QNu Labs

Categories
Blog

How Should Security teams prepare for Post-Quantum Cryptography?

How should security teams prepare for post quantum cryptography?

QNu Labs   |   Feb 14, 2023
how should security teams prepare for post quantum cryptography?

The post-quantum world poses a threat to the existing cybersecurity systems.

Quantum computers use the laws of quantum mechanics to process information in quantum bits or qubits. Qubits can exist in multiple states at the same time (called quantum superposition). This property allows quantum computers to process data and solve problems exponentially faster than classical computers. It has been proven that a scaled quantum computer will render modern public-key encryption algorithms useless. Many enterprise technologies depend on public-key encryption, placing them at an elevated risk of brute-force attacks by malicious actors.

The power of quantum computing can easily break RSA protocols that guard our online data. RSA-2048, once considered a fortress of cybersecurity, is vulnerable to quantum hacks. It has become imperative for organisations to protect sensitive and critical data with quantum-resistant cryptography.

Migration to Quantum-Safe Encryption (QSE)

The migration from existing encryption towards quantum cryptography can be a challenging endeavour. It requires the participation of people, processes, and technology. Quantum cryptography is an evolving technology that will go through a series of iterations with time. Transitioning to QSE, as of today, can be explained in four steps:

Find:

The first step is to collect the inventory of cryptographic assets used by the organisation. It includes algorithms, keys, certificates, protocols, and libraries. It typically consists of a scanner capable of scanning an application, a host, or a network and an inventory of cryptographic assets.

Assess:

The second step is to look for vulnerabilities across the collected cryptographic inventory. The need to transition to QSE provides an excellent opportunity to modernise encryption implementation overall. Therefore, the vulnerabilities should not be limited to finding algorithms that are not quantum-safe. They can include any cryptographic vulnerabilities.

Prioritise:

The third step is prioritising the vulnerabilities discovered based on risk so that the organisation addresses the highest risks first. This risk-based prioritisation requires enrichment data.

Let’s consider two databases that we need to rank for priority. Suppose that database A contains classified information while database B contains public information. The data classification information is an example of enrichment data. This context prioritises fixing the issue for database A, which poses a higher risk.

Remediate:

This step automates the remediation of those prioritised issues. The remediation procedure differs depending on whether the issue requires an application change. For issues that do not require an application change, this step integrates with external systems to drive a resolution.

Roadmap for security teams in an organisation

The migration to quantum-safe algorithms could take several years, for some industries like healthcare and financial services, the transition can be challenging due to technology lifecycles and long-life data that has to remain secure. The transition to post-quantum is considered more complex than previous cryptographic transitions. It should serve as a wake-up call for considering the impacts on a company's digital infrastructure.

To kick-start the migration, the security teams need to:

Inventory data: Map out where the most sensitive and long-life data resides.

Inventory cryptographic assets: Gain in-depth visibility into what cryptographic assets already exist in the technology environment.

Build a cryptographic agility strategy: Cryptographic agility is the ability to easily move from one algorithm to another – even a quantum-resistant one.

Test and plan the migration: Follow steps 3 and 4 mentioned earlier for seamless migration.

Overview of post quantum cryptography solutions The adjustments and investments security leaders will need to make depend on the type of post quantum cryptography solution.

The two most viable candidates are:

In quantum key distribution (QKD), two parties exchange a symmetric key through a secure quantum channel. This solution requires additional quantum hardware to transmit, process, and store quantum information. QKD is safe from decryption by quantum computers. QNu Labs has successfully demonstrated the robustness of this technology.

In classical post quantum cryptography (CPQC), two parties use quantum methods, such as lattice-based encryption, to encrypt messages over classical channels (such as fibre-optic cable). This approach is safe from quantum-computing decryption. It requires hardware similar to what is required for traditional encryptions.

Post quantum cryptography is approaching. The right way to prepare for this new era varies by company, as do the considerations around balancing near-term costs with possible risks further in the future. Leaders and decision-makers in security and risk should evaluate their options and get moving.

Related articles

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

Quantum Vaccination Program For Enterprises

MAY 13, 2021

Quantum Vaccination Program For Enterprises

The Future Of Secure Encryption: Satellite Quantum Key Distribution

MAY 06, 2021

The Future Of Secure Encryption: Satellite Quantum Key Distribution

Categories
Blog

Can new optical fibres fast-track quantum internet?

