Novel combination of security proof techniques and protocols help solve the puzzle of high speed quantum key distribution for secure communication
A quantum information scientist from the National University of Singapore (NUS) has developed efficient “toolboxes” comprising theoretical tools and protocols for quantifying the security of high-speed quantum communication. Assistant Professor Charles Lim is part of an international team of experimental and theoretical scientists from Duke University, Ohio State University and Oak Ridge National Laboratory that has recently achieved a significant breakthrough in high-rate quantum secure communication.
Quantum computers are powerful machines that can break today’s most prevalent encryption technologies in minutes. Crucially, recent progress in quantum computing has indicated that this threat is no longer theoretical but real, and large-scale quantum computers are now becoming a reality. If successfully implemented, these computers could be exploited to decrypt any organisation’s trade secrets, confidential communication, and sensitive data retrospectively or remotely.
Quantum key distribution (QKD) is an emerging quantum technology that enables the establishment of secret keys between two or more parties in an untrusted network. Importantly, unlike conventional encryption techniques, the security of QKD is mathematically unbreakable — it is based solely on the established laws of nature. As such, messages and data encrypted using QKD keys are completely secure against any attacks on the communication channel. For this reason, QKD is widely seen as the solution that will completely resolve the security threats posed by future quantum computers.
Today, QKD technology is relatively mature and there are now several companies selling QKD systems. Very recently, researchers from China have managed to distribute QKD keys to two ground stations located 1200 kilometres apart. However, despite these major developments and advances, practical QKD systems still face some inherent limitations. One major limitation is the secret key throughput — current QKD systems are only able to transmit 10,000 to 100,000 secret bits per second. This limitation is largely due to the choice of quantum information basis: many QKD systems are still using low-dimensional information basis, such as the polarisation basis, to encode quantum information.
“Poor secret key rates arising from current QKD implementations have been a major bottleneck affecting the use of quantum secure communication on a wider scale. For practical applications, such systems need to be able to generate secret key rates in the order of megabits per second to meet today’s digital communication requirements,” said Asst Prof Lim, who is from the Department of Electrical and Computer Engineering at NUS Faculty of Engineering as well as Centre for Quantum Technologies at NUS.
In the study, the research team developed a QKD system based on time and phase bases which allows for more secret bits to be packed into a single photon. Notably, the team had achieved two secret bits in a single photon, with a secret key rate of 26.2 megabits per second.
The findings of the study were published online in scientific journal Science Advances on 24 November 2017.
Encoding quantum information in the time and phase bases is a promising approach that is highly robust against typical optical channel disturbances and yet scalable in the information dimension. In this approach, secret bits are encoded in the arrival time of single photons, while the complementary phase states — for measuring information leakages — are encoded in the relative phases of the time states. This encoding technique, in principle, could allow one to pack arbitrarily many bits into a single photon and generate extremely high secret key rates for QKD. However, implementing such high-dimensional systems is technically challenging and tools for quantifying the practical security of high-dimensional QKD are limited.
To overcome these problems for their QKD system, the researchers used a novel combination of security proof techniques developed by Asst Prof Lim and an interferometry technique by Professor Daniel Gauthier’s research group from Duke University and Ohio State University. Asst Prof Lim was involved in the protocol design of the QKD system as well as proving the security of the protocol using quantum information theory.
“Our newly developed theoretical and experimental techniques have resolved some of the major challenges for high-dimensional QKD systems based on time-bin encoding, and can potentially be used for image and video encryption, as well as data transfer involving large encrypted databases. This will help pave the way for high-dimensional quantum information processing,” added Asst Prof Lim, who is one of the co-corresponding authors of the study.
The Latest on: Quantum cybersecurity
- Cybersecurity attacks not only threaten data, but also lives: reporton January 22, 2020 at 9:57 am
Researchers found that cybersecurity attacks within the healthcare industry ... hospitals and health systems should consider implementing different artificial intelligence and quantum computing.
- Data Security Innovator, Secure Channels, Chooses Thales to Provide Key Management and Software Licensing Platform For IoT Security Solutionon January 21, 2020 at 10:00 pm
Thales' encryption key management will provide data security innovator Secure Channels with secure quantum-resilient cybersecurity technology. Sentinel EMS, Thales' software licensing platform aims to ...
- University of Chicago Now Offers Retraining Certificates, Curriculum to Build Quantum Workforceon January 21, 2020 at 8:30 am
The rapidly emerging field of quantum technology has the power to transform cybersecurity, materials development, and computing, but jobs within the field require specific knowledge of quantum science ...
- What the new China trade deal really means, according to cybersecurity expertson January 21, 2020 at 6:00 am
by which China intends to become the global market leader in everything from quantum computing to artificial intelligence. And the quickest way to get there? Stealing technology from others, of course ...
- Quantum computing: Opening new realms of possibilitieson January 21, 2020 at 3:40 am
Researchers hope to use quantum principles to create an ultra-powerful computer that would solve problems that conventional computers cannot — from improving cybersecurity and modeling chemical ...
- A mega quantum technology mission is in the offingon January 18, 2020 at 6:04 pm
... pursued domain of quantum technologies in a big way with a new National Mission on Quantum Technologies, according to a senior official of the Department of Science and Technology. This area is ...
- CEO Runs Her Cybersecurity Company From Sweet Home Chicagoon January 18, 2020 at 4:14 pm
Ning Wang has traveled a long road to become CEO of Offensive Security, a company offering highly specialized training in cybersecurity for clients ranging from the U. S. Army to Amazon.
- Five Ways Business Directors Can Prepare For The Future Of Cybersecurityon January 16, 2020 at 7:23 pm
By Stefan Deutscher, Partner and Associate Director for Cybersecurity and IT Infrastructure, Boston Consulting Group, and Daniel Dobrygowski, Head of Governance and Policy, World Economic Forum Centre ...
- Quantum Computing Market Share to Touch 25.30% CAGR by 2030 with Top Key Players: IBM, Intel Corporation, Google, Microsoft Corporationon January 16, 2020 at 1:45 am
The global quantum computing market is driven by factors such as better cyber security when compared with traditional cyber security solutions. As multiple codes are available in quantum computing, ...
- The dark side of IoT, AI and quantum computing: Hacking, data breaches and existential threaton January 15, 2020 at 2:41 am
A warning is also issued about the unintended consequences of quantum computing, should it arrive at some point over the course of the next decade, as some suggest. While, like other innovations, it ...
via Google News and Bing News