Ultra-secure quantum communication channel. Future technologies from MSU

48
The development of scientists of Moscow State University, associated with the creation of ultra-secure communication channel based on the technology of so-called quantum encryption, gets practical application. We are talking about the so-called "quantum phone", which, in fact, is a computer system with an installed optical-electronic module (EOM). In turn, the EOM is connected directly to the quantum key distribution server.

It should be recalled that MSU researchers received a state grant for their development at the end of 2017.



At the moment, a stable functioning line has been created on the basis of quantum key distribution. The line is already being used for its needs by Rostelecom, which by means of new technologies ensures the transmission of a protected signal over a distance of more than 30 km in the Moscow region (Noginsk - Pavlovsky Posad). The generation of random numbers is still carried out at speeds up to 100 Megabits / s. At the same time, the line capabilities are much larger than these values. Experts of the research center speak about the coding rate of information up to 10 Gigabit / s (and this is only at the first stage of development).

Line security is provided by the unique properties of the quantum states of the object. If some third-party "observer" tries to measure these states (to penetrate the data transmission channel), then such states will be distorted for it, which automatically makes decoding inaccessible by the existing methods of "classical" physics. Moreover, the attempt to decrypt the signal on the line is instantly monitored, which can trigger an algorithm to stop transmitting the signal or switch to an alternative line, but the information will not be lost for the parties exchanging keys.

As the scientists note, the importance of the technology being implemented is also in the fact that data transmission does not require the terrestrial infrastructure customary for communication operators - towers, physical communication channels, and relay equipment. The process can be carried out through satellites with specialized equipment.

Some time ago it became known that the development of Russian scientists became interested in South Korea, where, as in China, they implement their own quantum (qubit) technologies in the transmission of information.

Ultra-secure quantum communication channel. Future technologies from MSU


One of the problems that specialists are seeking to find a solution to is associated with the temperature regimes of stable signal transmission and energy costs, which do not allow making the system compact yet - in the form of an ordinary “mobile phone”.
  • Moscow State University
Our news channels

Subscribe and stay up to date with the latest news and the most important events of the day.

48 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +3
    April 9 2018 17: 38
    10 Gigabit / s
    This is not for you to pluck buns from the table. I hope the technology is revolutionary, we will patent and competently sell it. If only the Chinese once again did not steal.
    1. +12
      April 9 2018 17: 57
      Down and Out trouble started.
      Our Earth is not impoverished by talents.
    2. +4
      April 9 2018 18: 14
      What is revolutionism? What has left binary logic? Or is a bit of information transmitted without an electronic magnetic pulse , which means that large amounts of information when transmitting or receiving do not require a proportional increase in energy?
      1. +1
        April 9 2018 19: 27
        Do you mean high energy costs for traffic?
        And the heat generated?
        And why not revolutionism? It seems no one has yet, only experiments ...
        1. +5
          April 9 2018 20: 09
          Firstly, the pulse is already an alternating magnetic field, and alternating magnetic processes cause an increase in temperature in the transistor, conductors and the environment surrounding them. Secondly, it is commonplace to understand that any impulse as well as a code needs to create a new place in space, which means that the process itself is accompanied by an expenditure of energy. Therefore, the fundamental question is how to create code corresponding to email. magnetic impulse, so that there is no mathematical equivalence of energy costs per unit of created "info" code. After all, we don’t sweat too much when we think a lot.
          The main thing is that you do not need to focus on those who do not and cannot. Landmarks should be for something more.
      2. +4
        April 9 2018 19: 29
        If a third-party “observer” is trying to measure these states (penetrate the data transmission channel), then such states will be distorted for him, which automatically makes it impossible to decipher the existing methods of “classical” physics. Not only that, the attempt to decrypt the signal on the line is instantly monitored, which can start the algorithm for stopping signal transmission or switching to an alternative line, however, information will not be lost for the parties exchanging keys.
        Yes, such an option does occur, but only when a photon beam is transmitted through an optical cable. When transmitting from a satellite to the earth by a spatial beam, the diameter of the spot will be the size of the area, if not more, and will be available to everyone who is there. So, in captivity you have to share photons in captivity. And nifiga you will not notice the interception, you yourself create the conditions for its implementation. How much can you say about it!
        1. +3
          April 9 2018 20: 17
          Moreover . What is a photon beam? High-potential processes in plasma or photon processes are similar to regularities occurring in a hydro-gas dynamics. Namely, the beam potential is distributed not only by its linear perturbation vector, but also by the radial processes of interaction with the same medium and in the beam itself. Not knowing these patterns means "poking a finger at the sky." In general, this is due to unforeseen situations when one solution creates more problems than the solutions themselves.
      3. 0
        April 10 2018 00: 58
        Quote: gridasov
        What is revolutionism?