Can new optical fibres fast-track quantum internet?

QNu Labs   |   Feb 14, 2023
Can new optical fibres fast-track Quantum Internet?

We live in an information age where digital communication has become a lifeline for our businesses. Optical fibres are the backbone of our modern information networks. Long-range communication over the internet and high-speed information transfer within data centres take place over optical fibres.

Fibre networks, due to their structure and form, are prone to vulnerabilities. Information transfer can be compromised when things go wrong. Physicists at the University of Bath in the UK have developed a new kind of fibre designed to enhance the robustness of networks. This robustness can be important in the coming age of quantum networks.

The new optical fibres are fabricated using the mathematics of topology. They are easily scalable; the structure of each fibre can be preserved over thousands of kilometres.

In ordinary networks, light travels through the core of the fibre. The path taken by an optical fibre as it criss-crosses the landscape isn’t straight and undisturbed; turns, loops, and bends are the norm. Distortions in the fibre cause information to degrade as it moves through the channel.

The fibre designed by the Bath team deploys topological ideas by including several light-guiding cores in a fibre, linked together in a spiral. Light can hop between these cores but becomes trapped within the edge due to the topological design. These edge states are protected against disorder in the structure.

Conventional light sources for fibre-optic telecommunications emit many photons at the same time. In existing telecommunication networks, information is transmitted by modulating the properties of light waves travelling in optical fibres. In quantum communication, however, information is encoded in the phase of a single photon, the photon’s position in the wave in which it travels. This makes it possible to connect quantum sensors in a network spanning great distances and to connect quantum computers. Single-photon sources with operating wavelengths compatible with existing fibre communication networks have been developed.

The new fibres make it possible to integrate quantum light sources made of two-dimensional materials into communication networks. In addition, the two-dimensional nature of the material makes it easy to construct devices layer by layer. It helps integrate these light sources into emerging quantum computers to construct larger, modular computing systems and achieve quantum advantage for practical applications.

Quantum networks are expected to play an important communication role in the future. Quantum technologies can store and process information in more powerful ways than 'classical' computers can today, as well as send messages securely across global networks without any chance of eavesdropping.

But the quantum states of light that transmit information are easily impacted by their environment and finding a way to protect them is a major challenge. The new fibre optic networks can be a step towards maintaining quantum information in fibre optics using topological design.

Exciting times are ahead for quantum networks!

Related articles

Quantum Random Number Generator and its relevance today

DEC 23, 2020

Quantum Random Number Generator and its relevance today

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

DEC 21, 2020

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

Dark side of quantum computers a lurking threat to national security

DEC 18, 2020

Dark Side of Quantum Computers A Lurking Threat to National Security

Categories
Blog

Building quantum networks with quantum dots

Building Quantum Networks with Quantum Dots

QNu Labs   |   Feb 08, 2023
Building Quantum Networks with Quantum Dots

We are witnessing the second quantum revolution. We are, for the first time, exploring the possible applications of quantum superposition and quantum entanglement. Quantum communication is one of the important use cases of quantum mechanics. Building a large and fully-functional quantum network will determine the commercial success of quantum communication.

Though quantum communication has seen significant developments, its progress hinders due to the limitation of maintaining quantum states of qubits (quantum bits) over large distances. Unlike classical bits that can be amplified, qubits do not support amplification because their superposition states cannot be cloned. Therefore, a robust quantum network necessitates low-loss channels and high-intensity quantum sources. There has been significant progress in satellite-based quantum communications and quantum repeaters to overcome some of the known challenges. However, the need of the hour is high-powered single-photon sources that create high-performance qubits.

Quantum dots are considered a viable option for this requirement. Quantum dots, also called ‘artificial atoms’, are semiconductor nanocrystals with nanometer-sized diameters that exhibit quantum size effects in their optical and electronic properties. Photon detection is realised by devices such as light-dependent resistors (photoconductors) or photodiodes. Quantum dots have been successfully integrated into these already-existing technological platforms to improve their performance.

Quantum dots create smaller, more efficient antennas that have high conductivity and can transmit signals over long distances with minimal loss. Researchers from Osaka University in Japan have fabricated a nanoantenna that brings quantum information networks closer to practical use. They have substantially enhanced photon-to-electron conversion through a metal nanostructure, a milestone for sharing and processing data.

