. Military Space News .
CYBER WARS
New laser technique promises super-fast, secure quantum cryptography
by Staff Writers
Cambridge, UK (SPX) Apr 06, 2016


This is a depiction of indistinguishable photons leaving through the same output port of a beam splitter. Image courtesy Lucian Comandar. For a larger version of this image please go here.

Researchers have developed a new method to overcome one of the main issues in implementing a quantum cryptography system, raising the prospect of a useable 'unbreakable' method for sending sensitive information hidden inside particles of light.

By 'seeding' one laser beam inside another, the researchers, from the University of Cambridge and Toshiba Research Europe, have demonstrated that it is possible to distribute encryption keys at rates between two and six orders of magnitude higher than earlier attempts at a real-world quantum cryptography system. The results are reported in the journal Nature Photonics.

Encryption is a vital part of modern life, enabling sensitive information to be shared securely. In conventional cryptography, the sender and receiver of a particular piece of information decide the encryption code, or key, up front, so that only those with the key can decrypt the information. But as computers get faster and more powerful, encryption codes get easier to break.

Quantum cryptography promises 'unbreakable' security by hiding information in particles of light, or photons, emitted from lasers. In this form of cryptography, quantum mechanics are used to randomly generate a key. The sender, who is normally designated as Alice, sends the key via polarised photons, which are sent in different directions.

The receiver, normally designated as Bob, uses photon detectors to measure which direction the photons are polarised, and the detectors translate the photons into bits, which, assuming Bob has used the correct photon detectors in the correct order, will give him the key.

The strength of quantum cryptography is that if an attacker tries to intercept Alice and Bob's message, the key itself changes, due to the properties of quantum mechanics. Since it was first proposed in the 1980s, quantum cryptography has promised the possibility of unbreakable security.

"In theory, the attacker could have all of the power possible under the laws of physics, but they still wouldn't be able to crack the code," said the paper's first author Lucian Comandar, a PhD student at Cambridge's Department of Engineering and Toshiba's Cambridge Research Laboratory.

However, issues with quantum cryptography arise when trying to construct a useable system. In reality, it is a back and forth game: inventive attacks targeting different components of the system are constantly being developed, and countermeasures to foil attacks are constantly being developed in response.

The components that are most frequently attacked by hackers are the photon detectors, due to their high sensitivity and complex design - it is usually the most complex components that are the most vulnerable. As a response to attacks on the detectors, researchers developed a new quantum cryptography protocol known as measurement-device-independent quantum key distribution (MDI-QKD).

In this method, instead of each having a detector, Alice and Bob send their photons to a central node, referred to as Charlie. Charlie lets the photons pass through a beam splitter and measures them. The results can disclose the correlation between the bits, but not disclose their values, which remain secret. In this set-up, even if Charlie tries to cheat, the information will remain secure.

MDI-QKD has been experimentally demonstrated, but the rates at which information can be sent are too slow for real-world application, mostly due to the difficulty in creating indistinguishable particles from different lasers. To make it work, the laser pulses sent through Charlie's beam splitter need to be (relatively) long, restricting rates to a few hundred bits per second (bps) or less.

The method developed by the Cambridge researchers overcomes the problem by using a technique known as pulsed laser seeding, in which one laser beam injects photons into another. This makes the laser pulses more visible to Charlie by reducing the amount of 'time jitter' in the pulses, so that much shorter pulses can be used.

Pulsed laser seeding is also able to randomly change the phase of the laser beam at very high rates. The result of using this technique in a MDI-QKD setup would enable rates as high as 1 megabit per second, representing an improvement of two to six orders of magnitude over previous efforts.

"This protocol gives us the highest possible degree of security at very high clock rates," said Comandar. "It could point the way to a practical implementation of quantum cryptography."

Research paper: Quantum key distribution without detector vulnerabilities using optically seeded lasers


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Cambridge
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
China's ZTE executives to step down amid US sanctions row
Beijing (AFP) April 05, 2016
Chinese telecommunications giant ZTE will replace three top executives, the WSJ reported, in an apparent bid to see US restrictions on its business lifted after it was accused of violating sanctions against Iran. Washington slapped restrictions on ZTE and three linked companies last month for illicitly re-exporting controlled items from the United States to sanctioned countries, including Ir ... read more


CYBER WARS
S. Korea, US open missile shield talks

Israeli Air Force deploying 'David's Sling' missile defense system

US Missile Defense Outdated

China Interfering in THAAD Deployment Decision Process Preposterous

CYBER WARS
Marines receive fixed-wing rocket system variant

New army launcher successfully fires Hellfire, Sidewinder missiles

India acquiring Stinger missiles for its new helicopters

Lockheed Martin resumes production of TACMS missiles

CYBER WARS
Gremlins takes flight to provide air-recoverable unmanned air systems

Filling the gap at Air Force Reserve

Drones promise to improve ecological monitoring

Pentagon, Other Federal Agencies Use Drones for Domestic Surveillance

CYBER WARS
Harris supplies tactical radios to African country

In-orbit delivery of Laos' 1st satellite launched

Upgrade set for Britain's tactical communications system

Airbus continues operating German military satellites

CYBER WARS
Sweden upgrading Leopard 2 tanks

Pentagon announces new push for 'smart' fabrics

Souped-Up Nona-S Mortar System to Join Russian Troops Soon

Kalashnikov looks to civilian market to boost sales

CYBER WARS
Military spending rises again in 2015

Airbus to sell defence electronics arm to KKR for $1.2 billion

Lockheed Martin plans voluntary layoffs for 1,000

Defense Industry center opens in South Australia

CYBER WARS
US-Philippine war games begin as China warns 'outsiders'

NATO to switch 'assurance to deterrence' in E. Europe: US general

US to station armored brigade in eastern Europe from 2017: Pentagon

Obama defends NATO as a 'lynchpin'

CYBER WARS
Nanocrystal self-assembly sheds its secrets

Organic nanowires leave manmade technologies in the dust

Nanocage surfaces get 'makeover' in room temperature

Nanolight at the edge









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.