        Have you read the article? It is clearly written, not in some new ways of data transmission, but in encryption.
        1. +1
          April 10 2018 09: 36
          When you communicate with your children and others, then all your information that you would like to express is encrypted, as Boskovec said the poem of Virgil is all laid out in bulk in a basket. And every next moment you need to decrypt this information before understanding your partner. Therefore, the process of generating, encrypting and decrypting this is actually the process of transmitting information in a sequence and form that can only be understood by those to whom it is intended. Therefore, modern approaches to transmitting information are distinguished by the fact that a communication channel is created in space, which is already an Achilles heel. At the same time, it is possible to transfer the space of the information flow with such a variety and variation that it is impossible to decrypt without knowing the complex of systemic nuances. We are now transmitting a program that has a writing language, which means that it is enough to know even a part of the language to reveal all the other components and in its entirety.
          1. 0
            April 10 2018 14: 35
            Quote: gridasov
            We are now transmitting a program that has a writing language, which means that it is enough to know even a part of the language to reveal all the other components and in its entirety.

            I do not agree with you. Under the language, you mean mathematical algorithms that can be calculated. Any language in itself, even knowing some words, will be incomprehensible to you. Specific example. The Americans during the war with the Japanese, knowing that the ciphers can be decrypted (they themselves opened the Japanese ciphers), acted correctly. Namely, instead of ciphers, they used the language of the Navajo Indians (in our case, quantum encryption), which no one knew except the Indians themselves. why in each unit there was a native speaker, that is, an Indian. With every Indian, there was a person whose duty was to eliminate the radio operator in the event of a threat of being captured, and they knew about it. So until the end of the war, they used the language instead of ciphers, and the Japanese could not "decipher". Conclusion, it is impossible to decipher a foreign language, since there are no "keys" or "algorithms" to the language, you just need to know it, and from childhood. Any foreigner, even knowing the Russian language perfectly, will fall into a stupor from the phrase "On a scythe, a scythe with a scythe, mowed with a scythe." In general, where so. Without basic hardware, no quantum encryption can be decrypted.
            1. 0
              April 10 2018 15: 52
              I agree with you .NO! The level of such interactions and information retrieval is determined by the technology of approaches and solutions common to all, corresponding to both that time and the level of scientific, technical and other development. Therefore, for the most part, I am talking about information transfer technologies in a system of very high-capacity and highly dynamic levels of development that will correspond to the immediate future, if not the present. Is it worth it to transmit information to local artificial intelligence, which itself is able to determine the operational solution and which needs only the impulse of the team. Therefore, encryption issues are taking on a whole new quality.
              1. 0
                April 10 2018 15: 55
                Quote: gridasov
                Is it worth it to transmit information to local artificial intelligence, which itself is able to determine the operational solution and which needs only the pulse of the team

                Well, it’s you who have come a long way, you still need to live up to this. Everything is only in perspective. Although, with the current pace of development of information technology, we may also survive.
                1. +2
                  April 10 2018 16: 33
                  If we talk about these processes, we probably understand what we are talking about. So there are methods for solving such problems.
    3. +1
      April 9 2018 18: 57
      all this is nonsense.
      there is only the OPPORTUNITY TO USE + RECEIVE BABL.
      Livashov has long said: the United States has always realized its technical advantage, if it appeared.

