About Me


About You If you want to add something to this page or answer a question. Click on Just Vent Ask Question, Comment or Tell Stories link on left panel.

Did government scientists really create a secret quantum internet?

February 24, 2014

Did government scientists really create a secret quantum internet?

Did government scientists really create a secret quantum internet?1Expand

No, not really. But for two years, researchers at Los Alamos National Labs have been working on something they call network-centric quantum communications — and this could usher in the next generation of hyper-secure, scalable, and affordable quantum cryptographic techniques. We spoke to the lead researcher to find out more.

Earlier this week, MIT’s Technology Review published an article claiming that a “government lab” has been secretly operating a “quantum internet” for over two years. Several other outlets ran with the story, including Popular Science and Wired.

But this idea, that a government-sponsored lab was secretly hacking away at the the Holy Grail of internet security, seemed too good to be true. So we contacted the lead researcher, Richard Hughes, to learn more about the project.

'Not a phrase we used’

“The MIT article doesn’t accurately characterize what we’ve been doing,” he told io9. “We are not part of the Internet, and that phrase — a quantum internet — is not something we used in our paper."

Rather, Hughes’s team created a network test bed for doing quantum cryptography over an optical fiber network. They’ve been running it to test their protocols and its performance, with the hope of using it to protect critical infrastructure, such as the electrical grid.

“Really, there’s nothing unusual about what’s been going on here for the past two-plus years,” says Hughes. “It’s just that we don’t tend to write papers until we have something interesting to report.”

As for the accusations of secrecy, the Los Alamos National Labs team was delayed in making their work public because they were filing for multiple patent applications on the technology — of which there were 27 U.S. and foreign patents to secure.

Quantum crypto

So, while it may not be a true quantum internet, it’s a system that comes pretty damned close.

Did government scientists really create a secret quantum internet?

And indeed, UC Berkeley security expert Galina A. Schwartz told me that, while it’s not a true quantum internet, it's a breakthrough that shows we’re well on our way to getting there. “It is exciting,” she told io9, “and it is coming in the future, but not exactly tomorrow.” These devices, she says, are still some way from commercial reality.

By strict definition, a true quantum internet would allow for perfectly secure communications from any point in the network to another. Quantum cryptography would, in theory, make the network secure from wiretaps, eavesdropping, hacking — anything. So long as the one-time pad is kept a secret — a randomly generated and lengthy key that can only be used once — point-to-point communication is impenetrable. Once refined, cryptography of this strength could be used to secure critical infrastructure and protect the electric grid from malicious attacks.

One-time-pads are generated by a process called quantum key distribution (QKD), and it relies on the spooky power of the Heisenberg Uncertainty Principle to produce shared keys that are only known to two parties, and which are subsequently used to securely exchange messages.

And indeed, it’s this point-to-point limitation that has led some skeptics to believe that a quantum internet is impossible. Others contend that the intense costs and logistical requirements of having to overhaul the world’s IT infrastructure make it a non-starter.

Did government scientists really create a secret quantum internet?

But this is where Hughes and his team got clever. Knowing that a peer-to-peer quantum internet is impossible (at least by today’s level of comprehension), the Los Alamos lab created a quantum hub-and-spoke digital communications network. What’s more, the architecture is potentially Internet compatible; it runs off standard fiber optic cables that connect to off-the-shelf PCs running the Windows operating system.

“We see this attribute as a major innovation over what’s been done before in quantum cryptography networks — and it’s designed from the ground up to be something that’s reasonably evolved over top of what’s already deployed out there,” says Hughes. “We are consistent with conventional optical fiber network architectures and conventional cryptographic trust architectures.”

Network-centric quantum communications

The system is a bit clunky, and not peer-to-peer, but it exhibits some fascinating characteristics.

To make it work, the network has a core server computer at the center of it. Then, like the spokes jutting out from the center of a wheel, optical fibers are connected to node computers. These nodes are not connected to each other — but all they share the same hub at the center.

Did government scientists really create a secret quantum internet?

For communication to happen, each client node is equipped with a quantum smart card, or QKarD, that’s the size of a door key. The central hub has optical fiber connected into it, along with a small solid-state single photon detector that needs to be cooled below room temperature.