Conceptual illustration of efficient illumination of photons to semiconductor lateral quantum dots by using a surface plasmon antenna and excitation of electrons in the quantum dots. (Image: Oiwa lab)

Conceptual illustration of efficient illumination of photons to semiconductor lateral quantum dots by using a surface plasmon antenna and excitation of electrons in the quantum dots. (Image: Oiwa lab)

Nanostructures such as nanoparticles and nanofilms can also be used to create more efficient and robust wireless communication systems, such as those used in satellite and 5G networks. Researchers have extended their research in exploring the use of nanomaterials to create more secure and efficient encryption systems and to create networks that are more resistant to interference and jamming.

An efficient and compact single-photon source that can operate on a chip at ambient temperatures is already demonstrated. Using quantum dots, scientists have developed a method in which a single nanocrystal can be accurately positioned on top of a specially designed and carefully fabricated nanoantenna. Such a highly directional single photon source could lead to a significant progress in producing compact, cheap, and efficient sources of quantum information bits for future quantum networks.

Related articles

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

The Future Of Secure Encryption: Satellite Quantum Key Distribution

MAY 06, 2021

The Future Of Secure Encryption: Satellite Quantum Key Distribution

Ingenious Encryption Breach – A Final Call

JAN 23, 2023

Ingenious Encryption Breach – A Final Call

Categories
Blog

Ingenious Encryption Breach – A Final Call

Ingenious Encryption Breach – A Final Call

QNu Labs   |   Jan 23, 2023
Ingenious Encryption Breach – A Final Call

Data is the engine of the new economy. The data economy depends on the creation of data and data sharing. This makes data an invaluable asset for nations, enterprises and individuals. The data exchange fuels data harvesting. Companies and individuals are known to harvest data - extract useful information from data sources for their personal benefit. Data is harvested through the breaches and sold on the dark web. One can buy credit card information on the dark web for a few dollars.

The protection of data from misuse, through inappropriate data harvesting, is achieved through encryption. Encryption converts the information into a secret code that hides the information's true meaning. It has been a saviour for data in the last few years. Almost all data is now encrypted - phone calls, emails, online messages, internet content, banking details, e-commerce etc.

Today, public-key encryption algorithms are used widely for encrypting data sent over the internet. The RSA-2048 public-key encryption provides the best combination of security and performance. It is believed to be extremely secure because it takes classical computers trillions of years to break the mathematics behind the encryption key exchange algorithms.

Since the meat of the loot is not cash but data in today’s digital world, it is not surprising that we frequently hear about data hacks and data breaches. The value of harvesting encrypted critical data (with long shelf life) through different means and decrypting it later is priceless, especially for state-sponsored hackers as access to such data can be used as leverage against adversaries.

Imagine a scenario when the current public keys are broken in a few minutes…

The advent of quantum computers has dramatically changed the cryptography landscape. The superior computational power of quantum computers can break public-key encryption almost instantly. The prowess of quantum computing makes the pain of data harvesting worthwhile because decrypting sensitive data is a breeze. As per a report published in 2020, a quantum computer with 4099 perfectly stable qubits could break the RSA-2048 encryption in 10 seconds.

Imagine the repercussions of this ability in the defence, critical infrastructure, banking, and healthcare industries.

Why is this discussion important today?

The researchers had predicted that a 4099-qubit quantum computer may not arrive until 2030 but according to a recent article in Financial Times, Chinese researchers claim to have found a way to break encryption using existing quantum computers. American cryptographer, Bruce Schneier, said the Chinese claim "is something to be taken seriously".

The point to be noted is that if such news is gathering steam, we are already late in de-risking our data. The news article serves as a rude wake-up call to act soon.

The prudent decision is to protect the encrypted data today so that it remains encrypted in the future.

The data economy is here to stay and grow. New threats demand new solutions. We, at QNu Labs, are miles ahead in ensuring that your data remains safe from new encryption breaches.

We have developed quantum cryptography as well as post-quantum cryptography-based solutions to address a wide range of use cases. While quantum cryptography solutions are based on the principles of quantum physics, post-quantum cryptography is based on mathematical problems that are hard for both classical and quantum computers to solve.

Our hybrid solutions (quantum and post-quantum cryptography) offer security for both ‘data in transit’ and ‘data at rest’ and can be implemented on dedicated wired or wireless networks of government and Defence as well as on shared public networks of private enterprises. The solution is easy to implement without any disruption to the business.

