Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
United States Technology

U.S. Hatches Plan To Build a Quantum Internet That Might Be 'Unhackable' (washingtonpost.com) 75

U.S. officials and scientists unveiled a plan this week to pursue what they called one of the most important technological frontiers of the 21st century: building a quantum Internet. From a report: Speaking in Chicago, one of the main hubs of the work, they set goals for forging what they called a second Internet -- one that would function alongside the globe's existing networks, using the laws of quantum mechanics to share information more securely and to connect a new generation of computers and sensors. Quantum technology seeks to harness the distinct properties of atoms, photons and electrons to build more powerful computers and other tools for processing information. A quantum Internet relies on photons exhibiting a quantum state known as entanglement, which allows them to share information over long distances without having a physical connection.

David Awschalom, a professor at the University of Chicago's Pritzker School of Molecular Engineering and senior scientist at Argonne National Laboratory, called the Internet project a pillar of the nation's quantum-research program. "It's the birth of a new technology. It's becoming a global competition. Every major country on earth has launched a quantum program ... because it is becoming clearer and clearer there will be big impacts," he said in an interview. The United States' top technology rival, China, is investing heavily in quantum technology, a field that could transform information processing and confer big economic and national security advantages to countries that dominate it. Europe is also hotly pursuing the research. The Energy Department and its 17 national labs will form the backbone of the project.

This discussion has been archived. No new comments can be posted.

U.S. Hatches Plan To Build a Quantum Internet That Might Be 'Unhackable'

Comments Filter:
  • by Mr. Dollar Ton ( 5495648 ) on Friday July 24, 2020 @10:26AM (#60326321)

    it will both be there and not be there.

  • Prediction: (Score:4, Informative)

    by snarfies ( 115214 ) on Friday July 24, 2020 @10:30AM (#60326333) Homepage

    Will be "hacked" within 24 hours of its public release.

    • At some point, a Hall Effect-like observer will spy the quantum state. Any modicum of state-invisibility due to quantum pairing will evaporate, and the billions used to finance this nonsense, with it. Or an inference engine will devolve the pairings or a state engine that can re-pair-at-distance will simply suss the state for "the other side"

      Perhaps a 13 year old kid from Alberta will simply find the backdoor to the compute engine bridge on AWS used in the experiments and use it to host his game logic.

      This

      • Nah, it will be much mich simpler.

        A random kid, calling on the phone, talking somebody on the inside onto a blunder. The equivale to the $5 wrench.

        Or a simple stack overflow or pointer error in the code of some random library in the recipient's network stack turning the fact that third parties can predictably alter the stream into a weapon.

        After which the network will start to very reliably transmit the hacker's data in an unhackable way, as he will have fixed the bug. :)

        • s/onto/into/

          Though... Everything can be put "onto", if you're brave enough. ;)

        • There is also the tinkering with pairs. If some become randomly unpaired, all bets are off. Winky pairs could be vast amounts of fun. Local magnetic storms, quark bombardments, random flatulence, whatever it takes.

          But billions will be burned, great dump trucks of $100 bills, thrown into the quantum pit with glee, all in the name of secrecy, a parallel network, when the aims of Internet II died after billions spent.

    • Re:Prediction: (Score:4, Insightful)

      by Lonng_Time_Lurker ( 6285236 ) on Friday July 24, 2020 @10:45AM (#60326387)

      It all depends on what "is" is, and what "hacked" is. Someone or something normally has to access someone or something. Often the thing that's hacked is not the protocol it sits on, but the process of authentication or authorization.

      This is the same as the decentralized ledger arguments. Sure, maybe you can't change the ledger, but if *someone* can (say on their part of the ledger), then *someone else* can pretend to *be that someone*.

      I'm skeptical unintended data movement will ever be fully stopped. People can't even use decent passwords.

    • Will be "hacked" within 24 hours of its public release.

      That's entirely possible, because hacking something only involves breaking the weakest link in the security chain. You can't build an entire solution out of "unhackable" quantum communication channels. There will always be many other links in the chain, including the human users and operators.

      Currently, all of the recommended standard encryption and hashing algorithms are still "unhackable" as well. However, when people incorporate them into complete systems, the end results are routinely riddled with vulne

      • Re:Prediction: (Score:4, Insightful)

        by CaptainDork ( 3678879 ) on Friday July 24, 2020 @12:54PM (#60326913)

        Yeah, good point.

        I'm a quantum mechanics fundamentalist and the first step (which the article is WAY ahead of) is to get shit quiet enough to behave.

        Go look at the current quantum computers. 99% of the fucking thing is refrigeration.

        And, anyhow, they will be operated by people clicking on malicious email attachments or going to trappy web sites or simply accepting payment to be an insider.

        The problem with the current Internet can be isolated down to the fucking chair in front of the computer.

    • Most hacks today are not from decrypting the current Encryption data stream But from either a flaw in the software, from an action from someone from the inside. That guy who clicked the link!, or the employee who wants their employer to pay for their misdeeds.

