Securing Fiber Using Light Polarization 152
screenbert writes: "A new and novel way of
communicating over fiber optics is being developed by physicists supported by
the Office of Naval Research. Rather than
using the
amplitude and
frequency
of
electromagnetic waves, they're using the polarization of the wave to carry
the signal. Such a method offers a novel and elegant method of secure
communication over fiber optic lines. This
press release has more information. Of course I always thought that fiber
was always pretty secure anyway since it's a lot harder to tap than copper."
More Secure... (Score:3, Insightful)
Security through exclusivity ("It'll be secure, because we're the ONLY PEOPLE who have the hardware to read it!") doesn't work for very long.
Not that it's easy to tap fibers, anyway... Even if you have the equipment, you have to figure out which fiber out of 288 or more is the one you need, and the documentation is usually kept locked up tight.
Re:More Secure... (Score:1)
Re:More Secure... (Score:1)
Forever. Wireless is a much cheaper last mile solution. Hell, we don't have CABLE everywhere.
"I'm pretty sure that Internet2 is gonna be fiber, but that's only for Universities and major corporations, right?"
I'm pretty sure Internet2 already exists and has nothing to do with fiber or not.
Engage brain before posting.
Re:More Secure... (Score:3, Informative)
Very new systems are quite literally fiber to the curb.
Were it not for the expense involved in termination (and the precision required), fiber into the home would be feasible.
Re:More Secure... (Score:2)
Re:More Secure... (Score:4, Informative)
Re:More Secure... (Score:2, Insightful)
Hence, it'll be secure until anyone with the right dosh can get their hands on one of these recievers.
Re:More Secure... (Score:2, Interesting)
it'll be secure until anyone with the right
dosh can get their hands on one of these
recievers
Not quite, compare the Enigma encryption machine from WWII. The machine wasn't the encryption, just the device (although the machine itself was quite clever). Without knowing the proper setting for the machine, it was near worthless. The allies had their hands on Enigma for several years before they came up with a cryptanalytic method (kudos to the Poles!) that made the physical machine they had worth something. The encryption is in the signal and noise, not in the machine that reads it.
Re:More Secure... (Score:2)
Must...resist...politically incorrect joke........about polish people... and how many it takes.... to say something nobody understands.... argh!
Re:More Secure... (Score:1, Interesting)
However, tapping a fiber isn't that difficult in principle -- you bend it just enough so some light escapes.
Re:More Secure... (Score:1, Interesting)
Which is just security through exclusivity/obscurity, right?
Re:More Secure... (Score:1)
This method of transmission seems pretty much the same... Eavesdroppers can't listen until they get one of these nifty new recievers that can interpret it.
Re:More Secure... (Score:1)
Re:More Secure... (Score:2)
Re:More Secure... (Score:2, Informative)
Re:More Secure... (Score:1)
You learn something new every day.
Re:More Secure... (Score:1)
I'll start over.... The security scheme at work here is not "no one has the hardware to read this signal therefore it's secure." It is actually impossible to test the polarization of a wave without changeing that polarization (a la uncertainty principle). If a third party tries to tap the signal they will inevitably end up changing that signal in a detectable way. The communicating parties will quickly discover they are being tapped and can stop broadcasting immediatly.
Re:More Secure... (Score:2)
Light is finite. If some power is diverted to an eavesdropping reciever, the amount the intended receiver will recieve will drop proportionately.
Most optical recievers are intelligent enough to set off an alarm if light drops significantly during operation, even if the drop doesn't make the signal untenable.
Any eavesdropping has to be very professional or very quickly done, or the eavesdropped have to be very incompetant, for it to not be noticed.
Re:More Secure... (Score:2)
So, the question now is how many of those accidents were really accidents? A fishing ship inadvertently cuts the line, a sub a few thousand miles further down splices into the fiber before they can fix it. The fiber's offline anyway, so no one notices. When they come back online, they'll notice some slight signal degradation, but they'll blame it on their own repair job.
Re:More Secure... (Score:1)
Re:More Secure... (Score:2)
Actually, they only know there is a problem. It could be the NIC's the software, or anything like that. So although I agree with you, I think that detection would only come through basic troubleshooting.
More Secure it ain't (Score:3, Interesting)
Thats the theory behind quantum encryption, in which single photons are used to create a shared key by playing tricks with polarisation. The important point is the words "single photon".
However QE cannot work over long distances because photons get lost (i.e. attenuation). General purpose signalling sends a lot of photons so that at least a few get through (I think the detection level for general purpose detectors without special cooling is around 70 photons). They also get amplified. I'm not sure if fibre amplifiers maintain polarisation. If not then this technique is just an interesting novelty.
So tapping would be easy. Just put the signal through a splitter (e.g. a bend in the fibre) and route your half of the signal to a decoder that works in the same way as the official one. The other end sees a 3dB drop in signal, but thats probably too small to be noticed.
Where this might be important is increased bandwidth. At the moment fibre transmission uses binary keying: send photons for 1, no photons for 0. Polarisation modulation means that you could use several different angles, and hence encode more than one bit per light pulse.