The importance of protecting critical and sensitive data using quantum-secured technology is the only path to secure our future. There is no time left to think and decide. The only plausible course of action is to plunge into adopting quantum security.

Data security today can avoid a data catastrophe tomorrow.

Related articles

Y2Q: Preparing for the quantum future

FEB 14, 2023

Y2Q: Preparing for the quantum future

Quantum Random Number Generator and its relevance today

DEC 23, 2020

Quantum Random Number Generator and its relevance today

Dark side of quantum computers a lurking threat to national security

DEC 18, 2020

Dark Side of Quantum Computers A Lurking Threat to National Security

Categories
Blog

Quantum Vaccination Program for Enterprises

Quantum Vaccination Program For Enterprises

Worrisome Situation: World Is Facing Not One But Two Pandemics - The Next Global Crisis: “A Cyber Security Pandemic"

Sunil Gupta   |   May 13, 2021
Quantum Vaccination Program For Enterprises

The whole world is reeling from one of the worst pandemics ever seen. Health systems of most countries are under stress, and in a few countries have crumbled from the sheer size of the population infected by a fast-spreading disease. People with low immunity and comorbidities are the worst impacted. The second wave of Covid has taken the world by surprise and the countries which were not prepared for the second, worst surge have been caught off guard and are struggling to contain and manage the disease.

This pandemic will be remembered as a uniquely disruptive period in our lives — but not just as a global health crisis. Online life has digitally transformed, with exponential change at home and work via cyberspace. However, the negative cybersecurity impacts of these online changes have led many experts to summarize the combined events of this year as a growing “cyber pandemic”. As per a govt. report, cyber-attacks amidst this pandemic rose by almost 300% in India. Recently an American cyber intelligence company hinted at a suspected China-linked cyber operation that was focused on India’s electricity grid and other critical infrastructure. The above data highlights that hackers have become more active in the last 12 months, taking advantage of the distraction and confusion all around due to the pandemic. Hackers thrive on such situations to carry out cyber-attacks.

A parallel can be drawn between this health pandemic and the cyber pandemic (CP). CP is widespread across geographies, countries, industry verticals and size of the enterprises. Large defense organizations, cloud service providers, telecom utility providers, critical infrastructures, healthcare enterprises, payment gateways, and financial institutions are suffering from CP. Over 1,000 CXOs were asked about the effects of Covid-19 on enterprise and government organizations in a recent global study done by Tanium and 90 percent of executives surveyed experienced an increase in cyberattacks due to the pandemic.

The recent colonial pipeline ransomware attack and subsequent shutdown has been sending shockwaves through the United States.Unfortunately, majority of the discourse surrounding this cyber incident seems to miss the point: cyberattacks, especially those against our increasingly exposed critical infrastructure, are now part of our digital reality. The U.S. was fortunate that the ransomware intruders did not seek to cause physical destruction by bridging over from the IT systems into the pipeline’s OT systems. Simply put, the colonial pipeline hack could have been far worse than a nuisance to fuel supply chains and impact on consumers wallets.

Hope: “Prevention Is Better Than Cure”

The only viable and effective answer today to save the life of people is mass vaccination. Besides the best practices of improving one’s general health, the only solution available to people is to build sufficient antibodies to fight the disease. This may not protect people from getting infected with Covid-19 and its multiple strains but will ensure that the damage is minimal and restricted, and the recovery is fast. Looking at the havoc created by the pandemic, pharma companies have created vaccines in a record time to deal with the pandemic. Tough times call for desperate measures and heroic efforts.

There was an initial hesitation in people about the efficacy and side effects of the vaccines, some of which are yet to complete trial phases. But people have realized that the risk to life from Covid is far more than the perceived risk from the vaccines. Thus the initial vaccine hesitancy has been overcome and populace is queuing up for inoculation.

CP is different and more difficult to address compared to health pandemic as the attack vectors in CP are far more and take many different forms, ranging from malware and ransomware to man-in-the-middle attacks, compromised credentials, and phishing. Therefore, the solution to address CP has to be easy to embrace, extremely fast in action and should address current and future threats.

