It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Today, the Department of Energy (DOE) announced America’s Blueprint for the Quantum Internet. When developed with DOE’s National Labs and private sector partners, the Quantum Internet will offer a world of new possibilities and opportunities.
The Quantum Internet will one day connect computers that can solve challenges of incredible complexity, enabling a faster flow of information and opening up entirely new areas of scientific research and economic development.
We now have the Blueprint to make this Quantum Internet a reality, and I am elated to share our plan with you all today.
As part of DOE’s effort, Argonne and Fermi National Labs will continue to play a critical part in our effort to develop this Quantum Internet and realize its many benefits.
These experts are already making extraordinary achievements. For example, in February, the Chicago Quantum Exchange – anchored by the University of Chicago and Argonne and Fermilab – launched a 52-mile testbed for Quantum communications amongst several other universities, which will allow scientists and engineers to address the challenges of operating a Quantum network under real-world conditions.
Of course, the research benefits from “Quantum sensors” will also be transformative for our entire way of life. Quantum sensor networks could be equally transformative, with applications ranging from increasing our understanding of dark matter to improving the resolution of extra-solar planets to making better predictions of volcanic eruptions.
Eventually, we will connect all 17 DOE National Labs as the backbone of the Quantum Internet. We’ll also add in universities and private sector partners, working with a broad community of individuals and institutions with diverse and complementary skill sets.
Figure 2:1. Concept of a cascaded quantum network protype using classical network control interacting with nodes equipped with quantum hardware. Reproduced from “Proc. SPIE 9873, Quantum Information and Computation IX,” 98730B (2016)
Figure 2:2. Quantum path and routing of entangled photons using SDNs using the Chicago quantum network
Figure 2:3. Example of a one-hop, first-generation quantum repeater. Two sources generate independent entangled pairs A-B and C-D. One member of each pair, B and C, are brought together and interfered at an intermediate location, projecting the B-C pair onto one of four Bell states (Bell state measurement). This partial collapse of the four-particle wavefunction results in the two remaining particles, A and D, being in an entangled state, separated by a long distance.
Figure 3:3. Long Island quantum network extended to New York City. The network will use a chain of quantum repeaters, extended across Long Island via three entangled sources, six quantum memories, and two entanglement swapping stations. Using ESnet’s existing fiber infrastruc-ture, the network will connect SBU to New York City via Brookhaven Lab with intermediate stations on the two campuses and in Garden City, N.Y. This is expected to be the first quantum repeater network of its kind in the world.
originally posted by: hombero
Virtually unhackable... as if a quantum medium would change the nature of the machines that communicate accross it.
Hogwash.
a reply to: Anon283799
The thread title says "quantum internet", not "quantum computer". "unhackable" is a bit of an oversimplification in one word, but it's not totally erroneous to claim that's more or less possible for a quantum internet.
originally posted by: Zcustosmorum
Totally agree, quantum computing doesn't mean "unhackable", in fact with the increased speeds, it actually makes password breaking much faster. So unless new methods of security are implemented where required, it won't change anything.
originally posted by: olaru12
"Quantum" is BS promotional jingoism to lure investors into questionable technology. It should work great!! I might even throw in a few bucks, but before I do, show me something besides charts and graphs. And I don't mean Hardys paradox double slit crap; something practical perhaps?
originally posted by: Arbitrageur
The gritty details are that in fact the quantum communication channel could be "hacked", but the reason they say it's "unhackable", is because there is a method of detecting any such hack, and of course one could program the channel to cease communication as soon as such a hack is detected. So the hackers get nothing, and in that sense it's essentially "unhackable". I would suppose the military would be the earliest adopter. This is from page 11 of the pdf in the OP:
"it is the information exchange over a quantum channel—with its ability to detect any interception—that offers the ultimate in secure communication. Early adopters for such future solutions will be found in areas such as national security, banking, and energy delivery infrastructure."
The basic theoretical ideas are sound, but implementation and working out the kinks, like the current distance limitations, will take time.
Yes that's right, it can detect passive listening. The overview documents don't go into the technical details but here's how it works in simple terms:
originally posted by: SleeperHasAwakened
But this sounds different, as if the two parties can detect a data leak where someone else passively listens in on the transmission, but doesn't try to change the message.
That article goes into a little depth about the problem I mentioned in my earlier post about the difficulties in implementing such a method over long distances.
More specifically, each node of a quantum network consists of quantum processors, which rely on quantum bits, or qubits, instead of classical bits. Qubits can exist in multiple states, known as superposition, allowing them to perform multiple calculations at once, while traditional bits are confined to only a 0 or a 1, limiting them to one calculation at a time. When one quantum processor changes the states of its photons, the corresponding entangled photons are changed in the other quantum processor, thus transferring the necessary qubits.
One benefit of this is that it creates an unhackable system of communication, in that any attempt to eavesdrop or intercept the information would disentangle the particles. This would alter the message and make it immediately obvious that a hacking attempt had occurred.
originally posted by: Arbitrageur
Yes that's right, it can detect passive listening. The overview documents don't go into the technical details but here's how it works in simple terms:
originally posted by: SleeperHasAwakened
But this sounds different, as if the two parties can detect a data leak where someone else passively listens in on the transmission, but doesn't try to change the message.
Quantum Communication Just Took a Great Leap Forward
That article goes into a little depth about the problem I mentioned in my earlier post about the difficulties in implementing such a method over long distances.
More specifically, each node of a quantum network consists of quantum processors, which rely on quantum bits, or qubits, instead of classical bits. Qubits can exist in multiple states, known as superposition, allowing them to perform multiple calculations at once, while traditional bits are confined to only a 0 or a 1, limiting them to one calculation at a time. When one quantum processor changes the states of its photons, the corresponding entangled photons are changed in the other quantum processor, thus transferring the necessary qubits.
One benefit of this is that it creates an unhackable system of communication, in that any attempt to eavesdrop or intercept the information would disentangle the particles. This would alter the message and make it immediately obvious that a hacking attempt had occurred.
That's a valid principle but that's not exactly what they use, which is what Einstein called "spooky action at a distance", otherwise known as quantum entanglement. They create entangled photons in pairs, and as long as only the two parties Alice and Bob compare the pairs of photons, they correlate as entanglement says they should. When a third party eavesdrops, they also capture some of the entangled photons, so when Alice and Bob compare their pairs of photons, they no longer see full correlation, and figure some photons must be going to a third party passive listener, and their communication is shut down to prevent the hacker from getting anything.
originally posted by: SleeperHasAwakened
Sounds a little to me like Heisenberg's Uncertainty Principle (measuring/testing a system will actually influence its behavior), but this is at the edge of my physics acumen.
Thanks for explanation.