But don't get too excited about the bandwidth either. The limiting factor on bandwidth at the moment is the routers at the end of the fibre. We can pump terabits down a fibre in the lab, and 100 Gbit is pretty straighforward to do in the field. But put ten 100Gbit links into a router and you have to have a machine that can switch 1 Tbit. If the average packet is 1.5kbytes (Ethernet frame) then thats around 83 million packets per second. Even with hardware assist thats an awful lot of address table lookups per second.
Paul.
Polarization? (Score:1)
Somebody explain (Score:3, Insightful)
Re:Somebody explain (Score:1)
Re:Somebody explain (Score:1)
Re:Somebody explain (Score:1)
Re:Somebody explain (Score:1)
Re:Somebody explain (Score:3, Informative)
Simon Singh in its book "The Code Boob" has a interesting explanation of one such system; it is tool lengthy to quote here (and I don't have the book with me now) but I highly recommend reading it.
Re:Somebody explain (Score:1)
On the first paragraph, read "intercept the signal and still be able to re-broadcast it un-corrupted".
On the second paragraph, the correct name is "The Code Book" [amazon.com], as you all probably know.
Re:Somebody explain (Score:2)
Re:Somebody explain (Score:1)
And if resolution of your detector won't give you the EXACT polarizarion, how come you can't just make one that's as least as good as the detector, then they won't be able to tell the difference either...
Re:Somebody explain (Score:2, Insightful)
To reproduce a light polarization you have to modify it, so the one who receives the signal knows that it has been intercepted.
Of course if you're sending unencrypted sensible informations you only know that something bad happened (which is only slightly better than something bad happening without you knowing), but if you're sending data such as the key for an encryption system you can decide whether to use it or not basing on the fact that you're sure whether it has been intercepted or not.
Re:Somebody explain (Score:2)
To reproduce a light polarization you have to modify it, so the one who receives the signal knows that it has been intercepted.
Why can't you just use a beamsplitter?
Re:Somebody explain (Score:1)
Re:Somebody explain (Score:2)
Only for the photons that are observed though, correct? I assume there's some redundancy going on since the receiver isn't going to be able to read every single photon individually.
Not to mention the man-in-the-middle attack, where the message is simply decrypted and then resent. Without a securely distributed key, you're always going to be vulnerable to that.
Anyway, it's probably not as simple as just putting in a beamsplitter, but the article wasn't clear enough to me to understand why. I guess I'll look up quantum encryption when I have some time.
At least YOU'VE got a clue (Score:1, Informative)
A polarizing beam splitter projects any incoming light into either of its two orthogonal states of polarization. In quantum-speak, the state of any incoming photon is thrown into an eigenstate of the observing beam splitter.
However, if many, many photons are passing by, a $200 fused-fiber optical tap (say, from JDSU) we can tap some of them and measure them without throwing the rest into our favorite eigenstates.
Now many people here are spewing absolute bullshit when they say that it's impossible to reproduce a state of polarization. Stimulated emission does just that.
What's impossible is to reproduce the state of polarization of a single photon after it's been measured. There is nothing about single photons in the press release.
Re:Somebody explain (Score:1)
The receiver is able to read every single photon, with a certain probability to read the correct value or not. Then there are ways to tell whether you received the correct photon or not, without actually resending them.
Again it is a matter of what is being sent: for a one time key you can just send losts of photons, and then keep only the ones that have been received correctly (and without being intercepted!)
And yes, a good book on quantum encryption could explain this much better than I can do with vague memories from an uni course for which I haven't tried the exam yet. :)
Re:Somebody explain (Score:1)
As I stated before, this has been around for a long time, and is a foundation of quantum cryptography.
Re:Somebody explain (Score:2)
The probability of picking the wrong polarization is very very large.
Re:Somebody explain (Score:3, Informative)
Who said anything about a 50% chance? If your detector can have a semicircle resolution of, say, 100 degrees, then you only have a 1% chance of guessing the right polarization. 1% * 50% = 0.5%, and as other posters stated, if you don't know the sequence, that means that you have a 0.5% chance of getting EACH bit right, so your entire chances of getting a complete message are almost nil.
And as time marches on, the resolution can only increase...
Re:Somebody explain (Score:1)
If a circle has 360 degrees in it, and you are trying to detect polarization, only half of the circle matters. This is because when one is talking about polarization, one is dealing with a diameter of the circle, not a radius - thus, 181 deg. == 1 deg. for all intents and purposes. The resolution part comes from the fact that you may/may not be able to tell the difference between 1 deg. and 2 degs., thus your semicircle resolution would be less than 90 degs. (360/2 / 2)
Furthermore, while we are on the subject of bullshit and which of it is accurate, lets take a look at yours. First of all, where the hell in random space did u pull that formula of probability=cos(a)^2 ? Anyone who knows anything about math can tell you that that formula was completely randomly thought up. And if you are going to make up bullshit formulas, get your numbers right at least: cos(45)^2=.2759 OR 27.6% !!!
