Professional Documents
Culture Documents
1. https://www.picoquant.com/applications/category/quantum-optics/quantum-
communication#papers
In a typical QKD set-up, the photons are generated by a single photon source, encoded
into binary values (i.e., representing "0" and "1") and then transmitted to the receiver
either via optical fibers or in free space. The receiver then decodes the state of photons
and detects them using single photon sensitive detectors and time-tagging electronics.
There are several methods for encoding and decoding the photons:
• via polarization: the binary information "1" or "0" is defined by the polarization
of the single photons, e.g., binary "0" correlates with the horizontally polarized
photon and binary "1" with vertically polarized photon
• via the phase, which requires the use of a interferometer system: the phase
difference Δφ = φAlice - φBob of the two interferometers is then used for
encoding the binary values, e.g., a phase difference Δφ=0 correlates with the
binary "0" and the phase difference Δφ=π correlates with the binary "1"
• via entangled photons, which requires one sender of entangled photon pairs and
two receivers (Alice and Bob) each equipped with a polarizer. Alice and Bob set
the two angles at their respective polarization rotator randomly. If the angles of
Alice and Bob match, both photons behave exactly the same at the beam splitter,
i.e., they are either transmitted (binary "1") or reflected (binary "0").
TYPICAL SETUPS FOR QUANTUM KEY DISTRIBUTION (QKD)
2. MIT - https://www.technologyreview.com/2019/02/14/103409/what-is-quantum-
communications/
Barely a week goes by without reports of some new mega-hack that’s exposed huge
amounts of sensitive information, from people’s credit card details and health records to
companies’ valuable intellectual property. The threat posed by cyberattacks is forcing
governments, militaries, and businesses to explore more secure ways of transmitting
information.
Today, sensitive data is typically encrypted and then sent across fiber-optic cables and
other channels together with the digital “keys” needed to decode the information. The
data and the keys are sent as classical bits—a stream of electrical or optical pulses
representing 1s and 0s. And that makes them vulnerable. Smart hackers can read and copy
bits in transit without leaving a trace.
Quantum communication takes advantage of the laws of quantum physics to protect data.
These laws allow particles—typically photons of light for transmitting data along optical
cables—to take on a state of superposition, which means they can represent multiple
combinations of 1 and 0 simultaneously. The particles are known as quantum bits, or
qubits.
The beauty of qubits from a cybersecurity perspective is that if a hacker tries to observe
them in transit, their super-fragile quantum state “collapses” to either 1 or 0. This means
a hacker can’t tamper with the qubits without leaving behind a telltale sign of the activity.
Some companies have taken advantage of this property to create networks for transmitting
highly sensitive data based on a process called quantum key distribution, or QKD. In
theory, at least, these networks are ultra-secure.
What is quantum key distribution?
QKD involves sending encrypted data as classical bits over networks, while the keys to
decrypt the information are encoded and transmitted in a quantum state using qubits.
Various approaches, or protocols, have been developed for implementing QKD. A widely
used one known as BB84 works like this. Imagine two people, Alice and Bob. Alice wants
to send data securely to Bob. To do so, she creates an encryption key in the form of qubits
whose polarization states represent the individual bit values of the key.
The qubits can be sent to Bob through a fiber-optic cable. By comparing measurements
of the state of a fraction of these qubits—a process known as “key sifting”—Alice and
Bob can establish that they hold the same key.
As the qubits travel to their destination, the fragile quantum state of some of them will
collapse because of decoherence. To account for this, Alice and Bob next run through a
process known as “key distillation,” which involves calculating whether the error rate is
high enough to suggest that a hacker has tried to intercept the key.
If it is, they ditch the suspect key and keep generating new ones until they are confident
that they share a secure key. Alice can then use hers to encrypt data and send it in classical
bits to Bob, who uses his key to decode the information.
We’re already starting to see more QKD networks emerge. The longest is in China, which
boasts a 2,032-kilometer (1,263-mile) ground link between Beijing and Shanghai. Banks
and other financial companies are already using it to transmit data. In the US, a startup
called Quantum Xchange has struck a deal giving it access to 500 miles (805 kilometers)
of fiber-optic cable running along the East Coast to create a QKD network. The initial leg
will link Manhattan with New Jersey, where many banks have large data centers.
Although QKD is relatively secure, it would be even safer if it could count on quantum
repeaters.
What is a quantum repeater?
Materials in cables can absorb photons, which means they can typically travel for no more
than a few tens of kilometers. In a classical network, repeaters at various points along a
cable are used to amplify the signal to compensate for this.