      Daring is needed to use such disruptive developments.
      rather than tears of affection "our scientists were able"
      DO YOU HAVE THOUGHT OF MFA AND BANKERS IN RUSSIA?
      to capture the new "red lines" (defend their own-a little)
      1. +3
        April 9 2018 20: 22
        In any case, in order to call something revolutionary it is necessary first of all to have one or several alternative views on the solution of the problem. What about us? We take one non-alternative idea and move to a dead end .... We sometimes do not even know how to create alternative theories as methods. In general, the old methods of analysis and work with large volumes of information do not enter the future.
    4. +2
      April 9 2018 21: 25
      Firstly, the idea, frankly not of the first freshness, is already about 100 years old, like quantum physics itself. The idea is not new, the problem is in practical implementation. And it seems to me from the 95% described in the article that exists only “conceptually”.
      Secondly, quantum data transmission channels are explored all over the world. Every time they report that somewhere there they achieved "teleportation of the photon" x kilometers - it's all about that. And Russia is far from the first among the explorers. And the practical application of these technologies is still far away.
    5. +1
      April 9 2018 22: 54
      Quote: RASKAT
      If only the Chinese once again did not steal.

      Chinese quantum-communications research satellites launch ...
  2. +2
    April 9 2018 17: 42
    One of the problems that specialists are seeking to find a solution to is associated with the temperature regimes of stable signal transmission and energy costs, which do not allow making the system compact yet - in the form of an ordinary “mobile phone”.
    Any state will be fundamentally against an unopened mobile phone ... And therefore, do not flatter yourself ... winked
    1. 0
      April 9 2018 18: 44
      Quote: KVU-NSVD
      Any state will be fundamentally against an unopened mobile phone ... And therefore, do not flatter yourself ...

      I understand that this type of communication is not intended for mobile phones, but rather for special communications channels and the military.
      1. ZVO
        +2
        April 9 2018 19: 59
        Quote: helmi8
        Quote: KVU-NSVD
        Any state will be fundamentally against an unopened mobile phone ... And therefore, do not flatter yourself ...

        I understand that this type of communication is not intended for mobile phones, but rather for special communications channels and the military.


        Do you know. prara years ago, a craftsman in the United States came up with overprotection for mobile phones, ordinary blackberry and others.
        He offered his best practices to the US government - they refused.
        He needed to “recapture” his expenses - and since everyone refused - he brought his products to the free market.
        So.
        he was recently imprisoned.
        For what?
        For the distribution of drugs.
        Allegedly, drug dealers began to buy his phones ...

        The bottom line is this and the truth of life is that no one needs ultra-secure phones.
        Especially if they are not from the court company.
  3. 0
    April 9 2018 17: 43
    "do not yet allow to make the system compact - in the form of a regular" mobile phone. "///

    Judging by the photo for the article, the mobile phone is still far away - there is something to work on.
    1. +1
      April 9 2018 17: 49
      Alexei, they will show us what is really worked out now.
    2. +4
      April 9 2018 17: 58
      Judging by the photo for the article, the mobile phone is still far away - there is something to work on.

