it electrical or optical) since none of them can make any sense of them without the decryption keys?
    • Re:Strong encryption (Score:4, Informative)

      by PPH ( 736903 ) on Monday January 14, 2019 @05:27PM (#57961738)

      without the decryption keys

      That's why this is called Quantum Key Distribution.

      Once Alice and Bob* have their keys, the messages are encrypted using standard algorithms and passed over normal fiber optic links.

      *Should we change this to Achmed and Boris by now?

      • Maybe I misread the summary, but it made it sound like QKD has nothing to do with encryption. It sounds like a way to determine if someone is listening or tapped into the line. Or did I misunderstand this statement: "If any of the pulses' paths are interrupted and they don't arrive at the endpoint at the expected nanosecond, the sender and receiver know their communication has been compromised."
        • by PPH ( 736903 )

          QKD has nothing to do with encryption

          Initial session key exchange has a lot to do with encryption. If a man in the middle can examine the keys, subsequent encryption based on them is not secure.

        • by Anonymous Coward

          The summary is wrong in many many ways. Please disregard the summary.

          The quantum communication channel is used to exchange keys (for example for one-time-pad encryption). Detection of an eavesdropper relies on the fact that any measurement of the polarized photons doesn't reveal enough information to clone the photons correctly with certainty and send them to the actual recipient. It is assumed that each transmitted bit is sent with ideally just one photon, so that measuring this photon destroys information

        • by ceoyoyo ( 59147 )

          It has nothing to do with encryption. QKD is about making a communications channel where you know if messages are being intercepted. The most useful thing anyone could think of to do with that is to exchange encryption keys.

      • by ceoyoyo ( 59147 )

        Of course the REAL question is why Alice and Bob couldn't exchange a key in a conventional way, but they COULD run a fibre optic cable through the Holland Tunnel and build QKD hardware to put on either end of it.

    • without the decryption keys?

      How do you get the decryption key without knowing for sure that someone isn't listening? I would propose a system like Quantum Key Distribution, I think I read about it once on Slashdot.

  • Why bother when most network traffic is already encrypted? Encryption is worthless if an attacker manages to get the digital keys used to encode and decode messages.

    This is what forward secrecy is for.

    Each key is usually extra-encrypted, but documents disclosed by former National Security Agency contractor Edward Snowden in 2013 showed that the U.S. government, which hoovers up most of the worldâ(TM)s internet traffic, can also break those tougher codes.

    Unless security vendors have made secret deals with god normal cryptography is still required to authenticate peers and just like normal systems compromise of keys is fatal to future communications.

    Just like normal systems:

    1. There are still keys that can be stolen.
    2. There is still cryptography that can be compromised.

    If any of the pulsesâ(TM) paths are interrupted and they donâ(TM)t arrive at the endpoint at the expected nanosecond, the sender and receiver know their communication has been compromised.

    Given fiber only runs .67c this is hardly definitive of anything.

  • If it's _in_ the Holland Tunnel, it might be secure but it ain't safe.

  • The Super-Secure Quantum Cable Hiding In the Holland Tunnel

    ... they can't find the cable - which makes it super secure.

  • Now that we know it's there, it's only a matter of time before someone observes the cable and alters the outcome.
    • I know you're probably going for funny. But, that is the point of QKD. If the entangled photons are observed mid transit, they will be altered or not arrive at the destination. When this happens the distributed keys won't match and therefore the encryption/signatures will fail and the interception will be detected. The summary is incorrect in how it describes the working of QKD.

      QKD still relies on classic crypto to encrypt the channel and verify the authenticity of the keys and the participants, otherwise i

  • Most big hacks have been due to human factors, not someone breaking zillion-bit encryption.

  • by FeelGood314 ( 2516288 ) on Tuesday January 15, 2019 @03:30AM (#57964056)
    This is a key agreement scheme for privacy. Someone wants to keep something secret forever. Today Alice and Bob can use regular encryption to prove they are talking to each other and agree on a secret key using certificates and things like Diffie-Hellman key exchange. We have know how to do this for almost 40 years. The problem with all of this though is that if someone records the Diffie-Hellman key exchange (or other key agreement scheme) and the subsequent communication and computing or math advances in the future to the point where the D-H key exchange can be broken then the communication will no longer be secret. Now if you are the government, communication you do today could be very embarrassing if it was revealed 20 or 30 years from now.

    Right now we are back to suitcases with key tables. If an embassy wants to send something that must be kept secret for 50 years, it pretty much has to be physically delivered or the keys for the communication must be physically delivered. Everyone is recording as much communication as they can and trying to build a quantum computer to break the key exchanges. Who will be first? The Americans, the Chinese, the University of Waterloo with money from everyone else???

    QKD is simple to understand, I send you a bunch of pulses of photons, you send me back the way you read them, I send you a list of the times you read them the correct way. We now have a subset of photons that we correctly exchanged that we can use as a key. Does it work? As others have pointed out, it only really works if you only send 1 photon at a time. It fails if I send lots of photons each time (which I really need to do) and our attacker has better equipment than we do (which they always will because they get to build theirs after we commit and deploy).
    • The part about future privacy is spot on. The following to statements in the last paragraph are wrong:
      1. It fails if I send lots of photons each time (which I really need to do)
      2. [It fails if] our attacker has better equipment than we do

      As for 1, the performance certainly degrades quickly if you send more than one photon or each signal, but it is still possible to get a secret key from two- and three-photon pulses provided a protocol ruling out photon-number-splitting attack is used (such as decoy-stat

  • These finance outfits are leaking weak security details so their adversaries never suspect their real security measures.

"If it ain't broke, don't fix it." - Bert Lantz

Working...