QNu Labs, an indigenous quantum security start-up from Bangalore had anticipated a data apocalypse type of situation happening in the near future. It therefore started building next gen data security products in 2016 using bleeding edge technology based on quantum physics. QNu’s quantum-based cryptographic systems use quantum random number generators to produce quantum encryption keys and uses superposition properties of photons to generate identical symmetric keys at both ends of the communication link. Any unauthorized intrusion into the communication immediately severs the quantum channel—it becomes known instantly that there has been an eavesdropping attack..

Solution: Cyber Security Pandemic Needs Quantum Vaccination Drive!!

Given the dire situation of the cyber pandemic, which is only increasing in size, frequency and impact day by day, it is prudent and the need of the hour to implement the products and solutions based on this latest quantum technology. This technology may be new but it has gone through successful trials and implementation worldwide and, like the Covid vaccines, is ready for mass deployment.

It is time for quantum vaccination of enterprises to protect and minimize the impact from various attack vectors. Quvaxin from QNu consists of two solutions. The first solution (Tropos' QRNG / Qosmos' EaaS) upgrades the conventional software-based entropy source to quantum ready entropy source for generating encryption keys and digital certificates. The first jab will ensure instantaneously that the keys and digital certificates have no patterns or corelations of any kind which can be exploited by hackers. The second solution (Armos) takes the ‘data security in transit’ to the level of unconditional security so that no man in the middle can ever get an access to encryption keys, even on an unsecure network.

The process of giving Quvaxin is very simple - easy to use APIs, no disruption in the ongoing business and immediate benefits.

Related articles

how should security teams prepare for post quantum cryptography?

FEB 14, 2023

How Should Security teams prepare for Post Quantum Cryptography?

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

Ingenious Encryption Breach – A Final Call

JAN 23, 2023

Ingenious Encryption Breach – A Final Call

Categories
Blog

What’s lurking in the Cloud?

What’s Lurking In The Cloud?

Worrisome Situation: World Is Facing Not One But Two Pandemics - The Next Global Crisis: “A Cyber Security Pandemic"

QNu Labs   |   May 12, 2021
What’s lurking in the Cloud?​

The lock down has clearly increased workloads to remote, cloud and hybrid environments. The cyber-attacks have just been growing steadily and relentlessly. New victims every day and by the time the impact is understood there is a new ransomware, a new victim impacting organizations across the world. It looks like the hackers are far ahead in the game.

The four popular brothers -phishing, malware, ransomwares, and DDOS seem to be doing just fine and growing well. While the work has moved to home, by and large organizations have really not checked if the employees work in a safe environment, not physically but from network security, I have not heard of anything other than a VPN and in some cases everything is left to “it is someone else’s problem to solve “.

Let’s take the last few big take downs- Solar Winds, FireEye, Software AG, Paytm, easyJet, Marriot all have been victims, these are companies with skilled people and mature environments. So it’s really not the small business that is being attacked.

The hacker world has its own hall of fame, anything small is not going to get any attention in that world and more audacious the attack better the score. These are coveted spots you earn which keep the methods and game interesting by outdoing each other, new players emerge and join the club. Earlier we had Babuk ransomware which attacked Houston Rockets, a telecom company and Govt dept. all in a single month.

The lights on approach of folks manning the security networks, the talent gap and no updated policies are just adding to the vulnerabilities.

Related articles

how should security teams prepare for post quantum cryptography?

FEB 14, 2023

How Should Security teams prepare for Post Quantum Cryptography?

Can new optical fibres fast-track Quantum Internet?

FEB 14, 2023

Can new optical fibres fast-track Quantum Internet?

Ingenious Encryption Breach – A Final Call

JAN 23, 2023

Ingenious Encryption Breach – A Final Call

Categories
Blog

The Future of Secure Encryption: Satellite Quantum Key Distribution

The Future Of Secure Encryption: Satellite Quantum Key Distribution

Deepika Aggarwal   |   May 08, 2021
The Future Of Secure Encryption: Satellite Quantum Key Distribution

Companies and governments around the world are in a race to build the first usable quantum computer. The technology promises to make some kinds of computing problems much, much easier to solve than with today’s classical computers, but it also poses a significant threat to the integrity of encrypted data.

A large-scale quantum computer would, for example, be capable of solving the prime-number factorization problem exponentially faster than classical computers. For authentication and data transmission, the widely used asymmetric encryption relies on the difficulty of solving just such mathematical problems. The arrival of effective quantum computers would thus lead to a fatal breakdown of the current security infrastructure.

