{"id":18756,"date":"2014-04-29T16:53:40","date_gmt":"2014-04-29T20:53:40","guid":{"rendered":"http:\/\/www.opensource.im\/?p=18756"},"modified":"2014-04-29T16:53:40","modified_gmt":"2014-04-29T20:53:40","slug":"quantum-cryptography-done-over-shared-data-line","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/quantum-cryptography-done-over-shared-data-line.php","title":{"rendered":"Quantum Cryptography Done Over Shared Data Line"},"content":{"rendered":"<p><p>    Researchers have sent quantum keys over a \"lit\" fiber-optic    network, a step towards using quantum cryptography on the    networks businesses and institutions use every day.  <\/p>\n<p>    A group of U.K.-based research groups last week said the    demonstration opens the door to more research that will make    the technology more commercially viable. The researchers were    from Toshiba Research Europe, BT, ADVA Optical    Networking, and the U.K.'s National Physical Laboratory    (NPL).  <\/p>\n<p>    In quantum    cryptography, the keys to unlock the contents of    communications are represented with photons. It starts with a    laser that sends a pair of photons over a fiber-optic    network.The polarization of photonswhether theyre    oscillating horizontally or vertically, for examplecan be    detected by a receiver and read as bits, which are used to    generate the same encryption key at both ends of the network    connection. If an interloper attempts to intercept the keys to    decrypt a message, the receiver will be able to detect a    change, according to the laws of quantum mechanics. If that    happens, the receiver can reject the keys and the message stays    encrypted.  <\/p>\n<p>    Until now,     quantum key distribution (QKD) has been done over dark    fiber, or unused optical fiber lines, which means that a    separate fiber optic line is needed for transmitting other    data. But dark fiber networks are not always available and are    expensive. Being able to transmit quantum keys over a lit fiber    network means that institutions and businesses will be able to    run quantum cryptography over their existing networking    infrastructure, the researchers said.  <\/p>\n<p>    \"Using techniques to filter out noise    from the very weak quantum signals, we've shown that QKD can be    operated on optical fibers installed in the ground and carrying    conventional data signals,\" said Andrew Shields from Toshiba    Research Europe in a     statement.  <\/p>\n<p>    The National Physics Laboratory developed a series of    measurements for identifying individual particles of light from    the stream of photons sent over a fiber-optic line. That will    allow the system to detect attempts to intercept the    transmission of keys, which should improve customer confidence    in quantum cryptography, said Alastair Sinclair from the    National Physics Laboratory in a statement.  <\/p>\n<p>    The test was conducted over a live BT fiber link between its    research campus in Suffolk and another BT site in Ipswich, U.K.    In an     interview with Nature, Toshiba's Shields said the    quantum key distribution was done alongside data transmitted at    40 gigabits per second, the fastest multiplexing of regular    data with quantum keys to date. But he notes that implementing    QKD in the \"real world\" is more challenging than a laboratory    environment because there are environmental fluctuations that    can cause data loss in fiber lines.  <\/p>\n<p>    Another technical challenge facing widespread use of QKD is the    distance keys can be sent. Light pulses sent over a fiber optic    line fade, which means that key distribution can only be done    at a distance of about 100 kilometers. (See     Long-Distance Quantum Cryptography.) But as governments and    companies seek out the most secure ways to send data, quantum    cryptography could become an appealing option.  <\/p>\n<p>      IEEE Spectrums general technology blog, featuring      news, analysis, and opinions about engineering, consumer      electronics, and technology and society, from the editorial      staff and freelance contributors.    <\/p>\n<p>      Sign up for the Tech Alert newsletter and receive      ground-breaking technology and science news from IEEE      Spectrum every Thursday.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/spectrum.ieee.org\/tech-talk\/computing\/networks\/quantum-cryptography-done-over-shared-data-line\/RK=0\/RS=FhVYkzM.jRzHTHXzA_pajxUBTS4-\" title=\"Quantum Cryptography Done Over Shared Data Line\">Quantum Cryptography Done Over Shared Data Line<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers have sent quantum keys over a \"lit\" fiber-optic network, a step towards using quantum cryptography on the networks businesses and institutions use every day. A group of U.K.-based research groups last week said the demonstration opens the door to more research that will make the technology more commercially viable. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-18756","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/18756"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=18756"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/18756\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=18756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=18756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=18756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}