      There is little real hacking going on from packet sniffing data, then trying to decode it.
      1. Modern Switches and router do a much better job than the old hubs, in terms of directing traffic in a closed connection to its end source.
      2. Decrypting data is

    • Only state hackers can do it due to the cost of quantum equipment.
      • Nope. The signals are usually transmitted via photons, along fiber-optic cables. There have *already* been hacks of this approach, exploiting the 'allowable error rate' of the transmission. As long as the sampling of the cable doesn't push the error level over that threshold, signals can be intercepted without the sender & receiver knowing. This kind of gear runs thousands to tens-of-thousands (USD). Well within the means of many hackers.

        Encryption is another item entirely.

    • But the applications are not quantum yet. we need to build quantum apps to use the quantum internet.
  • by nospam007 ( 722110 ) * on Friday July 24, 2020 @10:34AM (#60326357)

    I'm sure.

  • 1. Claim it is unhackable.
    Done.
    No more step 2.

  • by DontBeAMoran ( 4843879 ) on Friday July 24, 2020 @10:51AM (#60326405)

    After wires, wireless!
    After wireless, wirelessless!

  • by DontBeAMoran ( 4843879 ) on Friday July 24, 2020 @10:52AM (#60326413)

    If they say Quantum communications cannot be hacked, we'll have to take a Leap of faith and believe them.

  • As soon as the FBI got word of a plan for an "unhackable internet," they immediately set their PR firms and governmental lobbying efforts into play. Before the plan ever left the ground, the legislatures were hearing about how many children would be raped if the Quantum Internet were to go into effect.

    Technology companies espoused how this will come to be, and the United States should be a leader in new technology. In contrast, the FBI kept foaming at the mouth about how drug dealers would go unpunished an

  • secure network is no good if computers on either end are compromised. which is mostly how things are done now.
  • Quantum cryptography has been a welfare project with no purpose or added security from the start. Should have stayed a thought experiment.

    So you have to man in the middle two channels instead of one ... big woop. Traditional cryptography will remain the corner stone for the security.

    • I mean, Quantum Cryptography is uncrackable. Traditional cryptography will remain the corner stone because it doesn't require a direct fiber drop between the two parties.

      It's not just two channels. It has a secure channel and a public channel.

    • So you have to man in the middle two channels instead of one

      You can't man in the middle both channels. Because getting in the middle will change the message that the other end receives and the handshake will never complete.

    • Your comment exemplifies how little the general technical and IT community understands about quantum cryptography. Okay, the man-in-the-middle attack is solved, just as it is solved in all classical cryptography, by authentication. The present generation of quantum key distribution uses Wegman-Carter authentication for that, which is unconditionally secure. (Now if we ask about the initial authentication before the first quantum-generated key, things get more interesting.)

      We can argue about "should have sta

  • by istartedi ( 132515 ) on Friday July 24, 2020 @11:01AM (#60326453) Journal

    My BS meter is wiggling. I'm thinking that putting "quantum" in front of stuff is going to be the latest ticket for $$$. "We're developing quantum sewage treatment technology". Beautiful. Here's $3 billion to get started.

    • It's a form of physical cryptography, offloading the heavy math to laws of physics.
      • by gweihir ( 88907 )

        It's a form of physical cryptography, offloading the heavy math to laws of physics.

        With the little problem that these "laws" of Physics used here are theoretical models. There is absolutely no assurance they will hold up to the degree needed in this application.

    • by mssymrvn ( 15684 )

      Imagine what could happen if you put blockchain in your quantum?

      *boom*

    • Also, a lot of hacking exploits human weaknesses, not technical weaknesses. (Like sending emails looking like they come from the victim's company)
    • by thegarbz ( 1787294 ) on Friday July 24, 2020 @12:12PM (#60326705)

      Err not only can you transmit data via quantum entanglement, it's already been done both in a lab and in a field test. In fact the only counterclaims ever made to quantum entanglement is that it can't be used to transmit data superluminally i.e. faster than the speed of light.

      Why did you get modded up, do the Amish get mod points now?

    • Engangled particles don't transmit data. My BS meter is wiggling.

      I know someone who actually worked on making quantum secure communications a reality. The purpose is to prevent man-in-the-middle attacks and detecting when the fiber optic cable has been tapped. I don't understand the details myself but it's possible tell if photons have been added or removed using entanglement.

      It's some crazy quantum stuff but it's absolutely real: https://www.technologyreview.c... [technologyreview.com]

    • by Jyjon ( 7073569 )
      Quantum Internet will allow Communication between the Quantum Sewers and Quantum DNA Lab to track your poop thru the sewers to the oceans. The Quantum Fisheries will be able to track which fish has eaten you poop so you won't have to eat your own Sh*t like the people who wrote this crap article.
    • Its not about transmission, itâ(TM)s about spy and tamper proofing.

    • by gweihir ( 88907 )

      It is complete BS. You cannot even communicate this way. All you can do is generate a shared key, and if you are very, very careful in the physical implementation (most/all implementation so far have been successfully compromised), a listener cannot know that key. You know, just like Diffie-Hellman already gives you when both parties know the public key of the other party before communicating.