Alternate “quantum-proof” methods of encryption are therefore required. Quantum Key Distribution (QKD) is one approach that exploits the fundamental laws of physics rather than specific mathematical assumptions. It is resistant to all known computational attacks, including those from future quantum computers.

The Need For Satellite Based Quantum Key Distribution

Ground-based QKD systems are commercially available today, but the range of communication of the current systems has been limited to a few hundred kilometers due to atmospheric losses or in-fiber attenuations. These limitations make purely ground-based systems impractical for a global distribution network.

Long-distance communication is far more important in meeting the security threat posed by quantum computers, for government, military, as well as business infrastructure. Interconnecting local QKD networks over international distances faces a huge technological hurdle: amplification or simple reception and retransmission of quantum states alters their properties and is thus fundamentally incompatible with QKD.

While “quantum repeater” might seem to be a solution, which allows single light particles to be stored, re-sent and manipulated without altering their state, but the related technology is still immature for practical implementations. Another solution, links with many “trusted relays”, can extend these distances from across a typical metropolitan area to intercity and even intercontinental distances. However, relays pose security risks.

Satellite based QKD systems offer the best approach for establishing a global-scale quantum network by using satellites that distribute secure keys to ground stations via free-space optical links.

The technology facilitates low photon loss and negligible signal disturbance (decoherence) in the empty out space. Propagation losses, which scale exponentially in fiber, scale only quadratically in free space and hence extend the range of quantum communication without compromising its security.

A satellite-based QKD system will ensure security over national and international distances, at a cost, much lower compared to ground-based fiber infrastructure for quantum-communications. By ensuring the secure distribution of cryptographic keys over globe-spanning distances, this space-based technology delivers ultra-secure, long-range communications capability at a level that cannot be achieved with ground-based fiber infrastructure.

Thus, a global QKD network of ground stations and satellites, using laser light to send secure secret keys, provides a great platform for securely connecting the world.

Related articles

‘Harvest now, decrypt later’ and the Quantum Revolution

JAN 11, 2021

‘Harvest now, decrypt later’ and the Quantum Revolution

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

DEC 21, 2020

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof

JAN 27, 2021

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof

Categories
Blog

Quantum Internet: A Leap Forward

Quantum Internet: A Leap Forward​

Quantum Internet: A Leap Forward

Anuj Sethia, May 08, 2021

On Oct. 29, 1969, a set of electrical signals emerged from the University of California, Los Angeles and traveled to one at the Stanford Research Institute in Palo Alto. This marked the inception of a new era for humanity, as this was the first data ever transmitted over Arpanet, the precursor of the internet. Unquestionably, the internet has had a revolutionary impact on our society.

On similar lines, a quantum internet's vision is to provide fundamentally new technologies by enabling quantum communication between any two points on Earth. Such a quantum internet will work in synergy with the "classical" internet that we have today to connect quantum information processors to achieve unparalleled capabilities that are impossible using only classical information.

As with any emerging technology, it is hard to predict all the quantum internet capabilities. The best-known application of a quantum internet today is quantum key distribution (QKD), enabling two remote network nodes to establish an encryption key. However, a quantum internet has many other applications with advantages that are unattainable with the present internet. More applications include secure access to remote quantum computers and more accurate clock synchronization. Moving ahead, more applications are likely to be discovered in the next decade.

A quantum internet requires spearheading three quantum hardware elements: quantum channel, quantum repeaters and quantum processors. Quantum channel supports the transmission of qubits similar to standard telecom fibers. Since they are inherently lossy, we require quantum repeaters to reach longer distances, thus scaling both entanglement and key distribution capabilities. The final element is the end nodes, i.e., the quantum processors connected to the quantum internet.

The stages of development toward a full-blown quantum internet can be identified as:
  • Trusted repeater network: A network with at least two end nodes using QKD to exchange encryption keys.
  • Prepare and measure: Enabling end-to-end QKD without the need to trust intermediary repeater.
  • Entanglement generation: Creation of quantum entanglement with a deterministic nature along with local measurements.
  • Quantum memory: This stage involves having a quantum memory with local control at end nodes.
  • Qubit with fault tolerance: The ability to perform local operations fault tolerance.
  • Quantum Computing: The final stage consists of quantum computers that can arbitrarily exchange quantum communication.