      This is not for a mobile phone (SORM will not work) bully
    3. +1
      April 9 2018 21: 24
      Zhores Alferov, father of cellular communications, but implemented the development of Motorola
  4. 0
    April 9 2018 17: 48
    This direction needs to be developed, and working experience, as well as calculations, has no one to share with. In general, I would classify all the information that we possess about such studies in the country, and even so for all areas in the field of microelectronics, and promising technologies of the future, we are far from first in terms of the practical use of research results.
    1. +10
      April 9 2018 17: 58
      Herculesych what happened?
      Write on a quantum line and enemies connect to you distorting information?
      Through a word of error, WHY EVERYTHING IS THE SAME (instead of a about)?
      1. +5
        April 9 2018 18: 03
        Quantums are buggy nepadestststsky. And from this, bits from bytes fall out.
        Writes "o" - it turns out "a" laughing
      2. +2
        April 9 2018 18: 10
        I’m writing from work, the car is in motion, so I’ll hit the wrong letters, alas!
      3. 0
        April 10 2018 04: 18
        Muscovites hoot, Volzhans hitch.
  5. +1
    April 9 2018 18: 14
    If a third-party “observer” is trying to measure these states (penetrate the data channel), then such states will be distorted for him, which automatically makes the decryption inaccessible - This is practically inaccessible to unauthorized persons decryption of data, if you do not have a key to this cipher.
    1. +2
      April 9 2018 19: 02
      Obtaining keys, regardless of the type of communication channel, is a matter of intelligence. Techies need a connection. And fiber, in essence, is defenseless. Microbend, peel off the outer, opaque coating, apply a photodetector, and go. The channel itself, the passing information, is not affected. Detected visually. A lot of serious organizations got into it.
      Like it or not: physical. cable protection, timely change of keys.
      1. 0
        April 9 2018 19: 23
        So they kind of wrote that there would be no cables .. The transceiver is satellite-transceiver ...
        Like a satellite phone ...
        1. +1
          April 9 2018 21: 03
          The article writes about an experimental line of 30 km. Agree, not a satellite scale.
      2. +5
        April 9 2018 19: 33
        Excuse me, Gregory! Opening the shell, you will create a photon tracing and it will be immediately found on the receiving side without any problems. The parties will immediately switch to backup optical fiber. This is a unique Golden Grain of this transmission technology.
        1. +1
          April 9 2018 20: 56
          Arkady, you’re right, of course, but detect photon leaks, count their number at the input and output of the communication line ...
          What really interests the Chinese is what they have achieved.
          They now have a satellite in orbit of 500 km carries a generator of pairs of entangled (interconnected) photons. (modern optics works with single ones) One is radiated to a point a on the ground, the other to b. Over 1000 km on the map already. In one place they act on it, changing the polarization, and the other changes accordingly. It sounds fantastic, but it works. Quantum teleportation is called.
          1. +1
            April 10 2018 06: 23
            Gregory, if all the points of reception and transmission are in space, then work withаby photons seems more plausible. But when photons want to shoot through the atmosphere, the flight of the photon, if I may say so, resembles the flight of a maneuvering head of a rocket due to the inhomogeneity of the atmosphere leading to a deviation of the trajectory (the effect of refraction at the boundary of media with different densities). And what, the Chinese will run with a net for his photon, who will predict the point where he will fall. Another thing is a cloud of photons produced and some of them will really get into the photodetector on the surface of the earth. In space, there are no inhomogeneities, but single photons from the transmitter fly out not strictly along a given optical axis. You know what I mean. And where they will fly after 500 km. Certainly not on a remote photodetector.
      3. 0
        April 10 2018 01: 04
        Quote: KVIRTU
        Getting keys, regardless of the type of communication channel, is a matter of intelligence

        What keys, if without a device they are useless. Read the article carefully
        If a third-party “observer” is trying to measure these states (penetrate the data channel)
        It is written in the channel transfer data. And you can receive data as much as you like, anyway, without the appropriate equipment, they are useless.
  6. +3
    April 9 2018 18: 21
    “... to say that quantum cryptography will provide“ absolute protection ”“ at the level of physical laws ”is wrong: these same physical laws allow all kinds of information leakage via side channels, which must be protected by completely classical methods. And here, by compared with modern cryptosystems, the situation does not change ... "
    But in any case, a grant is equipment, instruments, supplies for departments, scholarships for gifted students, graduate students, etc.
  7. The comment was deleted.
  8. 0
    April 9 2018 18: 36
    Here are the first applicants for the joint use of systems, South Korea and China, guarantors of all on the side. They take too much on themselves.
  9. 0
    April 9 2018 19: 16
    Attempts to realize quantum-mechanical nonsense in iron.
    It will be amusing to look at them all when hackers nevertheless open these "super-protected" channels, like a tin can.
    1. ZVO
      +2
      April 9 2018 20: 01
      Quote: M. Michelson
      Attempts to realize quantum-mechanical nonsense in iron.
      It will be amusing to look at them all when hackers nevertheless open these "super-protected" channels, like a tin can.