      After that key-exchange, you have to go to conventional symmetric encryption anyways or you will get data-rates that

    • We're talking Artificially Intelligent, Blockchain, Quantum Communications here. Not only can it not be hacked, It'll create a distributed network with untraceable indestructable messages that will persist for all eternity. Elon Musk will be delivering it to you and I within months (subject to the usual schedule slips).

  • Maybe in 2020 I'm also growing hypersensitive (apparently all the cool kids are, these days) but "hatches" has a negative connotation. Was that intentional?

  • And it will be called... the Titanic.

  • by RobinH ( 124750 ) on Friday July 24, 2020 @11:24AM (#60326519) Homepage
    There's an xkcd for that [xkcd.com].
  • by Big Bipper ( 1120937 ) on Friday July 24, 2020 @11:28AM (#60326533)
    Congress will ban end to end encryption
  • China, is investing heavily in quantum technology, a field that could transform information processing and confer big economic and national security advantages to countries that dominate it.

    So we've had a missile gap, a mineshaft gap and if we've not careful, soon, a quantum gap

  • by WaffleMonster ( 969671 ) on Friday July 24, 2020 @11:37AM (#60326565)

    "Quantum Internet" is like having an Internet with an OTP pool that never runs dry.

    And just as worthless. Symmetric encryption does not scale and crypto compromise is not the source of todays security failures.

    Interconnecting quantum computers is of dubious value given there is still no evidence significant exponential scaling is tractable and doubling performance by doubling the number of computers is no different than what exists today.

  • Quantum networking doesn't solve anything that needs solving. All it can do is a secure key exchange and it is terrible at that. First both parties have to know who each other is, they have to know this ahead of time. They then have to set up a dedicated connection between them. At this point they may as well walk a hard drive over to each other with a few symmetric billion keys. The real hard parts of security is knowing who you are supposed to talk to and figuring out if you can trust them. We can s
  • the Great Firewall of China, just a draconian censorship plan with heavy government oversite, the gov is doing it because they hate free speech, nevermind the first amendment - if they dont like what you are talking about they will find a way to put a stop to it
  • Or at least pointless to hack. Once everyone is unemployed and broke the Internet will fill up with memes and cat pictures. This will become the currency of the future. Hackers will have to demand cat pictures to decrypt your harddrive because nobody will be able to afford bitcoins when they're $500,000 each (hopefully after John McAfee eats his own wiener)

  • by Solandri ( 704621 ) on Friday July 24, 2020 @12:23PM (#60326771)
    As long as people are using 123456 as their password [slashdot.org], or a Twitter employee is willing to give anyone access to accounts [slashdot.org], and companies allow their servers to be hacked [slashdot.org], securing communication over the Internet won't really change anything. I can't think of the last time I heard of someone gaining access credentials by sniffing network traffic (WEP and WPA1 were cracked sniffing local traffic, not traffic over the Internet at large)..
  • You can create the most bombproof version of the 'internet' as many times over as you want but if the same humans are going to use it then you're going to have the same problems every single time. You'll have the same corporations with the same objectives and policies shitting it up with the same shit we have right now, you'll have the same shitty braindead people accessing it and filling it up with their shitty excuses for content, you'll have the same Bad Actors, foreign nationals, criminals, ne'er-do-wel
  • Quantum computers and quantum cryptography have one thing in common - the word quantum.

  • it will last that little bit longer.

    Hackers will simply see it as a challenge, and crack it with zero-day results.

    'Nuff sed

  • Our government does not appear to like it's citizens being able to send messages it cannot read, So while this is cool and all, I cannot imagine the US allowing this into the hands of the common rabble.
  • As long as people are involved, I'm not too convinced of that.
  • Why am I reminded of "Halting State" by Charles Stross?

    I think it's the idea of "bleeding edge" countering "first mover advantage".

  • Yep, its only a matter of time.

    Come see the girls of Alpha Centauri VI!!!

    Live streaming!! Your tokens get them XXXTra Hott!

    Hot girls from Proxima Centauri want to meet you!! See just what they can do with that third lower gangleon!! Youll cum in seconds!

  • Nothing is unhackable. There are always zero days, chances are several people know and haven't said anything. It doesn't matter what the subject is either.

    Security can be overwhelmed with a large enough DOS. Security can be underwhelmed by idiots working in a call center who may or may not be taking bribes or being blackmailed. Security can be defeated by the mob rioting, looting or burning about something that happened on the other side of the world that you had nothing to do with.

    Security can be obliterat

  • So ... there's already an Internet 2. It's for academia to have a "really fast Internet cause we need it and spam and stuff" except it's obsolete and hardly used and just a waste of taxpayer dollars.

    Secondly there's no such thing as quantum networking, but hey let's pretend there is, and information sent from point A to point Z is quantum entangled and unviewable without destroying it, so for practical purposes it's encrypted. The US federal government doesn't want encryption so that's a pretty strong bar

  • might might might

    He mighta been a contender.

  • But the applications are not quantum yet. we need to build quantum apps to use the quantum internet. Quantum Apps is the buzz word for the duture

"...a most excellent barbarian ... Genghis Kahn!" -- _Bill And Ted's Excellent Adventure_

Working...