In my humble opinion, I do not believe quantum computing will mainstream this decade. By mainstream, I mean it will be accessible to many and not have to be isolated in a near absolute zero environment.
That being said, however, one of the vectors that quantum computing is heavily involved in is AI. One can only imagine the capabilities a quantum computer will be capable of when integrated with deep learning AI.
A second segment that has cryptologists salivating is cryptography. Quantum computing has the potential to revolutionize cryptography to the point where secure communications, it is said, would be un-hackable.
This kind of secure communications is made to order for any platform that uses wireless communications. No matter how simple or complex the communication is, it can be secured with a quantum key. And, the nice thing is that the key does not have to be uber-secure. The fact that any quantum relationship reveals that is has been observed. That means that even a simple two-bit key is workable for some applications. I am willing to bet that most of us do not really care what simple data a smart sock contains. But we do care if it is compromised and acts as a conduit to allow access to critical data.
So by putting quantum keys on everything out there, probably the single most fearsome threat in the universe has been rendered moot – simple in theory, not so much in practice. We are a long way from deploying even the most basic of quantum cryptography (QC for this discussion) in a ubiquitous fashion, but the theory is sound and discussions around it are exciting – and it will happen. So, let us drill down on QC and see why it makes a bulletproof security scheme.
What is so exciting about QC is that it removes the ability for a hacker to eavesdrop on a system and obtain the “secret” key that secures the communications. Today, no matter how complex or convoluted the key is made, it can be compromised. QC eliminates that issue by what is called quantum key distribution (QKD). QKD security is created when random data is encoding on individual photons quantum state. Then, these photons are transmitted over a quantum channel.
It works like this: let us say a hacker tries to take a measurement on a qubit that is in a particular state of superposition. When that attempt is made, the quantum system will be altered, and changed, or reduced to one of the two possible states, by the hacker’s detector. This disruption to the original state will show up as an increase in the quantum channel bit error rate (BER) and alert the user that there is a presence on the quantum channel.
While most of the readers of this publication are likely aware of the theories around quantum theory (or mechanics/physics), before we delve into how this works, it might be in order to present a brief discussion on the principles of quantum physics that makes QKD possible.
There are two fundamental quantum theory principles. One is the wave-particle duality theory that presents the concept that quanta exhibit both wave- and particle-like behaviors. Wave-like behaviors are those such as refraction, particle-like behaviors include such concepts as particles cannot be in two places at once, and they cannot share space with another particle. The duality principle is often debated as to its validity and is said to exist only when certain things occur i.e. quanta observed, a wave function collapses, or two quanta interact. But this is just mentioned here in passing.
However, the second principle, the uncertainty principle, is much more valid and relative to communications. It states that any attempt to measure any attribute; velocity, position, spin, etc. will affect a change in other attributes. It also involves superposition (the existence of certain relations among states), and observer status. The status of the observer (observation will cause the wave function to collapse to a specific state).
As it turns out, the uncertainty principle is exactly what the doctor ordered for quantum communication security. In a nutshell, if there is any action upon the QKD, it changes the quantum state of the photons that characterized the cryptographic key. Any attempt to intercept, or view the key, alters the quantum state, which immediately points to a security breach and renders the key useless. This remove this weakest link of the current system.
Quantum Communications 101
QC uses quantum physics’ entanglement and other nonlocal characteristics to transfer the quantum state of photons from one location to another. While quantum theory may be the pièce de résistance of secure communications, it is far from being ready for prime time. And, at the present time, the only success has been with photons (vs. atoms or ions), and in the lab, or other experimental environments. While it seems simple, in theory, sending photons as a one or zero and if it is disturbed, its state is altered, there is so much more to making that actually happen.
The biggest challenge in photon-based schemes is the fact that photons disappear in the quantum channel. If the medium is fiber, they get absorbed or get scattered. In a free space medium (lasers), there is no birefringence so the distance is greater, but the photons are still subject to intense backlight, diffusion and absorption, atmospheric turbulence, and decoherence. So until these issues are overcome, space-based quantum communications remain on the testbed.
But that doesn’t mean there are not successes. The process has been proven to work. As far back as the late 2000s, some success has been achieved in setting up quantum channels. These experiments have shown that cryptographic keys can be distributed over tens of kilometers, maintaining quantum entanglement, and the observation properties required for secure communications. So we know we can do it. Tens of km is now, tens of thousands is the sweet spot (the top goal is to hit the geostationary satellites just under 36,000 km). Channels have to be able to reach satellites for practical applications. The current record is just over 144 km1, which is several years old, and new work being done by both China and the U.S. that is looking at fiber channels up to 10,000 km in the near future.
