Sunday, 27 November 2011

Quantum Scheme Could Allow Submarines to Communicate Securely

Quantum Scheme Could Allow Submarines to Communicate Securely | Popular Science@import "/files/css/a1c433465f8fe485195cb11d70c36108.css";@import "/files/css/33f6b7ecb4513ed2fe6c670880a27187.css"; home Login/Register Newsletter Subscribe RSS GadgetsComputersCamerasSmartphonesVideo GamesCarsConceptsHybridsElectric CarsScienceFuture of the EnvironmentEnergyHealthPopSci Eco TourTechnologyMilitaryAviationSpaceRobotsEngineeringDIYProjectsHacksToolsAuto DIYMore From Our Partner: Toolmonger GalleriesVideosColumnsThe GrouseSex FilesGreen Dream Innovation ChallengesHow It WorksFeatures Tweet Digg Quantum Scheme Could Allow Submarines to Communicate Securely By Clay Dillow Posted 11.01.2011 at 2:41 pm 5 Comments
A Virginia Class Attack Sub Concept Artist's rendering. U.S. Navy via Wikimedia

Submarines are excellent at avoiding detection. When submerged they are so far off the grid, in fact, that it’s difficult for them to stay in contact with the naval bases that supply them with orders and information, or for them to beam information back to base. But a new quantum communications solution could change all this, allowing submerged submarines to communicate via laser pulses by exchanging encryption keys and messages over satellites.

Currently, submarines use randomized codes or “keys” to encrypt messages. These are established ahead of time between a sub and its communications base, and each code is only used one time so that an enemy cannot crack a code and use it to decipher future communications.

Related ArticlesNASA Puts Its Money on Quantum Communications, Plasma Propulsion, and Other Future TechWith New Quantum Encryption Scheme, Messages Can Only Be Read in Designated Geographical LocationScientists Reproduce Quantum Entanglement, Einstein's “Spooky Action” TagsTechnology, Clay Dillow, military, quantum communication, quantum entanglement, quantum mechanics, spooky action, submarinesBut this is problematic. For one, it is logistically cumbersome. And a submarine that’s going on a long-duration mission has to pack lots and lots of keys, which could fall into enemy hands if the sub is overtaken. Moreover, even with plenty of secure keys, the communications between sub and base are extremely slow. In order to penetrate water, transmitters have to use very low frequency radio waves. These only allow for a few characters to be transmitted each second. While the rest of the world (and the battle space) communicates at high speed, subs are stuck with dial-up. In order to send or receive information in bulk or at speed subs have to surface, and that leaves them visible and vulnerable.

But researchers at defense firm ITT have an idea. Using quantum key distribution, subs could encode a key into photons (using the photons’ polarization to represent ones and zeros) making for a virtually un-hackable key--any attempt to intercept the photons would disturb the quantum system in a measurable way, alerting the sender and receiver that a third party is listening in (this is generally achieved via quantum entanglement).

With a secure key established, submarines could then--theoretically at least--stay a few hundred feet below the surface and transmit photons via lasers to satellites, where they could be bounced back to a base on the ground. The researchers’ simulations apparently demonstrate a system that could send and receive data at rates of 170 megabytes per second while a submarine is below the water line. That’s video-worthy data streaming.

Of course, first you would have to figure out just how well photons will hold their quantum states as they travel through water, as any deviation that disrupts the quantum system would render the system insecure (and pointless). And then you need a satellite that can receive and relay quantum-encrypted signaling--again, without disrupting the quantum states of the photons. In other words, this technology is far from battle-ready. But it could someday take high-speed, secure data transfer to depths where it currently doesn’t exist.

[New Scientist]

Previous Article: Chinese Officials Deny Hacking U.S. Environment-Monitoring Satellites 5 Comments Link to this comment Grunt 11/01/11 at 3:25 pm

First, it is easily possible to float to the surface UHF or VHF antenna and communicate with a satellite, while the submarine is several hundred feet below water.

Now add to this line of underwater conduit a floating laser and the problem is solved. Radio waves to guide the laser towards the satellite and laser communication to make it harder to listen in too.

Link to this comment scientific anomaly 11/01/11 at 3:39 pm

i think they should make a drone that can be launched from the sub while it is still hundreds of feet underwater that goes to the surface, communicates whatever it is the people are trying to convey, then self destructs so the enemies cant get it and hack it or something.

-Knock knock
-Who's there?
-The Doctor.
-Doctor Who?
-Yes

Link to this comment Vector13 11/01/11 at 7:16 pm

@scientific anomaly

Well, the problem is with someone intercepting the transmission itself, not necessarily at the transmission point. Just as well, there would need to be a drone for every time someone wanted to transmit or receive a message, and that would be pretty cumbersome :p

Link to this comment TheZomb 11/02/11 at 1:14 am

This article is incorrect in several points. First, the codes submarines use to communicate aka one time pad ciphers are impossible to "hack" or break individually, no matter of time or computing power will ever break one. The only way to break a one time pad cipher is to use two encrypted with the same key to break each other. This is the real reason the codes can be used once. The sentence "These are established ahead of time between a sub and its communications base, and each code is only used one time so that an enemy cannot crack a code and use it to decipher future communications." is incorrect in that respect.

Second, Quantum encryption has nothing to do with entanglement and bits are not encoded by polarity. Its called quantum encryption because it relies on a superposition of states in the light particles being sent (like schrodingers cat) and the Heisenberg uncertainty principle.

Each particle has a polarity, determined by the sender and unknown by the receiver. The receiver has to guess what polarity to use to decode a particle. If you guess wrong the data may not be encoded to bits correctly. You only get on chance to read a particle since reading it permanently changes its polarity. The sender and receiver then pick some at random and send them unencrypted, if they are the wrong polarity someone has tried to eavesdrop. The receiver then tells the sender all of his polarity guesses and then they use the bits from the correctly guessed polarities to form a one time pad cipher just like before.

