More secure communications thanks to quantum physics

One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren't surprised by this news; such a computer could crack the encryption that is commonly used today in no time and would therefore be highly attractive for the NSA.

Professor Thomas Walther of the Institute of Applied Physics at the Technical University of Darmstadt is convinced that "Sooner or later, the quantum computer will arrive." Yet the quantum physicist is not worried. After all, he knows of an antidote: so-called quantum cryptography. This also uses the bizarre rules of quantum physics, but not to decrypt messages at a record pace. Quite the opposite -- to encrypt it in a way that can not be cracked by a quantum computer. To do this, a "key" that depends on the laws of quantum mechanics has to be exchanged between the communication partners; this then serves to encrypt the message. Physicists throughout the world are perfecting quantum cryptography to make it suitable for particularly security-sensitive applications, such as for banking transactions or tap-proof communications. Walther's Ph.D. student Sabine Euler is one of them.

As early as the 1980s, physicists Charles Bennett and Gilles Brassard thought about how quantum physics could help transfer keys while avoiding eavesdropping. Something similar to Morse code is used, consisting of a sequence of light signals from individual light particles (photons). The information is in the different polarizations of successive photons. Eavesdropping is impossible due to the quantum nature of photons. Any eavesdropper will inevitably be discovered because the eavesdropper needs to do measurements on the photons, and these measurements will always be noticed.

"That's the theory" says Walther. However, there are ways to listen without being noticed in practice. This has been demonstrated by hackers who specialize in quantum cryptography based on systems already available on the market. "Commercial systems have always relinquished a little bit of security in the past," says Walther. In order to make the protocol of Bennett and Brassard reality, you need, for example, light sources that are can be controlled so finely that they emit single photons in succession. Usually, a laser that is weakened so much that it emits single photons serves as the light source. "But sometimes two photons can come out simultaneously, which might help a potential eavesdropper to remain unnoticed" says Walther. The eavesdropper could intercept the second photon and transmit the first one.

Therefore, the team led by Sabine Euler uses a light source that transmits a signal when it sends a single photon; this signal can be used to select only the individually transmitted photons for communication. Nevertheless, there are still vulnerabilities. If the system changes the polarization of the light particles during coding, for example, the power consumption varies or the time interval of the pulses changes slightly. "An eavesdropper could tap this information and read the message without the sender and receiver noticing" explains Walther. Sabine Euler and her colleagues at the Institute of Applied Physics are trying to eliminate these vulnerabilities. "They are demonstrating a lot of creativity here" says Walther approvingly. Thanks to such research, it will be harder and harder for hackers to take advantage of vulnerabilities in quantum cryptography systems.

The TU Darmstadt quantum physicists want to make quantum cryptography not only more secure, but more manageable at the same time. "In a network in which many users wish to communicate securely with each other, the technology must be affordable," he says. Therefore, his team develops its systems in such a manner that they are as simple as possible and can be miniaturized.

The research team is part of the Center for Advanced Security Research Darmstadt (CASED), in which the TU Darmstadt, the Fraunhofer Institute for Secure Information Technology and the University of Darmstadt combine their expertise in current and future IT security issues. Over 200 scientists conduct research in CASED, funded by the State Initiative for Economic and Academic Excellence (LOEWE) of the Hessian Ministry for Science and the Arts. "We also exchange information with computer scientists, which is very exciting," says Walther.

After all, the computer science experts deal with many of the same issues as Walther's quantum physicists. For example, Johannes Buchmann of the department of Computer Science at the TU Darmstadt is also working on encryption methods that theoretically can not be cracked by a quantum computer. However, these are not based on quantum physics phenomena, but rather on an unsolvable math problem.

Therefore, it may well be that the answer to the first code-cracking quantum computer comes from Darmstadt.

Bizarre quantum physics and encryption

More:
More secure communications thanks to quantum physics

Nerlens Noel Tweets Date for Potential NBA Debut

David Liam Kyle/Getty Images

Nerlens Noel may have majored in cryptography while at Kentucky.

In a mysterious tweet, the Philadelphia 76ers rookie revealed apotential date for his NBA debut:

Friday, April 4, Noel's Sixers are traveling to face the Boston Celtics. Not so coincidentally, Noel hails from the Boston area. He was born in Malden,Massachusetts.

Using that logic, Noel's code isn't difficult to decipher.

Sixers coach Brett Brown previously indicated Noel wouldn't play this season, per FOX Sports' Sam Amico. But that was October. Things have changed. And I'm not just commenting on Philly's shallow, nigh-empty pool of NBA-caliber talent.

"There's a possibility," Noel told SiriusXM NBA Radio on playing this season in December, via ESPN.com.

More recently, Brown preached cautious optimism regarding his status moving forward.

"I dont want to paint the wrong picture, but he is going against bodies a little bit more," he explained, according to CSN Phlly's Dei Lynam. "He is moving in that direction."

If Noel is healthyenough to play, why not let him play?

Original post:
Nerlens Noel Tweets Date for Potential NBA Debut

REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. – Video


REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography.
SYNOPSIS When 20th century begun, a major shift took place in science. Scientists started making experiments with an unprecedented precision. Fiddle with sin...

