via Fifth Domain
Novel combination of security proof techniques and protocols help solve the puzzle of high speed quantum key distribution for secure communication
A quantum information scientist from the National University of Singapore (NUS) has developed efficient “toolboxes” comprising theoretical tools and protocols for quantifying the security of high-speed quantum communication. Assistant Professor Charles Lim is part of an international team of experimental and theoretical scientists from Duke University, Ohio State University and Oak Ridge National Laboratory that has recently achieved a significant breakthrough in high-rate quantum secure communication.
Quantum computers are powerful machines that can break today’s most prevalent encryption technologies in minutes. Crucially, recent progress in quantum computing has indicated that this threat is no longer theoretical but real, and large-scale quantum computers are now becoming a reality. If successfully implemented, these computers could be exploited to decrypt any organisation’s trade secrets, confidential communication, and sensitive data retrospectively or remotely.
Quantum key distribution (QKD) is an emerging quantum technology that enables the establishment of secret keys between two or more parties in an untrusted network. Importantly, unlike conventional encryption techniques, the security of QKD is mathematically unbreakable — it is based solely on the established laws of nature. As such, messages and data encrypted using QKD keys are completely secure against any attacks on the communication channel. For this reason, QKD is widely seen as the solution that will completely resolve the security threats posed by future quantum computers.
Today, QKD technology is relatively mature and there are now several companies selling QKD systems. Very recently, researchers from China have managed to distribute QKD keys to two ground stations located 1200 kilometres apart. However, despite these major developments and advances, practical QKD systems still face some inherent limitations. One major limitation is the secret key throughput — current QKD systems are only able to transmit 10,000 to 100,000 secret bits per second. This limitation is largely due to the choice of quantum information basis: many QKD systems are still using low-dimensional information basis, such as the polarisation basis, to encode quantum information.
“Poor secret key rates arising from current QKD implementations have been a major bottleneck affecting the use of quantum secure communication on a wider scale. For practical applications, such systems need to be able to generate secret key rates in the order of megabits per second to meet today’s digital communication requirements,” said Asst Prof Lim, who is from the Department of Electrical and Computer Engineering at NUS Faculty of Engineering as well as Centre for Quantum Technologies at NUS.
In the study, the research team developed a QKD system based on time and phase bases which allows for more secret bits to be packed into a single photon. Notably, the team had achieved two secret bits in a single photon, with a secret key rate of 26.2 megabits per second.
The findings of the study were published online in scientific journal Science Advances on 24 November 2017.
Time-bin encoding
Encoding quantum information in the time and phase bases is a promising approach that is highly robust against typical optical channel disturbances and yet scalable in the information dimension. In this approach, secret bits are encoded in the arrival time of single photons, while the complementary phase states — for measuring information leakages — are encoded in the relative phases of the time states. This encoding technique, in principle, could allow one to pack arbitrarily many bits into a single photon and generate extremely high secret key rates for QKD. However, implementing such high-dimensional systems is technically challenging and tools for quantifying the practical security of high-dimensional QKD are limited.
To overcome these problems for their QKD system, the researchers used a novel combination of security proof techniques developed by Asst Prof Lim and an interferometry technique by Professor Daniel Gauthier’s research group from Duke University and Ohio State University. Asst Prof Lim was involved in the protocol design of the QKD system as well as proving the security of the protocol using quantum information theory.
“Our newly developed theoretical and experimental techniques have resolved some of the major challenges for high-dimensional QKD systems based on time-bin encoding, and can potentially be used for image and video encryption, as well as data transfer involving large encrypted databases. This will help pave the way for high-dimensional quantum information processing,” added Asst Prof Lim, who is one of the co-corresponding authors of the study.
Learn more: NUS scientist develops “toolboxes” for quantum cybersecurity
The Latest on: Quantum cybersecurity
- Cybersecurity centers coming to 6 Black collegeson May 15, 2022 at 9:51 am
“It will further enhance our ongoing activities on several key areas, including cybersecurity, data science analytics, cloud computing, IOT, blockchain, design thinking, quantum computing, and ...
- IBM: 6 Black colleges getting cybersecurity centerson May 15, 2022 at 6:39 am
Six historically Black universities in five Southern states will be getting the first IBM cybersecurity centers aimed at training underrepresented communities, the company said.
- Quantum Technology: Applications in Cybersecurity for Power Utilitieson May 12, 2022 at 4:39 am
Since many utilities design their cybersecurity systems only on the basis of the latest attacks, they lack the ability to guard against future attacks. In the instance of encryption-based systems, ...
- Reps. Mace, Khanna and Connolly on Passage of The Quantum Cybersecurity Preparedness Acton May 11, 2022 at 5:00 pm
The Quantum Cybersecurity Preparedness Act from Rep. Nancy Mace (right), Rep. Ro Khanna (D-CA) and Rep. Gerry Connolly (D-VA) on Wednesday passed out of the Oversight and Government Reform Committee ...
- PreScouter Report: The Time to Prepare for Quantum Disruption is Nowon May 11, 2022 at 7:19 am
PreScouter, a Chicago-based research intelligence company, has compiled a new Intelligence Brief that looks at how the development of quantum capabilities requires enhanced encryption and highlights ...
- Is the US setting the pace for quantum computing in cybersecurity?on May 9, 2022 at 10:16 pm
For the US, the use of quantum computing in cybersecurity ensures the work done is safe and organizations’ data not being targeted by nation-states ...
- White House to boost support for quantum technology while boosting cybersecurityon May 4, 2022 at 4:19 am
May 4 (Reuters) - The White House on Wednesday will announce a slate of measures to support quantum technology in the United States while laying out steps to boost cybersecurity to defend against the ...
- How to unlock the cybersecurity potential of quantum computerson April 27, 2022 at 4:17 am
But while quantum computers offer an unparalleled opportunity given their power, this potential also brings with it a severe cyber security threat which makes quantum unviable without first being ...
- Security Teams Should Be Addressing Quantum Cyber-Threats Nowon April 26, 2022 at 2:30 am
Addressing quantum cyber-threats should already be a high priority for cybersecurity professionals, according to Duncan Jones, head of cybersecurity at Quantinuum, speaking during the ISC(²) Secure ...
- Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tightenon April 22, 2022 at 6:00 am
Of course, decision-makers at companies will need to keep up with what quantum computing means for them, and this can be difficult as getting buy-in, or even a basic understanding, for cybersecurity ...
via Google News and Bing News