QKD networks have come up with a similar solution, creating “trusted nodes” at various
points. The Beijing-to-Shanghai network has 32 of them, for instance. At these
waystations, quantum keys are decrypted into bits and then reencrypted in a fresh
quantum state for their journey to the next node. But this means trusted nodes can’t really
be trusted: a hacker who breached the nodes’ security could copy the bits undetected and
thus acquire a key, as could a company or government running the nodes.
Ideally, we need quantum repeaters, or waystations with quantum processors in them that
would allow encryption keys to remain in quantum form as they are amplified and sent
over long distances. Researchers have demonstrated it’s possible in principle to build such
repeaters, but they haven’t yet been able to produce a working prototype.
There’s another issue with QKD. The underlying data is still transmitted as encrypted bits
across conventional networks. This means a hacker who breached a network’s defenses
could copy the bits undetected, and then use powerful computers to try to crack the key
used to encrypt them.
The most powerful encryption algorithms are pretty robust, but the risk is big enough to
spur some researchers to work on an alternative approach known as quantum
teleportation.
Quantum teleportation works by creating pairs of entangled photons and then sending one
of each pair to the sender of data and the other to a recipient. When Alice receives her
entangled photon, she lets it interact with a “memory qubit” that holds the data she wants
to transmit to Bob. This interaction changes the state of her photon, and because it is
entangled with Bob’s, the interaction instantaneously changes the state of his photon too.
In effect, this “teleports” the data in Alice’s memory qubit from her photon to Bob’s. The
graphic below lays out the process in a little more detail:
Researchers in the US, China, and Europe are racing to create teleportation networks
capable of distributing entangled photons. But getting them to scale will be a massive
scientific and engineering challenge. The many hurdles include finding reliable ways of
churning out lots of linked photons on demand, and maintaining their entanglement over
very long distances—something that quantum repeaters would make easier.
Still, these challenges haven’t stopped researchers from dreaming of a future quantum
internet.
What is a quantum internet?
Just like the traditional internet, this would be a globe-spanning network of networks. The
big difference is that the underlying communications networks would be quantum ones.
It isn’t going to replace the internet as we know it today. Cat photos, music videos, and a
great deal of non-sensitive business information will still move around in the form of
classical bits. But a quantum internet will appeal to organizations that need to keep
particularly valuable data secure. It could also be an ideal way to connect information
flowing between quantum computers, which are increasingly being made available
through the computing cloud.
China is in the vanguard of the push toward a quantum internet. It launched a dedicated
quantum communications satellite called Micius a few years ago, and in 2017 the satellite
helped stage the world’s first intercontinental, QKD-secured video conference, between
Beijing and Vienna. A ground station already links the satellite to the Beijing-to-Shanghai
terrestrial network. China plans to launch more quantum satellites, and several cities in
the country are laying plans for municipal QKD networks.
Some researchers have warned that even a fully quantum internet may ultimately become
vulnerable to new attacks that are themselves quantum based. But faced with the hacking
onslaught that plagues today’s internet, businesses, governments, and the military are
going to keep exploring the tantalizing prospect of a more secure quantum alternative.
TRADUCCIÓN
Casi cada semana vemos noticias de algún megahackeo que deja expuestas enormes
cantidades de información sensible, desde datos de tarjetas de crédito e informes
médicos hasta la valiosa propiedad intelectual empresarial. La amenaza de los
ciberataques está obligando a gobiernos, ejércitos y empresas a explorar formas más
seguras de transmitir la información.
Hoy en día, los datos confidenciales se encriptan y luego se envían a través de cables de
fibra óptica y otros canales, junto con las "claves" digitales necesarias para descifrar la
información. Los datos y las claves se transmiten en forma de bits clásicos, un flujo
de pulsos eléctricos u ópticos representados en forma de ceros y unos. Y es esta
codificación la que los vulnerables ante los hackers más habilidosos, que pueden leer y
copiar los bits en tránsito sin dejar rastro.
La comunicación cuántica aprovecha las leyes de la física cuántica para proteger los
datos. Estas leyes permiten que las partículas, normalmente fotones de luz que
transmiten los datos mediante los cables ópticos, tengan un estado de superposición en
el que pueden adoptar un estado de cero y de uno de forma simultánea, un fenómeno
conocido como superposición cuántica. Estas partículas son conocidas como bits
cuánticos, o cúbits (ver ¿Qué es un ordenador cuántico? Definición y conceptos clave).
Algunas empresas están aprovechando esta propiedad para crear redes de transmisión de
datos altamente confidenciales basadas en un proceso denominado distribución de
claves cuánticas (QKD, por sus siglas en inglés). En teoría, estas redes deben resultar
ultra seguras (ver La física cuántica ya permite enviar mensajes de forma 100%
segura).
