No , not really . But for two eld , researchers at Los Alamos National Labs have been working on something they call internet - centric quantum communication — and this could usher in the next generation of hyper - secure , scalable , and low-cost quantum cryptologic technique . We spoke to the lead researcher to feel out more .
sooner this calendar week , MIT ’s Technology Review release anarticleclaiming that a “ political science science laboratory ” has been on the Q.T. operating a “ quantum net ” for over two years . Several other outlets ran with the account , includingPopular ScienceandWired .
“ The MIT clause does n’t accurately characterize what we ’ve been doing , ” he told io9 . “ We are not part of the net , and that phrase — a quantum cyberspace — is not something we used in ourpaper . ”

Rather , Hughes ’s team create a meshing test seam for doing quantum cryptography over an optic fiber net . They ’ve been execute it to test their protocol and its carrying into action , with the promise of using it to protect vital infrastructure , such as the electric gridiron .
“ Really , there ’s nothing unusual about what ’s been going on here for the past two - plus eld , ” say Hughes . “ It ’s just that we do n’t run to publish paper until we have something interesting to report . ”
As for the accusations of privateness , theLos Alamos National Labsteam was delayed in progress to their work public because they were file for multiple letters patent software program on the technology — of which there were 27 U.S. and strange patent to assure .

So , while it may not be a dependable quantum internet , it ’s a system that comes somewhat damned confining .
And indeed , UC Berkeley security system expertGalina A. Schwartztold me that , while it ’s not a lawful quantum internet , it ’s a find that shows we ’re well on our direction to getting there . “ It is exciting , ” she told io9 , “ and it is come in the future , but not exactly tomorrow . ” These equipment , she say , are still some room from commercial realness .
By exacting definition , a true quantum internet would give up for perfectly secure communications from any period in the meshing to another . Quantum cryptanalysis would , in possibility , make the net unassailable from tap , eavesdropping , hacking — anything . So long as the one - time pad is kept a arcanum — a randomly bring forth and drawn-out key that can only be used once — peak - to - peak communicating is dense . Once refine , cryptanalytics of this strength could be used to guarantee critical infrastructure and protect the electric control grid from malicious blast .

One - time - pads are beget by a process calledquantum key distribution(QKD ) , and it relies on the spooky power of the Heisenberg Uncertainty Principle to produce partake key that are only know to two parties , and which are subsequently used to securely convert messages .
And indeed , it ’s this full point - to - point restriction that has result some skeptics to trust that a quantum cyberspace is impossible . Others vie that the acute costs and logistic requirements of have to overhaul the world ’s IT infrastructure make it a non - neophyte .
But this is where Hughes and his team got clever . get laid that a peer - to - compeer quantum internet is impossible ( at least by today ’s level of inclusion ) , the Los Alamos research laboratory produce a quantum hub - and - spoke digital communications web . What ’s more , the architecture is potentially Internet compatible ; it runs off standard fiber optic cables that connect to off - the - ledge PC die hard the Windows operating system .

“ We see this attribute as a major innovation over what ’s been done before in quantum cryptography mesh — and it ’s design from the ground up to be something that ’s pretty evolve over top of what ’s already deploy out there , ” pronounce Hughes . “ We are consistent with conventional ocular fiber meshing architecture and conventional cryptologic trust architectures . ”
The system is a minute unwieldy , and not peer - to - peer , but it exhibits some captivating feature .
To make it work , the net has a core server computer at the nub of it . Then , like the spokes jutting out from the center of a wheel , optical fibers are connected to node reckoner . These nodes are not connected to each other — but all they share the same hub at the center .

For communication to happen , each client node is equipped with a quantum smart card , or QKarD , that ’s the size of it of a threshold keystone . The fundamental hub has optical fiber connect into it , along with a small square - state individual photon demodulator that needs to be cooled below way temperature .
The QKarD reserve the nodes to write quantum minute , but they can only record ceremonious bits . Only the hub is capable to both read and write quantum snatch . Data travels from each leaf node to the hub along a impregnable one - time launch area enabled connector . So , if node A want to commune with node B , node A send a substance to the fundamental hub , which in turn routes the data to node B using dependable classical connection enabled by a unlike one - time pad .
And yes , you guessed correctly : If the security of the hub is compromised , the entire affair falls apart .

“ The way the testbed oeuvre today is that we have three customer devices talking over optical roughage to a server client , ” says Hughes .
By centralize the more expensive and more technologically demanding component part in the central server , the team was able to amortize that cost and complexity over all the nodes in the internet . Other approaches , on the other script , require demodulator at every node , which is expensive and laborious to deploy .
“ This is something that ’s far beyond what ’s been done in the past tense with quantum cryptanalysis , ” Hughes distinguish us . “ But what we have is an experimental testbed — one that is n’t in any sense operational . ” Last December , the team also exhibit technology that can secure the control data and commands of the electrical grid against a potential attacker — but again , not in an functional surroundings .