Based upon this vision for the quantum network, the current experimental status of long-distance quantum networks is at the lowest stage, i.e., trusted repeater networks. Building and scaling quantum networks is a challenging endeavor, requiring sustained and concerted efforts in physics, computer science, and engineering to succeed. Although it is hard to predict the exact components of a future quantum internet, we will likely see the first multimode quantum networks' birth in the next few years. This development would bring the exciting opportunity to test the ideas and functionalities that so far only exist on paper and are potential components of a future large-scale quantum internet.

Reference Link:

Spread the word

Recommended Reading

What’s lurking in the Cloud?​

The lock down has clearly increased workloads to remote, cloud and hybrid environments. The cyber-attacks have just been growing steadily and relentlessly

The Future Of Secure Encryption: Satellite Quantum Key Distribution

Companies and governments around the world are in a race to build the first usable...

Pharma firms at risk of cyberattacks: How companies can become 100% hackproof

In the past few weeks, a few Indian pharmaceutical companies witnessed...

Categories
Blog

The History of Light ​

The History of Light

QNu Labs   |   Jan 28, 2020
The History of Light

If you haven't realized this already, your grade 12 chapters on optics and light is more like a history review than a physics course. I say this because one never reaches the interpretation of light and its duality until towards the end of the book. Nor does it address the absurdities of quantum mechanics. The understanding is known as the classical interpretation of light and until the early 19th century there weren't any other strong interpretations.

Pierre Gassendi and Newton were two pioneers who believed that light was in fact made of matter (or particles). This was aptly named the corpuscular theory of light. Though they were ahead of their time, their inability to elaborate on the theory and explain phenomenon such as refraction, diffraction and interference of light led to the subsequent decline in the adoption of this hypothesis by the physicists of the day. This was because it required the understanding of the wave nature of light to explain these phenomenon.

Huygen’s wave theory is one the earliest interpretation of light as a wavefront. He believed that every disturbance on a secondary wavefront can be treated as a source of spherical wave. Though he was able to explain phenomena such as reflection and refraction using this theory, he was unable to explain attributes such as why light travels in straight lines (rectilinear propagation) and why light bends effects on sharp corners (diffraction).

In the 18th century, Fresnel showed that, Huygen’s theory together with his own principle of interference could explain both rectilinear propagation and diffraction of light. The Huygens Fresnel principle provided a strong foundation for the wave theory.

Later Young's double slit method gave the most definitive evidence to the wave nature of light and cemented our understanding of light as a wave. During this time there were multiple theoretical interpretations of light from physics such as J.C. Maxwell who derived the iconic Maxwell’s equation to describe the polarization of light and other electromagnetic radiation.

JJ Thomson’s discovery of electrons was another step in the direction of quantum physics Though it was not intended to prove the quantum nature of particles, Davisson – Germer's double-slit experiment at Western Electric proved that electrons had a wave nature too. This helped to advance and confirm the hypothesis proposed by Louis de Broglie earlier. De Broglie’s hypothesized the dual nature of matter (not just light). De Broglie’s hypothesis constitutes the fact that any particle with a linear momentum can have wave like attributes. This has been since confirmed with many subatomic particles such as electrons, neutrons and even some macromolecules.

In 1900, just as the dust was able to settle in favor of the classical interpretation as the exclusive interpretation of light. Max Planck, a German physicist demonstrated that black body radiations can be explained by considering energy emitted as discrete quantized states or in other words, the energy can only be a multiple of an elementary unit. This postulate has been one of the foundations of quantum physics.

Einstein in his iconic paper in 1905 proposed that the photoelectric effect was a direct consequence of the quantum nature of light. Photoelectric effect is the emission of electrons from a metal when sufficiently energetic electromagnetic radiation hits the surface. It is observed that an increase in intensity of light does not add to the effect, a phenomenon that is exclusive only to the frequency of electromagnetic radiation. And when the energy (or frequency) was high enough, it would knock an electron off its orbit. Thus, Einstein proposed that a beam of light is not a wave propagating through space but a collection of discrete packets of definite energy. These packets of energy are what we call photons today. This paper is what won him that Noble Prize in physics in 1921 (and not for equation which he is most famous for in general relatively -> E=mc^2 )

Physicists such as Neils Bohr took this as the insight required to explain the Hydrogen and Balmer Series formed from by release of several distinct frequencies of light corresponding to the energy released by electrons which are moving to a lower energy orbit. Furthermore, atoms of individual elements emitted wavelengths in distinct lines of a spectrum rather than a continuous spectrum as seen in a black body radiation.