¿Qué es la distribución de claves cuánticas?
La QKD envía datos cifrados en forma de bits clásicos a través de las redes, pero las
claves necesarias para para descifrar la información se codifican y transmiten en un
estado cuántico mediante cúbits.
Los cúbits se pueden enviar a Roberto a través de un cable de fibra óptica. Al comparar
las mediciones del estado de fracción de estos cúbits, un proceso conocido como
"comprobación de claves", Alicia y Roberto pueden confirmar que tienen la misma
clave.
A medida que los cúbits viajan a su destino, el frágil estado cuántico de algunos de ellos
colapsará debido al fenómeno de la decoherencia. Para compensarlo, Alicia y Roberto
realizan un proceso conocido como "destilación de claves", que consiste en calcular
si la tasa de error es lo suficientemente alta como para sugerir que un hacker ha
intentado interceptar la clave.
Si es así, desechan la clave sospechosa y generan una nueva hasta que están
convencidos de que comparten una clave segura. Luego, Alicia puede usar la suya
para cifrar los datos y enviarlos en forma de bits clásicos a Roberto, quien usa la suya
para decodificar la información.
Cada vez hay más redes QKD. La más larga está en China y cuenta con un enlace
terrestre de 2.032 kilómetros entre Pekín y Shanghái. Varios bancos y otras compañías
financieras ya la están utilizando para transmitir datos. En EE. UU., una start-up
llamada Quantum Xchange ha llegado a un acuerdo que le da acceso a más de 80o
kilómetros de cable de fibra óptica a lo largo del país para crear una red QKD. Y Europa
también tiene su propio proyecto de comunicación cuántica.
Los materiales de los cables pueden absorber fotones, lo que significa que normalmente
solo pueden viajar unas pocas decenas de kilómetros. Para compensarlo, las redes
clásicas usan repetidores en varios puntos a lo largo de un cable para amplificar la señal.
Las redes QKD pueden aprovechar un enfoque similar, creando "nodos de confianza"
en varios puntos. La red china tiene 32 de ellos, por ejemplo. En estas estaciones, las
claves cuánticas se descifran en bits y luego se vuelven a cifrar en un nuevo estado
cuántico para viajar al siguiente nodo. Pero esto significa que realmente no se puede
confiar en los nodos de confianza: si un hacker viola la seguridad de los nodos podría
copiar los bits sin ser detectado y adquirir la clave, al igual que las empresas y
gobiernos que controlen los nodos.
Para un funcionamiento ideal, hacen falta repetidores cuánticos o estaciones de paso con
procesadores cuánticos integrados que permitan que las claves de cifrado permanezcan
en estado cuántico a medida que se amplifican y se envían a largas distancias. Los
investigadores han demostrado que, en principio, es posible construir tales
repetidores, pero aún no han podido crear un prototipo funcional.
Hay otro problema con la QKD. Los datos subyacentes se siguen transmitiendo en
forma de bits cifrados a través de las redes convencionales. Esto significa que un hacker
que viole las defensas de la red podría copiar los bits sin ser detectado, y luego usar
un ordenador con mucha potencia para intentar descifrar la clave.
Los algoritmos de cifrado más potentes son bastante robustos, pero el riesgo es lo
suficientemente grande como para que algunos investigadores hayan optado por
investigar un enfoque alternativo conocido como teletransporte cuántico.
Aunque suene a ciencia ficción, se trata de un método real que consiste en transmitir
datos en estado cuántico al 100 %. El enfoque se basa en un fenómeno cuántico
conocido como entrelazamiento (ver Un fotón se teletransporta desde la Tierra al
espacio por primera vez).
En efecto, esto "teletransporta" los datos al cúbit de memoria de Alicia desde su fotón
hasta el de Roberto. El siguiente gráfico muestra el proceso con un poco más de detalle.
No obstante, estos retos no han impedido que los investigadores sueñen con un futuro
internet cuántico.
¿Qué es internet cuántico?
Al igual que internet tradicional, se trata de una red de redes que abarca todo el
mundo. La gran diferencia es que las redes de comunicaciones subyacentes serían
cuánticas.
No va a reemplazar al internet que conocemos ahora. Las fotos de gatos, los vídeos
musicales y una gran cantidad de información comercial no sensible se seguirá
transmitiendo en forma de bits clásicos. Pero internet cuántico atraerá a las
organizaciones que necesitan asegurar datos particularmente valiosos. También
podría ser una forma ideal de conectar la información que fluye entre los ordenadores
cuánticos, que cada vez están más disponibles a través de la nube informática.