      And you say how quickly a 256-bit key is opened ... ???????????????
    2. +1
      April 9 2018 21: 47
      I would not call the nonsense the achievements of academician Alferov, doctor of Moscow State University, the Nobel laureate in this field in 2000.
  10. 0
    April 9 2018 19: 27
    The development of scientists of Moscow State University, associated with the creation of ultra-secure communication channel based on the technology of so-called quantum encryption, gets practical application. We are talking about the so-called "quantum phone", which, in fact, is a computer system with an installed optical-electronic module (EOM). In turn, the EOM is connected directly to the quantum key distribution server.
    It should be recalled that MSU researchers received a state grant for their development at the end of 2017.
    Does Skolkovo rest quietly and smoke aside? And, sorry - quietly continues to "cut" the budget .... sad
  11. +2
    April 9 2018 19: 31
    This dough has been drinking for about two years already. Torsion workers.
  12. +1
    April 9 2018 20: 19
    The development of scientists at Moscow State University related to the creation of an ultra-secure communication channel based on the so-called quantum encryption technology

    Quantum encryption, or as it is also called - quantum cryptography, is the most researched area in quantum technologies around the world.
    1. +1
      April 9 2018 21: 22
      Quantum or under any other name, encryption is a secondary step after the mathematical method of distributing numbers in space. Therefore, the construction of a mathematically inextricable number space is a key task for mathematicians. Moreover, not static spaces, but in any forms and directions of transformation.
  13. +1
    April 9 2018 20: 21
    I think that in the article it would be possible to compare the security of the transmitted information with: the ZAS system (Soviet time); HF communication channel (also of that period); State recognition MAX - XII (USA) and the latest domestic (do not call the code).
  14. 0
    April 10 2018 02: 29
    Water
    Some kind

"Right Sector" (banned in Russia), "Ukrainian Insurgent Army" (UPA) (banned in Russia), ISIS (banned in Russia), "Jabhat Fatah al-Sham" formerly "Jabhat al-Nusra" (banned in Russia) , Taliban (banned in Russia), Al-Qaeda (banned in Russia), Anti-Corruption Foundation (banned in Russia), Navalny Headquarters (banned in Russia), Facebook (banned in Russia), Instagram (banned in Russia), Meta (banned in Russia), Misanthropic Division (banned in Russia), Azov (banned in Russia), Muslim Brotherhood (banned in Russia), Aum Shinrikyo (banned in Russia), AUE (banned in Russia), UNA-UNSO (banned in Russia), Mejlis of the Crimean Tatar people (banned in Russia), Legion “Freedom of Russia” (armed formation, recognized as terrorist in the Russian Federation and banned), Kirill Budanov (included to the Rosfinmonitoring list of terrorists and extremists)

“Non-profit organizations, unregistered public associations or individuals performing the functions of a foreign agent,” as well as media outlets performing the functions of a foreign agent: “Medusa”; "Voice of America"; "Realities"; "Present time"; "Radio Freedom"; Ponomarev Lev; Ponomarev Ilya; Savitskaya; Markelov; Kamalyagin; Apakhonchich; Makarevich; Dud; Gordon; Zhdanov; Medvedev; Fedorov; Mikhail Kasyanov; "Owl"; "Alliance of Doctors"; "RKK" "Levada Center"; "Memorial"; "Voice"; "Person and law"; "Rain"; "Mediazone"; "Deutsche Welle"; QMS "Caucasian Knot"; "Insider"; "New Newspaper"