The QKarD allow the nodes to write quantum bits, but they can only read conventional bits. Only the hub is able to both read and write quantum bits. Data travels from each node to the hub along a secure one-time pad enabled connection. So, if node A wants to communicate with node B, node A sends a message to the central hub, which in turn routes the data to node B using secure classical connection enabled by a different one-time pad.

And yes, you guessed correctly: If the security of the hub is compromised, the entire thing falls apart.

“The way the testbed works today is that we have three client devices talking over optical fiber to a server node,” says Hughes.

By concentrating the more expensive and more technologically demanding components in the central server, the team was able to amortize that cost and complexity over all the nodes in the network. Other approaches, on the other hand, require detectors at every node, which is expensive and hard to deploy.

“This is something that’s far beyond what’s been done in the past with quantum cryptography,” Hughes told us. “But what we have is an experimental testbed — one that isn’t in any sense operational.” Last December, the team also demonstrated technology that can secure the control data and commands of the electrical grid against a potential attacker — but again, not in an operational environment.

’Quantum cryptography is bunk’

But not everyone is convinced that quantum cryptography represents the future of internet security — at least not immediately.

“Cyber-physical systems operating large scale critical infrastructures such as the electric grid are comprised of products from dozens — even hundreds — of manufacturers,” Schwartz told us. “Will they suddenly switch from non-quantum crypto-solutions to employing quantum cryptography in their products — especially given that malicious intruders focus on attacking the ‘weakest links’ of CPSs?”

In fact, existing security solutions based on conventional cryptography are not at all the ‘weakest link’ of CPS security.

“Manufacturers would rather invest in improving security of the weakest links of their products,” she says. “Many products are known to be notoriously insecure, but still remain in use: proprietary protocols still prevail in electric grid, despite the fact that they are more prone to design failures than public protocols.”

And as Schwartz reminded us, no system with human participants is ‘truly’ secure: “Social engineering will exist 'till humans are extinct.”

We also reached out to Ross Anderson, a professor at the University of Cambridge's Computer Laboratory, and author of the paper, “Why quantum computing is hard — and quantum cryptography is not provably secure.”

After we brought Hughes’s paper to his attention, he responded in an email:

The problem with protecting critical infrastructure isn't that crypto is hard. Crypto is easy; we have protocols like TLS, IPSEC, SSH and Kerberos that are available on pretty well all modern machines. The problem is that a typical power network has a huge diversity of equipment, much of it dating back decades, and it's prohibitively expensive to replace it all with new stuff. As a result, the only feasible way to protect the typical utility is reparameterization; ensuring that the control networks are separated from the Internet using robust firewalls. Cryptography is not the appropriate technology in most cases and even where it is we have cheap simple stuff that works. The authors' hope to sell expensive, flaky quantum crypto into critical infrastructure markets is bizarre. The words "snowflake" and "hell" spring to mind.

In a follow-up email, Anderson put it more succinctly: “No such thing. Quantum crypto is bunk.”

I let Hughes read Anderson’s email, and we talked about it.

“Yeah, I don’t agree with that — and I guess our Department of Energy sponsors don’t agree with that, either, seeing as they’re funding us to do this stuff,” he quipped. “Look, it’s certainly true that there’s a huge installed base of devices out there controlling the grid. And often these things are installed and expected to operate for 20 to 30 years. But they’ve been installed without security on them, so you have an issue of wanting to put in a retrofit to secure it.”

But it’s not true, argues Hughes, that the current state of cryptography can potentially meet the given requirements, many of which have been analyzed by multiple research groups from around the world.

“You just cannot meet the demands for the low latency that’s necessary to control theses things,” he says, “This is why the DOE is interested in funding us, because we can both meet the security and the latency requirements.”

Furthermore, he says, quantum cryptography has an attribute known as forward security — where, if a design weakness is found in the future, and in contrast to present day cryptography, it prevents anything previously done with the hardware from being retroactively vulnerable.

“And that’s absolutely not true with current day public key cryptography,” Hughes told us.

And as for the notion that this is always going to be expensive, and that these initiatives will require a revolution in the existing communications structure, Hughes says that’s just not correct.

“By harnessing these manufacturing techniques that are now being used in integrated photonics, we can get the cost of these transmitter devices down to the couple-of-hundred-dollar range by producing them in large quantities, thus making it reasonable in terms of affordability and deployability. And we can be applied as a retrofit on top of the existing fiber infrastructure — we can deploy on what’s already out there.”

