Dark Fiber and White Space

Two underused resources, “Dark Fiber” and “White Space” are to be taken advantage of to increase the power of the network.

 

One application seeks to use optic fiber that has being laid but not being used to enable the establishment of secure keys using quantum technology http://www.technologyreview.com/computing/23317/page1/

The other is a wireless network in which the information is carried in the unused interstices of the TV spectrum. http://www.technologyreview.com/communications/23781/

Advertisement

Waiting for the Quantum Leap

For the longest time I have the suspicion that quantum cryptography, although a neat idea, is overrated. I was keeping an eye into developments (see previous posts) just in case. currently my impression is that, with the current, technology, QC is an expensive proposition for the added value it provides. It looks like I am in good company on this. In the October issue of Wired, Bruce Schneier writes a commentary piece where he asserts:

While I like the science of quantum cryptography — my undergraduate degree was in physics — I don’t see any commercial value in it. I don’t believe it solves any security problem that needs solving. I don’t believe that it’s worth paying for, and I can’t imagine anyone but a few technophiles buying and deploying it. Systems that use it don’t magically become unbreakable, because the quantum part doesn’t address the weak points of the system.

Security is a chain; it’s as strong as the weakest link. Mathematical cryptography, as bad as it sometimes is, is the strongest link in most security chains. Our symmetric and public-key algorithms are pretty good, even though they’re not based on much rigorous mathematical theory. The real problems are elsewhere: computer security, network security, user interface and so on.

Moreover I have a nagging question about the fundamental tenet of quantum cryptography. The principle is that Alice and Bob will know for sure that Eve is eavesdropping in their channel because their bits will be changing as required by the uncertainty principle. Eve may be out of luck in getting the secrets as Bob and Alice will certainly decide not to exchange them in her presence. However, the mischievous Eve may decide that she is quite happy with only preventing the exchange. I will call this a denial of channel attack by which Eve can prevent Alice and Bob to exchange any secret until the police figures out where she is tapping the quantum line and force her to stop. Eve-hacker can now start a cat and mouse chase, that judging from the record on netting hackers by the internet police, is lopsided on Eve’s favor.

A mathematical note aside, Schneier mentions in his article the Bennet-Brassard and key reconciliation algorithms used by quantum cryptography. In a paper written with A. Bruen and D. Wehlau we gave rigurous proof of convergence for the Bennet-Bessete-Brassard-Salvail and Smolin (BBBSS92)method. These results and more about quantum cryptography also appear on the our book.

Man in the Middle attack for QKD?

In an article titled “Can Eve control PerkinElmer actively-quenched single-photon detector?” Vadim Makarov et al. report that thanks to the “strange behavior” found of one of the most often used photon detectors, it is possible for the eavesdropper (Eve) to inject a crafty pulse and fools Bob’s detector by introducing a click of her choice. Eve can now run a man in the middle attack, and when Alice send Bob the list of erroneous polarizations (the “key reconciliation” phase) Eve will be able to recover the key.
I am not sure at this point whether this is just a shortcoming of the particular hardware being used or if this is a pervasive characteristic of the type of circuits used for the detectors. Let’s see.

qubits and such

The ominous promise of a quantum computer able to factor large primes is often cited as the end of the road for cryptographic systems based in number theory, that is all forms of public key cryptography. To gain some perspective on the probabilities that a practical quantum computer with such capacity be around the corner, I have compiled a list of links related to the most promising technologies being developed in labs around the world.

A very nice graphical representation of the concepts of qubit and entanglement can be found here.
Detailed description of the trap technique (also here).
Developments on Quantum dots at Delft.
A recent survey of quantum algorithms.
IBM’s famous Quantum Information Group.
A quantum communication bus.
News from Nature blog.

Quantum Cryptography (update)

Over a year ago I was posting about advances on practical quantum cryptography. In particular on the commercial side of it. Since then I’ve been keeping an eye on the news and everything is very quiet on this front with the exception of id Quantique.
As far as I know they have the only commercial implementation of a quantum key distribution (QKD) system. They are advertising a hybrid system in which a quantum channel is used to exchange the encryption keys for a AES encrypted classical channel. From the latest news at their website I can guess they figured out that without a standard to conform to, the sales of any new type of encryption system is an uphill battle.
The arXiv has a recent paper on practical quantum cryptography in which the authors mention mainly QKD as the only quantum technology mature enough to be commercial.
Other than the above mentioned systems, quantum cryptography is still a promise that has not delivered real, usable products.