Quantum communication systems are more secure than regular networks, because they
rely on the quantum properties of photons, rather than computer code that can be cracked.
But building one is expensive. “It just doesn’t scale well,” says Siddarth Joshi at the
University of Bristol, UK.
Now Joshi and his colleagues have developed a kind of quantum network using a method
called multiplexing entanglement. Entanglement is a quantum property that sees two
objects, such as a pair of photons, linked so that measuring one of them instantly
influences the measured state of the other, regardless of the distance between them. This
can be used to generate a secure encryption key.
Rather than connecting users one-to-one, which is costly when dealing with a large
network, multiplexing entanglement splits photons from a single laser according to their
wavelength. Each wavelength can hold a data stream, meaning the system could support
between 50 and 100 users with existing hardware, says Joshi.
The team tested the system with eight users on existing optical fibres in Bristol. More
than 100 people could potentially use the system, says Joshi, because not everyone needs
to be connected all the time
The team says its test system is the world’s largest entanglement-based network, in terms
of number of users, and is different from larger networks, such as one in China, that use
a method called “trusted nodes”. There, a message is passed along a line of users, meaning
any legitimate user on the network can listen in.
“The Chinese network is addressing how to build a 2000-kilometre link between Beijing
and Shanghai,” says Joshi. “We’re addressing how to connect everyone together.”
That step away from trusted nodes is a major development, says Harun Šiljak at Trinity
College Dublin, Ireland. The Bristol development is “an important step towards the
quantum internet idea of unprecedented security and privacy”, he says.
But Šiljak cautions that this is a proof of concept and has questions about keeping the
error rates of photon recognition in realistic bounds when operating a larger network. If
error rates exceed a certain percentage, it may not be possible to produce secure
encryption keys.
Joshi believes that risk is manageable, and the method can be used to connect millions of
devices together. “What I am trying to set out to do is to build the quantum internet,” he
says.
4. INFOSECURITY MAGAZINE - https://www.newscientist.com/article/2253448-
secure-quantum-communications-network-is-the-largest-of-its-kind/
Despite its promise for ultra-secure transmissions of sensitive information, there are a
number of misconceptions about QKD. Given that QKD offers protection today for the
quantum threats that are around the corner, addressing the myths of QKD is essential for
ensuring that our encrypted data stays secret and out of the hands of hackers and foreign
governments.
However, China is stealing and stockpiling sensitive data from U.S. databases,
compromising data like intelligence officer contact information and employment
records from the Office of Personnel Management and Lockheed Martin’s F-35
development plans. Even if the data is encrypted, the minute China has quantum
computing capable of cracking the encryption all the secrets will be spilled.
In Europe, the Institute for Quantum Optics and Quantum Information in Vienna
developed a quantum channel that enabled the first intercontinental quantum video call.
QKD has been securing elections in Switzerland for a decade, protecting voting data
sent between the central ballot-counting station in downtown Geneva and government
data centers in the suburbs.
In addition to that, cities are sitting on top of tons of unused fiber optic cable — called
“dark fiber” — that was laid underground during the rush to build out the internet in the
late 1990s and early 2000s. Costs to light it are a fraction of what they were then with
little to no labor costs because it’s already in the ground.
Also, there are technologies, such as Phio TX, that support QKD without the need for
dedicated fiber. QKD requires a fiber link between two QKD boxes to generate the
unique photon-based keys but they can be sitting right next to each other. Once the key
is generated it can be transmitted over any transport (WAN, fiber, copper, wireless,
free-space optical) to its destination.
5. PHYS.ORG - https://www.newscientist.com/article/2253448-secure-quantum-
communications-network-is-the-largest-of-its-kind/
Using trusted relays, the ground-based fiber network and the satellite-to-ground links
were integrated to serve more than 150 industrial users across China, including state and
local banks, municipal power grids, and e-government websites. This work shows that
quantum communication technology can be used for future large-scale practical
applications. Similarly, a global quantum communication network can be established if
national quantum networks from different countries are combined, and if universities,
institutions and companies come together to standardize related protocols, hardware.
In the last couple of years, the team extensively tested and improved the performance of
different parts of the integrated network. For instance, with an increased clock rate and
more efficient QKD protocol, the satellite-to-ground QKD now has an average key
generation rate of 47.8 kilobits per second, which is 40 times higher than the previous
rate. The researchers have also pushed the record for ground-based QKD to beyond 500
km using a new technology called twin-field QKD (TF-QKD).
Next up, the team will further expand the network in China and with their international
partners from Austria, Italy, Russia and Canada. They also aim to develop small-scale,
cost-efficient QKD satellites and ground-based receivers, as well as medium and high
earth orbit satellites to achieve all-time, ten-thousand-km-level QKD.