But not everyone is convinced that quantum cryptography symbolize the time to come of internet security — at least not straightaway .
“ Cyber - physical systems operate with child scale decisive infrastructure such as the galvanizing grid are comprised of products from slews — even hundreds — of manufacturer , ” Schwartz told us . “ Will they suddenly switch from non - quantum crypto - resolution to employing quantum steganography in their intersection — specially give that malicious intruders focalize on attacking the ‘ weakest linkup ’ of CPSs ? ”
In fact , subsist security solutions found on established cryptography are not at all the ‘ weakest link ’ of CPS security .

“ Manufacturers would rather invest in improving security measures of the weakest golf links of their products , ” she says . “ Many products are known to be notoriously unsafe , but still remain in enjoyment : proprietary protocols still prevail in electric grid , despite the fact that they are more prone to design failures than public protocols . ”
And as Schwartz reminded us , no system with human participant is ‘ really ’ secure : “ Social engineering will exist ’ till humans are extinct . ”
We also reach out toRoss Anderson , a prof at the University of Cambridge ’s Computer Laboratory , and writer of the theme , “ Why quantum computing is hard — and quantum cryptography is not demonstrably secure . ”

After we fetch Hughes ’s paper to his attention , he responded in an email :
The job with protect critical infrastructure is n’t that crypto is hard . Crypto is easy ; we have protocols like TLS , IPSEC , SSH and Kerberos that are available on passably well all modern machine . The job is that a distinctive office electronic connection has a immense variety of equipment , much of it dating back 10 , and it ’s prohibitively expensive to replace it all with new stuff . As a result , the only feasible way to protect the typical utility is reparameterization ; ensuring that the control meshing are separated from the cyberspace using robust firewall . steganography is not the appropriate technology in most typesetter’s case and even where it is we have cheap simple stuff that works . The writer ’ desire to deal expensive , freakish quantum crypto into critical base markets is off-the-wall . The words “ snowflake ” and “ netherworld ” fountain to take care .
In a follow - up email , Anderson put it more compactly : “ No such thing . Quantum crypto is bunk . ”

I let Hughes read Anderson ’s email , and we talked about it .
“ Yeah , I do n’t agree with that — and I guess our Department of Energy supporter do n’t check with that , either , visit as they ’re funding us to do this stuff , ” he quipped . “ depend , it ’s sure as shooting unfeigned that there ’s a huge installed base of gadget out there controlling the grid . And often these thing are set up and expect to operate for 20 to 30 years . But they ’ve been installed without security on them , so you have an issue of wanting to put in a retrofit to secure it . ”
But it ’s not true , argues Hughes , that the current country of cryptanalytics can potentially meet the afford requirement , many of which have been analyzed by multiple research groups from around the world .

“ You just can not meet the requirement for the low latency that ’s necessary to ensure theses thing , ” he says , “ This is why the DOE is interested in funding us , because we can both meet the security and the latency requirements . ”
moreover , he say , quantum steganography has an attribute known as forward protection — where , if a design weakness is found in the time to come , and in contrast to present day cryptanalytics , it prevents anything antecedently done with the hardware from being retroactively vulnerable .
“ And that ’s absolutely not true with current solar day public samara cryptography , ” Hughes told us .

And as for the impression that this is always going to be expensive , and that these initiatives will require a revolution in the existing communications structure , Hughes allege that ’s just not right .
“ By harnessing these manufacturing proficiency that are now being used in integrated photonics , we can get the cost of these transmitter devices down to the couple - of - hundred - one dollar bill range by produce them in large quantities , thus making it reasonable in terms of affordability and deployability . And we can be applied as a retrofit on top of the exist fiber base — we can deploy on what ’s already out there . ”
In regard to the claim that everything can be done with pre - existent firewalls , Hughes acknowledge that multiple approaches are warranted , but there are still problem . “ There is an active enquiry counseling there , but it ’s not clear if this is the right-down panacea that Anderson suggested . ”

Looking onward , Hughes hopes to see his technology used in the critical base sector and for securing the electric power system . The voltage for hackers to attack the grid , he says , is very real — one that could cripple the economy .
Hughes also get wind the electric potential for ensure control and data , which have tight requirements for response time , often within a few milliseconds to prevent physical damage . It could also work in the fiscal sphere and the burgeon practice of eminent velocity trading . And indeed , the amount of time it takes to apply cryptography is becoming a significant ingredient in how truehearted deal can be execute .
His team is also working on a next genesis quantum vector QKarD , one that ’s much smaller than what they ’re currently using . Once miniaturize , these cards could fit inside a mobile phone or tab equipment . He picture a docking station for a hand-held machine that , in addition to tear the battery , would fee the machine ’s memory with cryptographic key stuff that can be share with a cardinal server in the enterprisingness . So , when a exploiter undocks the gimmick and carries it around , those secure keys could be used to communicate with friend or colleagues , or other parts of the same net . And it would have all the advantages of quantum security , though without an visual fiber cable’s length .

Wireless quantum - level security in handheld devices ? Yes , please .
Top image : Anteromite / Shutterstock ; Los Alamos National Labs .
quantum physicsScience
![]()
Daily Newsletter
Get the adept tech , skill , and civilisation news in your inbox daily .
News from the futurity , delivered to your nowadays .
You May Also Like