Drilling down on challenges
Quantum physics has the unique capability to deliver, from one point to another, strictly correlated strings of bits. These strings come with the explicit assurance that there is no copy of these bits exist anywhere else in the universe. That is by the laws of nature and does not rely on mathematical assumptions. Thusly, this is the perfect storm – two strings of correlated bits can offer unequivocally secure keys with 100 percent guarantee the keys cannot be leaked.
But, to get this ready for prime time means overcoming some huge challenges. One of which is the isolation of the propagation channel. If quantum objects interact with the environment, they lose their quantumness and revert to becoming a classical object.
The Earth’s atmosphere will absorb most of the photons transmitted from the ground. The further the distance, the more absorption occurs. One experiment, that was done to see if longer distances can be achieved, used the theory that each pulse will have a precise number of photons. This number would be such that, on average, only a single photon would reach the satellite and be reflected back to Earth. However, the gotcha is “on average.” To make this reliable would mean that a methodology would have to be devised to make the reliability much higher. Not just N number of pluses, and catch a single photon every now and then. Still, it proved that it can be done.
Another challenge is distance. Not just from the earth to a satellite, but from point to point on earth. This can be overcome with the use of repeaters and free-space optics (FSO) over which the entanglement can be teleported. While this might be practical for terrestrial links, it will not work for space-based distances.
How it might work
Optical fibers and free space are the two media through which photons can propagate. For optical fiber, the frequencies are 1300 and 1550 nm, for free space the most desired are 800 nm or longer wavelengths from 4 to 10 microns (4000 to 10000 nm).
One particular experiment used a pair of telescopes set up in a binocular fashion. They were pointed at an orbiting satellite about 400 km out. In this particular case, a satellite was chosen that could bounce a laser beam back to earth, to its original position. Then, one telescope was used to shoot a pulse at the satellite the second one was used to observe the reflection.
Simple in theory, but as was discussed earlier, it turns out the majority of the pulses are lost. Here, each pulse was beamed out with about a billion photons. Only one, if any, started the return journey. Not only are most of the photons lost leaving the earth, but reciprocally, just as many would be lost on atmospheric re-entry.
So the ensuing work turns up some inserting metrics. It seems that it takes several billion pulses per second to get a respectable return. According to Jian-Wei and Co., one of the experimenters, it takes that many outgoing pulses to get about 600 returning photons per second. These results are sufﬁcient to set up an unconditionally secure QKD link between satellite and earth, technically. However, this is all still on paper and nothing has been actually developed to support these results.
The relationship between QC and entanglement
One of the most interesting phenomena is entanglement and how it enables QKD. Quantum entanglement is a physical phenomenon that says that if certain generated groups, or pairs, of particles are bound in such a way that the individual particles cannot be described independently. The only way to describe them is to give them what is called a “quantum state” that describes the makeup of the systems or groups/pairs of, in this case, photons. The various properties of entangled particles – spin, momentum, polarization, position, etc. are expressly correlated with each of the individual particles.
For example, say a pair of photons are entangled in such a way that one of the properties, spin, for example, is known to be zero. That means that they are axial opposites, i.e., if the spin of one of the particles is clockwise, the other must be counterclockwise.
In QKD, such a system can be used to define a bit within a cryptographic key. This process is simply repeated for however many bits are desired. And, as was discussed earlier, any attempt to view this entanglement will “act” upon the particle and collapse the state. Viola! Unbreakable cryptography
Quantum cryptology (and its crypto components) is a mind-bending concept that baffles even the most experienced scientists. Those who try to understand what is going on are stymied by the diversity, age, and code complexity of the various software components. And, while cryptographic core algorithms have been well-studied, other components in enterprise cryptosystems are less understood. It is no wonder this field of science incites so much controversy.
What else holds so much promise and excitement as quantum anything? It has the potential to revolutionize and secure communications, and that is only a small vector.
In the future, it will be possible to send totally secure, hack-proof messages around the planet. This has tremendous implications for governments, the military, commercial organizations such as banks, and, the next great enabler, the Internet of Anything/Everything (IoX), as well as 5G. And, such communications can be totally independent of the Internet.
And this is just the tip of the iceberg. Researchers in quantum entanglements are looking at elements such as time and energy as entanglement options as well as polarization.
What all this will look like 10 years from now is hard to predict. But I think once we get it off the test beds and get some real-world working applications, the sky will be the limit and I can freely give out my credit card data.