Link to this comment gizmowiz 11/02/11 at 2:35 am

Wouldn't that in theory allow for an enemy to use detection systems to identify Photon signals being sent to a submerged sub and thereby LOCATE the sub EXCACTLY and blast it out of the water?

It seems plausible this could nullify the subs ability to play hide and seek.

To comment, please Login. Popular TagsTechnology NASA International Space Station robots space DARPA computers UAVs drones Boeing satellites All Tags All Photos All Videos Photo GalleriesRSS LinkTechnologyArchive Gallery: Classic Thrill Rides and Carnival AttractionsGallery: The X Prize Oil Cleanup ChallengeGallery: A History of Data+ More Photo Galleries


138 years of Popular Science at your fingertips.

Innovation Challenges Make your ideas part of the revolutionQuantitative Model to Aid Strategy Decisions When Applying Open InnovationAward: $30,000 USDHigh-Throughput Filling TechnologyAward: $25,000 USDLearn morePowered by Innocentive



Popular Science+ For iPad

Each issue has been completely reimagined for your iPad. See our amazing new vision for magazines that goes far beyond the printed page



Download Our App

Stay up to date on the latest news of the future of science and technology from your iPhone or Android phone with full articles, images and offline viewing



Follow Us On Twitter

Featuring every article from the magazine and website, plus links from around the Web. Also see our PopSci DIY feed


November 2011: Data Is Power

This month, we examine all the ways information is driving our future, from dating to crime to how we see the world.

Plus: turning your smartphone into a wallet, BMW's electric cars, and a space heater with no fan.

Read the issue here.



Enter here
Learn more
Find out more

Popular on Popsci Most Viewed TechnologyChinese Rare Earth Company Strokes Mustache, Cuts Off World's Access to Rare Earths to Inflate PricesVideo: Google Finally Explains the Tech Behind Their Autonomous CarsInside the DIY Weapons Workshop of the Libyan RebelsVideo: A 4,500-Pound Minesweeping, Drone-Launching, Armored Autonomous Mini-TankFoambot Creates Itself Out of Sprayable Foam, Becoming Whatever Robot You NeedAerospace Entrepreneur/Motelier Robert Bigelow Thinks the Chinese Will Take Over the MoonVideo: Flying Sphere-Shaped Drone Wows Crowds in TokyoGallery: Last Night's Auroras as They Appeared from Across the HemisphereVideo: MIT's X-Ray Vision System Can See Straight Through Concrete WallsThe World's Most Complete, High-Res Topographic Map Gets an Update Most Emailed TechnologyThe Unsplittable BitQuantum Scheme Could Allow Submarines to Communicate SecurelyTimeline: The Advance of the Data CivilizationWhat Are You Working on Today, Ranger Supercomputer?Chinese Officials Deny Hacking U.S. Environment-Monitoring SatellitesJaguar, What Are You Working on Today?Video: Humanoid Robot Petman Works OutAmazing Databases: WorldCatAmazing Databases: The Wayback MachineAmazing Databases: Sloan Digital Sky Survey Database Most Commented TechnologyVideo: Google Finally Explains the Tech Behind Their Autonomous CarsChinese Rare Earth Company Strokes Mustache, Cuts Off World's Access to Rare Earths to Inflate PricesAerospace Entrepreneur/Motelier Robert Bigelow Thinks the Chinese Will Take Over the MoonDARPA's 'Flying Humvee' Is Moving Ahead, Ready For PrototypeVideo: Flying Sphere-Shaped Drone Wows Crowds in TokyoInside the DIY Weapons Workshop of the Libyan RebelsVideo: A 4,500-Pound Minesweeping, Drone-Launching, Armored Autonomous Mini-TankThe Glory of Big DataGround-Based Laser Cannon to Turn Space Debris into Self-Powered Flaming De-Orbiting RocketsPassive-Walking Robot Can Stroll Downhill Forever With No Power Source circ-top-header.gif circ-cover.gif Name Address 1   City State STATE Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware DC Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York N. Carolina N. Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island S. Carolina S. Dakota Tennessee Texas Utah Vermont Virginia Washington W. Virginia Wisconsin Wyoming Zip Code Email Today on PopSci.com iPhone 4S Review: Apple's Restraint579851121Inside the DIY Weapons Workshop of the Libyan Rebels579261122Archive Gallery: Classic Thrill Rides and Carnival Attractions577661123PopSci's 10th Annual Brilliant 10569011124Winner of Million-Dollar X Challenge Cleans Up Oil Spills Three Times Better Than Existing Tech576801125Archive Gallery: Steve Jobs in the Pages of Popular Science, Over Three Decades575701126Futuristic Predictions From the Past That Steve Jobs Fulfilled575381127Can Animals Really Be Gay?574881128Video: Solar Sinter Project Turns the Desert's Free Abundance of Sand and Sun into 3-D-Printed Glass 551421129Five Reasons You Should Care About the New Ozone Hole Over the Arctic5741711210Archive Gallery: PopSci's Most Gigantic Portable Gadgets5736511211Inside the Factory: How a Chef's Knife Is Made5717411212 Footer Menu Subscribe to the Print EditionSubscribe to the Digital EditionRenew SubscriptionCustomer ServiceSite MapAbout UsContact UsAdvertisingPrivacy PolicyTerms of UseAbuseRSS FeedsPS Showcase

 

Copyright © 2009 Popular Science

A Bonnier Corporation Company. All rights reserved. Reproduction in whole or in part without permission is prohibited.


View the original article here

No comments:

Post a Comment