Home Science VIDEO: The quantum clone light wars for secure comms have begun

VIDEO: The quantum clone light wars for secure comms have begun

Not quite as epic as a long time ago in a galaxy far, far away is the still amazing news that "near perfect" light cloning could revolutionise ultra secure quantum communications.

Physicists at the Australian National University (ANU) and University of Queensland (UQ) have produced "near-perfect clones of quantum information using a new method to surpass previous cloning limits".

It has set off "a global race" to use quantum physics for "ultra-secure encryption over long distances according to Prof Ping Koy Lam, node director of the ARC Centre of Excellence for Quantum Computation and Communication Technology (CQC2T) at ANU".

We are told that the new cloning method "uses high performance optical amplifiers to clone light encoded with quantum information – it is possible this technique could allow quantum encryption to be implemented with existing fibre optic infrastructure".

Here’s Professionr Ping Koy Lam explaining more:

Prof Lam said: “One obstacle to sending quantum information is that the quantum state degrades before reaching its destination. Our cloner has many possible applications, and could help overcome this problem to achieve secure long distance communication.”

We are then told that the laws of physics — in particular the No Cloning Theorem — "prevent high quality clones being produced with a 100% success rate".

However, the team, led by Prof Lam, "uses a probabilistic method to demonstrate that it’s possible to produce clones that exceed theoretical quality limits. The method was initially proposed by CQC2T researchers led by Prof Timothy Ralph at UQ".

Prof Ralph said: “Imagine Olympic archers being able to choose the shots that land closest to the target’s centre to increase their average score.

“By designing our experiment to have probabilistic outputs, we sometimes ‘get lucky’ and recover more information than is possible using existing deterministic cloning methods. We use the results closest to a ‘bullseye’ and discard the rest,” he said.

Then we get the explanation that "a distinct difference between archery and quantum information is that the probabilistic method is permitted, and is useful in many crypto-communication situations, such as generating secret keys".

Lead author Jing Yan Haw, ANU PhD researcher said: “Our probabilistic cloning method generates higher quality quantum clones than have ever been made before, with a success rate of about 5 percent. We can now create up to five clones of a single quantum state.

“We first encode information onto a light beam. Because this information is in a fragile quantum state, it is difficult to observe or measure,” added Haw.

Prof Ralph continued: “At the heart of the demonstration is a ‘noiseless optical amplifier’. When the amplification is good enough, we can then split a light beam into clones. ‘Amplify-then-split’ allows us to clone the light beam with minimal distortion, so that it can still be read with exquisite precision.”

The esteemed boffins state that "quantum cloning opens up important experimental possibilities as well as having applications in ultra-secure long distance quantum networks".

Prof Lam added: “One of the problems with quantum encryption is its limited communication range. We hope this technology could be used to extend the range of communication, and one day lead to impenetrable privacy between two communicating parties.”

This latest achievement follows the success of fellow CQC2T researchers at ANU, who last month were the first to demonstrate self-stabilising stationary light.

The quantum cloning results are published in Nature Communications

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Alex Zaharov-Reutt

One of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.

 

Popular News

 

Telecommunications