In 1927, Werner Heisenberg published a paper with the famous Heisenberg uncertainty principle. Heisenberg is widely credited for laying a mathematical foundation to the field quantum mechanics. Later, he aptly received the Nobel prize in physics in 1932 “for the creation of quantum mechanics” .On top of his efforts, other physicists such as Dirac, Born, Schrodinger and Pauli brought in more mathematical interpretations and evidence to quantum physics cementing our understanding of the quantum nature of light.

Today, the field of photonics and quantum mechanics is seeing a renewed interest and massive adoption as we are bring ideas from the realm of theory to reality. This extends to everything from the development of advanced sensors & radar to securing communication & processing information.

And all it took us was a few decades of continuous debating, questioning and rewriting of our fundamental understanding of physics and light.

Categories
Blog

Network security, a peek into how it all started

Network security, a peek into how it all started​

Network security, a peek into how it all started​

Vivek Shenoy   |   January 28, 2021

While we harp on data and network security in today’s interconnected world, and today there is an entire armory of network security and vulnerability assessment tools available, here is a peek into the history of network security and how an accidental piece of code woke us up.

Dubbed the “Morris worm”, it was written by Robert Morris a graduate student at Cornell University and launched on Nov 2, 1988 from the computer systems of the Massachusetts Institute of Technology. In the few hours of it being launched, 1000s of computer systems were down, the Internet was clogged and rendered dysfunctional. In the words of Clifford Stoll, a systems administrator "I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days". Stoll commented that the worm showed the danger of monoculture, as "If all the systems on the Arpanet ran Berkeley Unix, the virus would have disabled all fifty thousand of them”.

And what Morris was trying to do was something remarkably simple – he simply wanted to know how many computers were on the Internet. There was no statistics or information available and he did it in the most ingenious way possible – write a piece of code that would try and do a remote access to all the machines that a particular user has access to and replicate itself on the remote machines and report back to the mother node. He got his answer – about 6000 computers – at the cost of bringing down the Internet and giving the world a clarion call on what it means to be “hacked”.

The worm exploited some of the known vulnerabilities and remote access options that computer systems provided:
  • A hole in the debug mode of the Unix sendmail program
  • A buffer overflow or overrun hole in the fingerd network service
  • The transitive trust enabled by people setting up network logins with no password requirements via remote execution (rexec) with Remote Shell (rsh), termed rexec/rsh
  • Weak, dictionary-based passwords that users chose for themselves

From the start, it would check which systems a user had remote access to, do a rsh to that machine, replicate itself and try and guess other users passwords using a standard dictionary attack. The results were spectacularly successful.

It worked around many of the safeguards that an operating system uses to limit a user/program using up resources – Unix would automatically “nice” a program that executed for several minutes, lowering its priority. The worm responded by killing itself and respawning, automatically upping its priority. Most network data transfer supported only ASCII transfers, so the worm copied itself in source code and complied it on the remote machine to start execution.

It had safeguards to limit itself, by checking if a computer already had the program running. It was programmed to replicate itself only one out seven times and an unfortunate bug in the code prevented this from happening, resulting in the same computer getting infected again and again, virtually bringing it to a standstill.

While Morris’s intentions were non-malicious and even harmless, and it eventually resulted in him being charged under the Computer Fraud and Abuse Act, 1986 and fined $10,000 and 3 years of probation.

Which brings us to today’s world of interconnected systems – we are over-reliant on our networks and systems working perfectly well, our data being safe and hacker-resistant. While tools and systems exist to check networks and systems against vulnerabilities, exploits tracked, advisories published, and warnings made out, we are still vulnerable in one aspect – weak passwords. Change it now!

Reference Link:

Spread the word

Recommended Reading

Quantum Random Number Generator and its relevance today

To ensure safety and trusted communication in today’s connected world, random number generators are a critical security element.

Threat to National Security and Country’s Economy with Imminent arrival of Quantum Computers

To ensure safety and trusted communication in today’s connected world, ...

Dark Side of Quantum Computers A Lurking Threat to National Security

Data is a critical part of digitization; nation-state hackers pose...