In regards to the claim that everything can be done with pre-existing firewalls, Hughes admits that multiple approaches are warranted, but there are still problems. “There is an active research direction there, but it’s not clear if this is the absolute panacea that Anderson suggested.”

The future

Looking ahead, Hughes hopes to see his technology used in the critical infrastructure sector and for securing the electric grid. The potential for hackers to attack the grid, he says, is very real — one that could cripple the economy.

Hughes also sees the potential for securing commands and data, which have tight requirements for latency, often within a few milliseconds to prevent physical damage. It could also work in the financial sector and the burgeoning practice of high speed trading. And indeed, the amount of time it takes to apply cryptography is becoming a significant factor in how fast trades can be executed.

His team is also working on a next generation quantum transmitter QKarD, one that’s much smaller than what they’re currently using. Once miniaturized, these cards could fit inside a mobile phone or tablet device. He envisions a docking station for a handheld device that, in addition to charging the battery, would feed the device’s memory with cryptographic key material that can be shared with a central server in the enterprise. So, when a user undocks the device and carries it around, those secure keys could be used to communicate with friends or colleagues, or other parts of the same network. And it would have all the advantages of quantum security, though without an optical fiber cable.

Wireless quantum-level security in handheld devices? Yes, please.

Top image: Anteromite/Shutterstock; Los Alamos National Labs.

 

Freezing Light

February 24, 2014

Scientists ‘freeze’ light for an entire minute

Scientists ‘freeze’ light for an entire minuteExpand

In what could prove to be a major breakthrough in quantum memory storage and information processing, German researchers have frozen the fastest thing in the universe: light. And they did so for a record-breaking one minute.


Continue reading...
 

Cards for the guy from yahoo group posting his question

February 18, 2014












Continue reading...
 

Bike To Work Day

February 18, 2014
National Bike To Work Day

CSPAN Washington Journal segment 1 on 2/18/2014 topic was should we put federal dollars toward commuting by bike http://series.c-span.org/Journal/#

Watching this program this morning made me think of how this could help others with transportation problems.  Answers to this questions to the groups.

How can i get my license reinstated from child support suspension?

  • emgee answered 2 years ago ...

Continue reading...
 

Luck Luck Don't Give A... HOOT

November 6, 2013
"Luck happens to people of action who are ready to capitalize on the opportunity that happens to them." ~ The Richest Man In Babylon

Continue reading...
 

Geat Site For News

October 30, 2013
Thanks Barbara Foster for sharing this site with me

http://www.drudge.com/


Continue reading...
 

Enjoyed Listening to this radio show

October 30, 2013
http://www.resistanceradio.com/

Resistance Radio 10-26-13 Show Archive

Resistance Radio with Jared Grifoni with special guest Peter Richter, Vice-Chairman of the Libertarian Party of Collier County and owner of Richter Consulting. Jared exposes more of the domestic spying operations of the NSA, courtesy of Edward Snowden, and the hypocrisy of the Republicans and Democrats on the issue. Jared also discusses the Thomas Jeffe...


Continue reading...
 

Thomas Jefferson Education

October 30, 2013
Thank You Peter Richter for telling me about this
http://www.tjed.org/

What dedicated parent hasn’t thought: “My kids deserve better than this…but this is all I know!”

croppedInspiredBoy What Is TJEd?We often get so concerned with “what” to teach that we neglect the “how” and “why.” Yet these make all the difference between success and failure. Understanding them creates happier, more empowered children.

TJEd gives you the “how” and the “why” to make the “what” more powerful, more me...


Continue reading...
 

Am I the only one Allergic to Red #40 or other Food Dyes?

October 30, 2013

These Dyes Are Hurting Us, and they are in everything.  This page below is a good place to reference if your curious about what foods contain these  synthetic compounds.  Red #40 is not good for me.  I have been allergic since I was a kid.
This is the chemistry of red 40

I understand making food look pretty with dyes, but why are they putting it in prescribed drugs?
http://www.red40.com/pages/drugs/prescribed.html

...
Red Dye #40 in your diet  

Continue reading...
 

Blurred Lines

August 13, 2013
http://www.youtube.com/watch?v=RKqBc3nanxo

Continue reading...
 
 

Categories

 

Make a free website with Yola