Feeds

Quantum crypto - with nothing more than STANDARD broadband fibre

Theoretical un-crackability cracked

5 things you didn’t know about cloud backup

Boffins have worked out how to run quantum cryptography systems over a standard broadband fibre in a development that brings theoretically unbreakable encryption closer to mainstream use.

Traditionally it has been necessary to use dedicated fibre to send the single photons (particles of light) that are required for Quantum Key Distribution (QKD). This has restricted any applications of quantum cryptography technology to specialist and small-scale systems in banks and high-level government, essentially because of the extra inconvenience and cost required in allocating a dedicated fibre strand for quantum key distribution.

However, a breakthrough from Toshiba’s Cambridge Research Laboratory makes it possible to use existing telecoms networks to distribute secret keys, potentially slashing the price of using quantum cryptography in the process.

Researchers from Toshiba teamed up with boffins at Cambridge University Engineering Department to successfully create a rig that allowed them to extract the very weak signals used for quantum cryptography from ordinary telecom fibres, which transmit regular data traffic at a different wavelength.

The Cambridge team achieved their breakthrough using a detector that is sensitive only for a very brief window (100 millionths of a micro-second) at the expected arrival time of the single photon, which carries signals related to a quantum keys. The ultra-high shutter-speed snapshot detector responds largely to just the single photon signals and is insensitive to the scattered light caused by the other data signals. This allows the weak single photon signals to be recovered from the fibre.

Using the technique, the Cambridge team successfully ran quantum cryptography systems over ordinary telecom fibres while simultaneously transmitting data at 1Gbps in both directions. They demonstrated a secure key rate over 500kbps for 50km of fibre, about 50,000 times higher than the previous best value for this fibre length. The breakthrough was reported in the scientific journal, Physical Review X, on Tuesday.

Scattered light caused by the data signals would normally contaminate and overwhelm the single photon signals if sent along the same fibre. The disparity in the intensity of the signals is illustrated by the fact that one bit of data is carried by over one million photons in normal fibre optic networks, but one bit relates to just one polarised photon in quantum key distribution systems. Getting around the noise contamination problem without falling back on a dedicated fibre for quantum key exchange is therefore a massive breakthrough.

Dr Andrew Shields, assistant managing director at Toshiba Research Europe, said: “The requirement of separate fibres has greatly restricted the applications of quantum cryptography in the past, as unused fibres are not always available for sending the single photons, and even when they are, can be prohibitively expensive. Now we have shown that the single photon and data signals can be sent using different wavelengths on the same fibre.” ®

Boffin-note

Quantum Key Distribution (QKD) offers a high-security key exchange system that is theoretically uncrackable but still subject to potential implementation flaws. Secrets keys for one time key-pads are transmitted with one photon encoding one bit.

It is secure because any attempt by an eavesdropper to intercept and measure the photons alters their encoding, thanks to fundamental principals of quantum physics. This means that eavesdropping on quantum keys can be detected. Compromised key exchanges can be abandoned and the process repeated until a theoretically unbreakable key is exchanged.

The Toshiba QKD system is based on one-way optical propagation and the BB84 "Alice and Bob (PDF)" cryptography protocol with decoy pulses.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.