By: Centre for Quantum Technologies

Read the rest here:
REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video

Quantum Cryptography Conquers Noise Problem

Encoded photons sent a record distance along busy optical fibers

N. Gregory/Alamy

Its hard to stand out from the crowd particularly if you are a single photon in a sea of millions in an optical fiber. Because of that, ultra-secure quantum-encryption systems that encode signals into a series of single photons have so far been unable to piggyback on existing telecommunications lines. But now, physicists using a technique for detecting dim light signals have transmitted a quantum key along 90 kilometers of noisy optical fiber. The feat could see quantum cryptography finally enter the mainstream.

You cannot measure a quantum system without noticeably disrupting it. That means that two people can encode an encryption key for bank transfers, for instance into a series of photons and share it, safe in the knowledge that any eavesdropper will trip the systems alarms. But such systems have not been able to transmit keys along telecommunications lines, because other data traffic swamps the encoded signal. As a result, quantum cryptography has had only niche applications, such as connecting offices to nearby back-up sites using expensive 'dark' fibers that carry no other signals. This is really the bottleneck for quantum cryptography, says physicist Nicolas Gisin, a scientific adviser at quantum-cryptography company ID Quantique in Geneva, Switzerland.

Physicists have attempted to solve the problem by sending photons through a shared fiber along a 'quantum channel' at one characteristic wavelength. The trouble is that the fiber scatters light from the normal data traffic into that wavelength, polluting the quantum channel with stray photons. Andrew Shields, a physicist at the Toshiba Cambridge Research Laboratory, UK, and his colleagues have now developed a detector that picks out photons from this channel only if they strike it at a precise instant, calculated on the basis of when the encoded photons were sent. The team publishes its results in Physics Review X.

Just in time Designing a detector with such a sharp time focus was tough, explains Shields. Standard detectors use semiconducting devices that create an avalanche of electrical charge when struck by a single photon. But it usually takes more than one nanosecond (109 seconds) for the avalanche to grow large enough to stand out against the detectors internal electrical hiss much longer than the narrow window of 100 picoseconds (1010 seconds) needed to filter a single photon from a crowd.

The teams self-differentiating detector activates for 100 picoseconds, every nanosecond. The weak charge triggered by a photon strike in this short interval would not normally stand out, but the detector measures the difference between the signal recorded during one operational cycle and the signal from the preceding cycle when no matching photon was likely to be detected. This cancels out the background hum. Using this device, the team has transmitted a quantum key along a 90-kilometer fiber, which also carried noisy data at 1 billion bits per second in both directions a rate typical of a telecommunications fiber. The team now intends to test the technique on a real telecommunications line.

Gisins team has independently developed a photon detector with a similar time window, which they presented at the QCrypt 2012 meeting at the Center for Quantum Technologies in Singapore in September. However, Gisin has calculated that such a technique cannot be used to transmit quantum signals beyond the range of a large city of 100 kilometers. Scattering accumulates over distance, so there would eventually be so many stray photons that it would be impossible to filter them out, even with a precisely timed detector.

Still, 90 kilometers is a world record that is a big step forward in demonstrating the applicability of quantum cryptography in real-world telecommunications infrastructures, says Vicente Martn, a physicist at the Technical University of Madrid.

This article is reproduced with permission from the magazine Nature. The article was first published on November 20, 2012.

Excerpt from:
Quantum Cryptography Conquers Noise Problem

Classical Computing Embraces Quantum Ideas

"Thinking quantumly" can lead to new insights into long-standing problems in classical computer science, mathematics and cryptography, regardless of whether quantum computers ever materialize

Courtesy of IBM Research

FromSimons Science News(find original story here).

Someday, quantum computers may be able to solve complex optimization problems, quickly mine huge data sets, simulate the kind of physics experiments that currently require billion-dollar particle accelerators, and accomplish many other tasks beyond the scope of present-day computers. That is, if they are ever built. But even as daunting technical challenges keep the dream at bay, theorists are increasingly putting the ideas and techniques of quantum computing to work solving deep, long-standing problems in classical computer science, mathematics and cryptography.

There are quite vigorous debates about whether quantum computers will ever actually be built, said Chris Peikert, a cryptographer and computer scientist at Georgia Institute of Technology. But thats a separate question from whether quantum techniques or quantum algorithms can help you solve problems in new ways.

In recent years, quantum ideas have helped researchersprove the securityof promising data encryption schemes called lattice-based cryptosystems, some applications of which can shroud users sensitive information, such as DNA, even from the companies that process it. A quantum computing proof also led toa formula for the minimum length of error-correcting codes, which are safeguards against data corruption.

Quantum ideas have also inspired a number of important theoretical results, such asa refutation of an old, erroneous algorithmthat claimed to efficiently solve the famously difficult traveling salesman problem, which asks how to find the fastest route through multiple cities.

If it only happened once it would be a coincidence, but there are so many instances when we think quantumly and come up with a proof, said Oded Regev, a computer scientist at New York University.

This recurring theme has led some researchers to argue that quantum computing is not an esoteric subfield of computer science, but rather a generalization of classical computing, in much the same way that polygons are a generalization of triangles. Just as polygons can have any number of sides while triangles only have three, quantum computers can perform operations represented by any numbers (positive or negative, real or imaginary), while operations on classical computers use only nonnegative real numbers.

As the more general case, quantum ideas are a powerful tool in developing more specific classical computing proofs. There area number of classical problemsthat have nothing to do with quantum, but that are most easily analyzed by generalizing to the quantum level, proving something using quantum information theory, and scaling back the result to the classical level, said Ronald de Wolf, a theoretical computer scientist at the Dutch Centre for Mathematics and Computer Science.

Go here to see the original:
Classical Computing Embraces Quantum Ideas