Researchers devise method of sending quantum encryption keys over shared fiber cable

November 21, 2012 by Bob Yirka report
Researchers devise method of sending quantum encryption keys over shared fiber cable

(—Researchers from Toshiba and Cambridge University working together in Britain have developed a technique for sending quantum encryption keys over a shared fiber cable. As they describe in their paper published in Physics Review X, their technique involves employing a super sensitive photon detector capable of detecting the photons that make up a quantum key at the precise moment they arrive.

Up till now, the problem with trying to send keys over a shared fiber cable was finding the photons that make up the quantum key among the millions of others that serve as data as they arrived at the other end. Recent efforts have sidestepped the problem by using a secondary dedicated cable for just the encrypted keys, but that obviously drives up network costs. The use of quantum keys is desirable because they have the built in advantage of producing errors if someone else observes or measures them as they move from one end of the cable to the other.

In this new research, the team reasoned that if a system could be devised that would allow for keeping precise track of the time single photons that make up the key left the source and calculate their arrival time at the destination, it would be possible to focus only on them, and thus, see the key and use it for its designed purpose. The problem with this approach was that there didn't exist a photon detector that could open and close quickly enough to suit the needs of detecting photons in a stream of others in a fiber cable. Their only choice was to make one themselves, and that's exactly what they did. Their new snaps open and closed like the shutter on a camera, capturing only what is arriving at a precise moment in time. In this case, the "" activates for just 100 picoseconds, every . Fast enough to capture just the from the encrypted key, and nothing else. At a the team demonstrated that such a system could work by sending encrypted quantum keys over a shared fiber cable for a distance of 90 kilometers (56 miles). The next step will be to test the system on a real world cable.

The researchers believe their new technique will allow for metropolitan wide distribution of encrypted keys which will be useful for military and financial communications. In the long term, they suggest the new technology may be modified to one day include the entire Internet infrastructure.

Explore further: NIST System Sets Speed Record For Generation of Quantum Keys for 'Unbreakable' Encryption

More information: Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber, Phys. Rev. X 2, 041010 (2012) DOI: 10.1103/PhysRevX.2.041010

Quantum key distribution (QKD) uniquely allows the distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With a high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10-Gbit Ethernet, QKD is a significant step closer toward wide-scale deployment in fiber networks.

Physics Synopsis

Related Stories

'Dead time' limits quantum cryptography speeds

September 28, 2007

Quantum cryptography is potentially the most secure method of sending encrypted information, but does it have a speed limit" According to a new paper by researchers at the National Institute of Standards and Technology and ...

Quantum eavesdropper steals quantum keys

June 20, 2011

( -- In quantum cryptography, scientists use quantum mechanical effects to encrypt and then communicate confidential information. Although quantum cryptography codes are unbreakable in principle, even the best ...

Hi-fi single photons

October 4, 2012

Many quantum technologies—such as cryptography, quantum computing and quantum networks—hinge on the use of single photons. While she was at the Kastler Brossel Laboratory (affiliated with the Pierre and Marie Curie University, ...

Recommended for you

Funneling fundamental particles

August 24, 2016

Neutrinos are tricky. Although trillions of these harmless, neutral particles pass through us every second, they interact so rarely with matter that, to study them, scientists send a beam of neutrinos to giant detectors. ...

Engineers discover a high-speed nano-avalanche

August 24, 2016

Charles McLaren, a doctoral student in materials science and engineering at Lehigh University, arrived last fall for his semester of research at the University of Marburg in Germany with his language skills significantly ...

Understanding nature's patterns with plasmas

August 23, 2016

Patterns abound in nature, from zebra stripes and leopard spots to honeycombs and bands of clouds. Somehow, these patterns form and organize all by themselves. To better understand how, researchers have now created a new ...

Physicists propose method for braiding light

August 22, 2016

(—Physicists have proposed a way to braid three beams of light by guiding the beams along swirling, vortex-shaped defects in the optical medium through which the beams travel. The braided light would have an unusual ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.