Skip to comments.
Government Lab Reveals It Has Operated Quantum Internet for Over Two Years
MIT Technology Review ^
| 5/6/13
Posted on 05/06/2013 6:00:49 PM PDT by LibWhacker
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-39 next last
A dozen agencies want to snoop into every bit of communication that takes place on the internet, via email, telephones, etc. (I'm surprised the creeps aren't reading our snail mail, and pushing legislators to pass laws that would allow them to implant listening devices in our voice boxes). Another agency invents the means to make that impossible, heeheeheehee. Gooooooood!
To: LibWhacker
2
posted on
05/06/2013 6:02:49 PM PDT
by
smokingfrog
( ==> sleep with one eye open (<o> ---)
To: LibWhacker
Was the sex poodle involved?
3
posted on
05/06/2013 6:03:28 PM PDT
by
Third Person
(Welcome to Gaymerica.)
To: LibWhacker
This is where the messages reach the receiver two weeks before they’re sent, isn’t it?
They need it for the Obamacare bill collection system.
4
posted on
05/06/2013 6:05:44 PM PDT
by
Hardraade
(http://junipersec.wordpress.com (Vendetta))
To: LibWhacker
I think it will be made illegal - unless the gov can crack it.
5
posted on
05/06/2013 6:09:22 PM PDT
by
D-fendr
(Deus non alligatur sacramentis sed nos alligamur.)
To: LibWhacker
im going to bookmark this for later so i know what it is about but in the meantime i can say i positively trust them without a doubt when they say they can make my communications secure i gotta go write some more bad checks now see ya
6
posted on
05/06/2013 6:10:30 PM PDT
by
bigheadfred
( barry your mouth is writing checks your ass cant cash)
To: LibWhacker
Wow, this is going into the novel I’m writing.
7
posted on
05/06/2013 6:12:31 PM PDT
by
FastCoyote
(I am intolerant of the intolerable.)
To: LibWhacker
I'm not surprised, often the government has technology that is 10 years or more ahead of what is available to the public. I remember my dad describing bar-code scanners that the military was using for inventory way back in the late 1960’s, about fifteen years before they started appearing in stores.
8
posted on
05/06/2013 6:13:43 PM PDT
by
apillar
To: LibWhacker
If you cant route - it is NOT an Internet. Not even an Intranet.
To: LibWhacker
Good for honest people and... terrorists.
To: LibWhacker
That may sound limiting but it still allows each node to send a one-time pad to the hub which it then uses to communicate securely over a classical link. The hub can then route this message to another node using another one time pad that it has set up with this second node. So the entire network is secure, provided that the central hub is also secure.So... if I understand correctly.
We already knew how to create a perfect, unbreakable cipher. It simply requires knowing the key.
The problem, until now, has been an inability to transmit a perfectly-unbreakable cipher key, in such a way that it could not be intercepted.
This system solves that problem by relying on the principle that quantum information can't be read without being destroyed.
End points generate a key for perfect, unbreakable encryption and transmit it, using quantum information, to the central hub.
Now the central hub shares a common unbreakable key with every end point. Voila. Perfectly secure communication can take place in either direction. And two end points can communicate by going through the hub.
So as long as the hub's secure, all communications is secure.
To: Jeff Winston
I’m guessing the United States Government would hire a Chinese company to design the security for the hub....
12
posted on
05/06/2013 6:25:07 PM PDT
by
Bryan24
(When in doubt, move to the right..........)
To: LibWhacker
I was wondering what Al Gore was doing with his free time and money. That guy is SO smart.
To: taxcontrol
It is this... with frickin lasers.
14
posted on
05/06/2013 6:25:52 PM PDT
by
UCANSEE2
(The monsters are due on Maple Street)
To: Jeff Winston
Or... as long as you don’t try to read the encryption key, you can read all the data.
15
posted on
05/06/2013 6:28:25 PM PDT
by
UCANSEE2
(The monsters are due on Maple Street)
To: LibWhacker
If I read the data stream by light leakage off of a fiber with a photodiode, it would not change the quantum data one bit. This is horse pucky.
16
posted on
05/06/2013 6:32:20 PM PDT
by
American in Israel
(A wise man's heart directs him to the right, but the foolish mans heart directs him toward the left.)
To: Jeff Winston
Claude Shannon proved, using information theory considerations, that the one-time pad has a property he termed perfect secrecy; that is, the ciphertext C gives absolutely no additional information about the plaintext. This is because, given a truly random key which is used only once, a ciphertext can be translated into any plaintext of the same length, and all are equally likely. So because the key is perfectly random (and the same length as the message) the only information that is conveyed by having the text is the maximum length of the message.
The completely random key completely randomizes every character of the message. So it doesn't matter if your opponent has all the computing power in the entire universe. Until the key is known, or at least part of it, the message can't be cracked.
The end result is like, "I sent a message to Bob that's 225 characters long. Or maybe less. Maybe I put some filler in just to make it even more inscrutable. So guess what I said?"
To: American in Israel
If I read the data stream by light leakage off of a fiber with a photodiode, it would not change the quantum data one bit. This is horse pucky.Not at the level this stuff operates.
We're talking stuff kind of on the order of individual photons of light type stuff. You read it, it's gone.
To: Jeff Winston
To: Jeff Winston
How do you ensure that the central hub is secure?
Navigation: use the links below to view more comments.
first 1-20, 21-39 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson