A Super-Secure Network Where Alarms Sound if Data is Compromised
Source AP WorldStream English via NewsEdge
It's a hacker's nightmare but a dream for bankers and spies: A computer network so secure that even the simplest attempts to eavesdrop will interrupt the flow of data and alert administrators to the snooping.
The work by researchers at Harvard University, Boston University and BBN Technologies is the closest scientists have come to a real-world quantum encryption system that uses light particles called photons to lock and unlock information instead of random-number "keys."
Using the technology, the scientists can swap data, send e-mail and visit one another's Web sites as their data is protected.
Researchers are still exploring its practical applications, but some say it could one day replace the encryption now used for most secure Internet traffic, and shield financial or government communications.
"It is really a futuristic technology," said Harvard project scientist John M. Myers. "Its applications are going to be a lot like the laser and the transistor, in that early people could not think of all the possible applications and uses of it."
Quantum cryptography depends on a defining discovery in physics: that subatomic particles can exist in multiple states at once until something interacts with them. Thus, even observing photons used in quantum encryption changes them, ruining the codes.
The project, funded with about $4 million ($3.25 million) from the Pentagon's Defense Advanced Research Projects Agency, is far from alone in developing quantum cryptography. A New York-based company, MagiQ Technologies, has begun selling units for commercial use while a group in Europe recently made the first quantum encrypted bank transaction.
But the Boston network _ though limited to the three locations _ is believed to be first Internet-integrated system that runs continuously between multiple distant locations.
BBN, the company that created the Internet predecessor called ARPANET, has been sending quantum keys for two years. Harvard was linked to the BBN network in May, and Boston University in June.
Quantum encryption has its roots in the "one-time pad" system used by spies in World War II. These were identical pads of random numbers, each page a different key for encoding and decoding messages. A code could be unscrambled only if the recipient had the same page as the sender.
On the quantum network, a laser separates individual photons, and sends them to a device called a modulator. The modulator pumps them out to other network nodes on fiber optic cable. The photons are encoded by sending them out at different intervals: a long gap indicates one bit of information, and a shorter one a different bit.
On the receiving end, another device accepts the photons and recognizes how they're modulated. If the sequence matches what was originally sent, then the keys are stored and used to unscramble data sent through conventional means between the different network nodes, such as over the Internet.
Eavesdropping on the photons, such as setting up a photo detector to read the code, disrupts them, making the codes unusable and alerting the network to the snooper.
The Boston researchers converge weekly at BBN, close to where one pair of transmitters and receivers _ named "Alice and Bob" _ are spread out on two tables in a lab, hooked together with cables draping from the ceiling. The campus nodes, which are more compact, are kept on movable racks.
At a recent meeting, the researchers talked about network bugs, a power outage and progress on adding new equipment. The group already has a team of in-house hackers trying to infiltrate the system.
Myers, the Harvard project scientist, said that the research involves "lots of things to delight the heart of a physicist," but it's too early to know exactly where it's heading. It could eventually come into commercial use, he said, but for now, cost and complexity will likely limit it to high-budget users, such as governments.
If scientists were to develop a now-hypothetical quantum supercomputer, hackers could use it to easily crack existing encryption standards, said Carl J. Williams, a physicist with the National Institute of Standards and Technology, which is doing its own research into high-speed quantum cryptography.
Theoretically, quantum computers could one day become as common as desktop computers are today.
And BBN chief scientist Chip Elliott said there's no technical barrier to the widespread use of quantum cryptography.
For him, it's a question of when, not if.
"This is what every teenager wants: Instant messaging protected by quantum cryptography," he said. "Don't tell my daughter."