Quantum cryptography keys for secure communication
distributed 1,000 kilometers farther than previous attempts
The exchange of a secret key for encrypting and decrypting messages over a distance of
1,120 kilometers is reported in Nature this week. This achievement is made using
entanglement-based quantum key distribution, a theoretically secure communication
technique. Previous attempts to directly distribute quantum keys between two ground
users under real-world conditions have reached distances of only around 100 kilometers.
Quantum communication uses photons to securely distribute a "secret key" to allow the
exchange of encrypted messages. Previous work has demonstrated quantum key
distribution along up to 404 kilometers of coiled optical fiber in a laboratory, or from a
satellite to a ground station up to 1,200 kilometers away. However, real-world application
between two users has been limited to around 100 kilometers. This is due to photon losses,
which increase rapidly with distance. Trusted relays or "repeaters" offer a way to extend
the distance and avoid photon loss, but the relay stations introduce security risks.
Jian-Wei Pan and colleagues circumvented the need for repeaters by using a satellite to
establish a secure link between two ground stations on Earth, using entangled photons.
Entangled photons are linked in such a way that, even when separated by long distances,
outcomes of measurements of their quantum properties are perfectly correlated. Two
telescopes, designed to receive such quantum signals, were built 1,120 kilometers apart
in Delingha and Nanshan in China. Entangled photons produced by the Micius satellite
are transmitted to the ground as the satellite passes over the stations. Although satellite-
based entanglement distribution has been reported before, the authors have now increased
their transmission efficiency and reduced error rates enough to use entanglement to
transmit quantum keys. They show that the system produces a secure channel that is
resistant to attacks.
The results represent a path toward entanglement-based global quantum networks, the
authors conclude.
6. COMPUTERHOY- https://computerhoy.com/noticias/tecnologia/china-
inaugura-primera-red-comunicacion-cuantica-integrada-786181
China ha establecido la primera red de comunicación cuántica del mundo. Para ello se
han necesitado más de 700 fibras ópticas con dos enlaces tierra-satélite con los que
distribuir las claves cuánticas por 4.600 kilómetros, desde la ciudad de Xinlong a
Shanghai.
La revista Nature ha publicado los avances conseguidos por el equipo de Jianwei Pan,
Yuao Chen, y Chengzhi Peng, investigadores de la Universidad de Ciencia y Tecnología
de China en Hefei (USTC). Jianwei Pan, profesor en esta universidad, asegura que este
proyecto demuestra que "la tecnología de comunicación cuántica es lo suficientemente
madura para aplicaciones prácticas a gran escala".
Las claves generadas por la comunicación cuántica o QKD (quantum key distribution)
se basan en los estados de las partículas cuánticas como por ejemplo, los fotones. Así se
forma una cadena de ceros y unos que, ante cualquier interferencia entre el emisor y el
receptor, la cadena cambia de inmediato evitando su descifrado.
Cada par de fotones entrelazados codifica un bit de la cadena. Al estar entrelazados si uno
de los fotones se ve alterado o es descubierto por un sistema ajeno, el entrelazado se
rompe porque el fotón ha cambiado su propiedades de forma inmediata. La clave
cambiaría antes de que se pudiera averiguar por completo, por eso se considera casi
imposible de piratear a esta nueva tecnología.
Estas redes se podrían ampliar a nivel global uniendo las diferentes redes cuánticas de los
países y las instituciones y empresas, si se llegara a estandarizar los protocolos y hardware
necesario. El equipo de la USTC quiere ampliar esta red china con la ayuda de socios
internacionales de Austria, Italia, Rusia y Canadá. Otro de los objetivos próximos es
el desarrollo de satélites QKD y receptores terrestres de diferentes escalas para lograr una
red cuántica de hasta 10.000 kilómetros.
7. XATAKA- https://www.xatakaciencia.com/telecomunicaciones/primera-red-
comunicacion-cuantica-integrada-mundo-se-establece-china
Imposible de piratear
Hasta ahora, la tecnología QKD más común utiliza fibras ópticas para transmisiones de
varios cientos de kilómetros, con alta estabilidad pero considerable pérdida de canal, pero
los investigadores han ido más lejos utilizando una nueva tecnología llamada QKD
de campo doble (TF-QKD).
También tienen como objetivo desarrollar satélites QKD y receptores terrestres a pequeña
escala y rentables, así como satélites de órbita terrestre media y alta para lograr QKD de
nivel de diez mil kilómetros todo el tiempo. Por su parte, la Unión Europea también se ha
puesto en marcha con una iniciativa llamada European Union Quantum Communication
Initiative