{"id":7251,"date":"2020-06-07T15:55:56","date_gmt":"2020-06-07T15:55:56","guid":{"rendered":"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251"},"modified":"2020-06-18T22:10:36","modified_gmt":"2020-06-18T22:10:36","slug":"securing-our-communications","status":"publish","type":"post","link":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251","title":{"rendered":"Securing Our Communications"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">F<\/span><span class=\"s2\">or decades, the Advanced Encryption Standard (AES) has been the gold standard for securing sensitive data, ranging from military communications to financial transactions. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">But quantum computers, which employ quantum-mechanical phenomena to perform computational operations more efficiently than classical computers, pose an existential threat to the standard algorithmic-based encryption schemes relied upon in today\u2019s environment. <span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">An encryption that may take a classical computer 1,000 years to break could potentially be broken by a quantum computer in a matter of minutes. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">That startling reality has the world looking toward the next iteration of cryptography in the impending quantum era, sparking a battle for quantum supremacy between the United States and China.<\/span><\/p>\n<figure id=\"attachment_7259\" aria-describedby=\"caption-attachment-7259\" style=\"width: 928px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.11.17-PM.png\"><img loading=\"lazy\" class=\" wp-image-7259\" src=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.11.17-PM.png\" alt=\"\" width=\"928\" height=\"503\" \/><\/a><figcaption id=\"caption-attachment-7259\" class=\"wp-caption-text\">Mike Hamilton, professor of electrical and computer engineering, is director of the Alabama Micro\/Nano Science and Technology Center.<\/figcaption><\/figure>\n<p class=\"p2\"><span class=\"s2\">\u201cThe U.S. has significantly fallen behind China in quantum information processing,\u201d said Mark Adams, associate professor of electrical and computer engineering. \u201cChina has beaten us to the punch over the last number of years. The Chinese government has spent a lot of money to increase their capabilities in this area.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">That was evident in 2017 when China launched the world\u2019s first quantum satellite into orbit.<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">To counter, the Department of Defense is supporting wide-ranging research initiatives in quantum information processing, including multiple projects led by Adams and professor Mike Hamilton at Auburn University.<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">One such project, sponsored by the Air Force, is working to advance the quantum encryption work China has demonstrated with satellites by scaling it down for small satellites. With traditional cryptography, an encrypted message can be decrypted with a key that is sent through standard channels. Using a technique known as quantum key distribution (QKD), the message is still sent using standard encryption, but the key itself is a quantum-based key sent via satellite, fiber or another method. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cOur entire project is creating a test bed for evaluating this technology. We\u2019re building the satellites, we\u2019re building the payload, we\u2019re building the ground stations and everything so that we can test how effective this technique is from a miniature CubeSat,\u201d Adams said. \u201cThe Chinese already demonstrated it from a large, school bus-size satellite. We\u2019re trying to take a school bus and condense it down to a small satellite. There are a lot of engineering challenges to put it in something the size of two loafs of bread.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">And these aren\u2019t your standard engineering challenges. For instance, the environment can act on two quantumly entangled particles, causing them to lose their connection, which is known as quantum decoherence.<\/span><\/p>\n<figure id=\"attachment_7260\" aria-describedby=\"caption-attachment-7260\" style=\"width: 870px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.12.30-PM.png\"><img loading=\"lazy\" class=\" wp-image-7260\" src=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.12.30-PM.png\" alt=\"\" width=\"870\" height=\"541\" \/><\/a><figcaption id=\"caption-attachment-7260\" class=\"wp-caption-text\">Mark Adams, associate professor of electrical and computer engineering, is planning a separate research study looking at generating truly entangled optical particles for a small satellite.<\/figcaption><\/figure>\n<p class=\"p2\"><span class=\"s2\">\u201cThis is one of the key challenges of quantum engineering,\u201d said Hamilton, director of the Alabama Micro\/Nano Science and Technology Center. \u201cHow do we take these systems and engineer them so they maintain their coherence and quantum properties as we literally cram them into smaller spaces?\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">At present, Auburn\u2019s QKD setup can only operate at night due to solar blinding, where energy from the sun can wash out signals sent on the typical communication wavelength of 1.5 microns. Adams and Hamilton are exploring a number of options to make their QKD system viable around the clock instead of just at night. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cWe\u2019re looking at using longer wavelengths or lower energy photons that could cause less solar blinding,\u201d Hamilton said. \u201cThen you\u2019re not being washed out by wavelengths from the sun\u2019s energy. Other possible paths include pushing wavelengths deeper into infrared or even going down into microwaves.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">But the biggest challenge researchers face is a fundamental one: how do you generate enough entangled particles to make this system work? Creating entangled particles takes a lot of power and it doesn\u2019t generate many photons, while also creating a lot of heat. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cThere\u2019s a ton of issues with generating entangled particles from an optical standpoint,\u201d Adams said. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">In the interim, Adams and Hamilton are using weak coherent pulses \u2013 not fully entangled particles \u2013 to make their QKD system work with lower photon counts. Adams is planning a separate research study looking at generating truly entangled optical particles for a small satellite. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">The QKD project is nearing the two-year mark, when it will undergo critical design review and the Air Force will decide whether Auburn can go forward with build-out. If given the go-ahead, the satellite could potentially launch into orbit in the project\u2019s fifth year. <\/span><\/p>\n<p class=\"p4\"><span class=\"s2\"><b>Marching toward impenetrability<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Although QKD and other forms of quantum information processing represent a major step forward, the long-term goal is to fully unlock the technology\u2019s encryption potential. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cThe ultimate objective is to have quantum entanglement sources where we could generate the data fast enough to transmit full messages through quantum encryption, but right now that\u2019s just intractable,\u201d Hamilton said. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Until then, like much quantum information processing research, it\u2019s an iterative process to advance the technology by adapting today\u2019s systems to work with quantum systems.<\/span><\/p>\n<figure id=\"attachment_7261\" aria-describedby=\"caption-attachment-7261\" style=\"width: 1109px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.13.18-PM.png\"><img loading=\"lazy\" class=\" wp-image-7261\" src=\"http:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/Screen-Shot-2020-06-04-at-5.13.18-PM.png\" alt=\"\" width=\"1109\" height=\"904\" \/><\/a><figcaption id=\"caption-attachment-7261\" class=\"wp-caption-text\">Equipment is shown in the STORM Lab (Sensors, Transducers, Optics, RF and MEM Lab) run by associate professor Mark Adams.<\/figcaption><\/figure>\n<p class=\"p2\"><span class=\"s2\">\u201cPhysicists may want to work with the most fundamentally quantum components so they can learn about the physics,\u201d Hamilton said. \u201cBut we have the ability as engineers to build some really advanced, hybrid systems that may be quantum for one part and classical for another.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">And these hybrid systems, such as QKD, have some serious upsides from a communication security perspective. If someone were to intercept a quantum key transmission, the key\u2019s sender would know immediately. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cSince the two photons share similar characteristics, if you measure one of those photons by eavesdropping on it, the characteristics of the other one change simultaneously,\u201d Adams said. \u201cThat\u2019s a big security advantage that comes with quantum entanglement.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">As much as American and Chinese defense officials would love to know when they are being overheard by their geopolitical rivals, the two countries are pouring large sums of money into quantum encryption research for a far loftier goal \u2013 a totally impenetrable encryption scheme. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">And that\u2019s exactly what researchers at Auburn University are working toward with QKD. <\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">\u201cAs we understand it today, quantum mechanics forbids you from doing what you would need to do to break the quantum keys,\u201d Hamilton said.<\/span><\/p>\n<div class=\"video-container\" style=\"margin-bottom: 15px; padding-bottom: 35%;\"><script charset=\"utf-8\"src=\"https:\/\/www.buzzsprout.com\/267871\/1154273-think-big-make-small-it-s-a-micro-world-after-all.js?player=small\"type=\"text\/javascript\"><\/script><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Auburn Engineering researchers are working toward unbreakable quantum encryption.<\/p>\n","protected":false},"author":36,"featured_media":7378,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Our Communications &raquo; Auburn Engineer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Our Communications &raquo; Auburn Engineer\" \/>\n<meta property=\"og:description\" content=\"Auburn Engineering researchers are working toward unbreakable quantum encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251\" \/>\n<meta property=\"og:site_name\" content=\"Auburn Engineer\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-07T15:55:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-18T22:10:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/ENG-Communications_webmag.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1275\" \/>\n\t<meta property=\"og:image:height\" content=\"825\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris Anthony\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Anthony\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251\",\"url\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251\",\"name\":\"Securing Our Communications &raquo; Auburn Engineer\",\"isPartOf\":{\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website\"},\"datePublished\":\"2020-06-07T15:55:56+00:00\",\"dateModified\":\"2020-06-18T22:10:36+00:00\",\"author\":{\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e\"},\"breadcrumb\":{\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Our Communications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website\",\"url\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/\",\"name\":\"Auburn Engineer\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e\",\"name\":\"Chris Anthony\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g\",\"caption\":\"Chris Anthony\"},\"url\":\"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?author=36\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Our Communications &raquo; Auburn Engineer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251","og_locale":"en_US","og_type":"article","og_title":"Securing Our Communications &raquo; Auburn Engineer","og_description":"Auburn Engineering researchers are working toward unbreakable quantum encryption.","og_url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251","og_site_name":"Auburn Engineer","article_published_time":"2020-06-07T15:55:56+00:00","article_modified_time":"2020-06-18T22:10:36+00:00","og_image":[{"width":1275,"height":825,"url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/files\/2020\/06\/ENG-Communications_webmag.jpg","type":"image\/jpeg"}],"author":"Chris Anthony","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Anthony","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251","url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251","name":"Securing Our Communications &raquo; Auburn Engineer","isPartOf":{"@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website"},"datePublished":"2020-06-07T15:55:56+00:00","dateModified":"2020-06-18T22:10:36+00:00","author":{"@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e"},"breadcrumb":{"@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?p=7251#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ecm.eng.auburn.edu\/wp\/emag"},{"@type":"ListItem","position":2,"name":"Securing Our Communications"}]},{"@type":"WebSite","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#website","url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/","name":"Auburn Engineer","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/67fb504191c837e5bafcf75823f64f0e","name":"Chris Anthony","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaca01bf696cb00e540ef90b5480e514?s=96&d=mm&r=g","caption":"Chris Anthony"},"url":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/?author=36"}]}},"_links":{"self":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/7251"}],"collection":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7251"}],"version-history":[{"count":7,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/7251\/revisions"}],"predecessor-version":[{"id":7409,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/posts\/7251\/revisions\/7409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=\/wp\/v2\/media\/7378"}],"wp:attachment":[{"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ecm.eng.auburn.edu\/wp\/emag\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}