It depends. (Score:2, Informative)
Its really not that hard if you want to. The average script kid might not have the money but for corporate espionage its no problem. Just get a fiber capable router or switch. A quick glitch in the transmission and youre in.
Re:It depends. (Score:4, Informative)
Telecom, tapping a FO cable requires stripping the cable's plastic outer
sheathing and gaining access to the glass fibers within. "When we enter a
fiber bundle, we have instruments that detect whether a given fiber is carrying
a signal before we cut it," North Telecom stated. "A tap could be
accomplished in much the same way."Tapping an optical fiber relies on a macrobending effect. Bending a
fiber 180 degrees around an 1/8-inch radius forces the contained light signal
to go around a tighter bend than it's capable of traversing without some loss
of light. This light loss can be detected and, given the right equipment,
demultiplexed and decoded.
Get it?
Am I understanding this correctly? (Score:2)
I'm asking because the first sentence of the press release makes it sound like these guys invented polarization modulation, and I'm pretty sure I read about that a looooong time ago.
Not just polarization modulation. (Score:4, Informative)
Moreover those random shifts are time-dependent on account of the physical fluctuations in environment of the fiber optic channel.
That makes traditional polarization modulation difficult to do since the receiver has to dynamically track the unknown polarization matrix correpsonding to the transformation, and that is not easy or inexpensive.
This new method obviates the issue by doing polarization modulation in a distinctly new way, wherein the modulation is in the feedback arm of a chaotic erbium doped fiber ring laser. Changes in the modulation (i.e. message being transmitted) is thus fed back into the dynamics of the transmitter somewhat akin to the state of a cypher (though these schemes are not designed or analyzed to resist cryptanalytic attacks)
There are a few things combined as one then: the production of light in high power (EDRFL), chaotic signal masking by transmitting a high dimensional chaotic state, modulation based on dynamical polarization differences. Also, detection methods for polarization usually require "coherent detection" i.e. interferometry with a coherent source (local laser)---those detectors are much more expensive and difficult than amplitude detectors that measure the short term intensity. Greg has previously shown a technique to use the ampltitude only detectors to nevertheless extract the instantaneous (and not time averaged) polarization state on the Poincare sphere so I expect such techniques to be used in this paper as well.
Just polarization differences via time-delay doesn't work either if you don't have a chaotic underlying carrier as too many things cancel.
I previously collaborated with the two of them on chaotic communication in fiber ring lasers; we derived simulations of the equations of motion and amplitude modulation in the chaotic state. They published experimental results on amplitude modulation in a similar setup before.
Re:Not just polarization modulation. (Score:1)
Typing as someone who built erbium fibre ring lasers for his PhD it is so good to finally read a message from somone else with a clue.
pr0n! (Score:4, Funny)
Why the extra security? There's already the depths of the ocean, the difficulty of trying to tap a fiber line, not to mention whatever encryptation they have on their data. They must be looking at some questionable pr0n to go to these lengths.
They are used for other things than pr0n. (Score:2)
Re:pr0n! (Score:1)
Quantum Encryption (Score:2, Interesting)
Re:Quantum Encryption (Score:2)
This ain't quantum encryption. It's much lamer. Read the article. The lame claim is only that the signal is hader to detect, because it's sent at a low level and hidden in noise. Not only is this a bad way to "secure" communications, but bragging that that is what you are doing defeats the whole concept!
Re:Quantum Encruption, lol. I couldn't resist (Score:1)
"If the evil doers can use Encruption whom's to say we can't not interseptualize it?"
Not Quantum Encryption (Score:3, Informative)
Well, er, not exactly.
The technique described in the press release describes a technique for hiding a polarization modulation signal in the polarization state noise inherent in the ring laser system the experimenters used. It's clever, but it's very much not quantum encryption. In principle, it would be possible to siphon a few photons off the fiber and squeeze information out of them, though it would be very difficult. Quantum encryption, as described in the article referenced in the parent post, is a very different technique. It relies on measurements of the polarization states of single photons, not continuous beams. It is immune to (undetected) interception, because tapping the beam irretrievably loses some data (hooray for quantum mechanics.) It is not well-suited to fibre systems--it's difficult to push single photons down a fibre and reliably measure and retain their polarization. It would excel, however, for communcations that could take place over line-of-sight spans, even very long ones.
Re: ! Quantum Encryption (Score:1, Interesting)
But why? (Score:2)
Or... you could use one of the numerous software packages that already exist to "encrypt" your data.
Re:But why? (Score:1)
Re:But why? (Score:2)
Of course, there is nothing stopping anyone coming up with hardware that would record this and then allow the decoding. Though this is where is becomes interesting: imagine if you rotate the polarization of the data through 360 every second, you would then be able to to add add perpendicular signal with junk data - which polarization should the eaves dropper being listening to?
Security is like a fortress, the more walls you put up the harder it is for the enemy to take control. If you don't deal with security breaches then the enemy can get through with enough work. When it comes to computing the more barriers you put up then more expensive hardware is need by the attackers, so you end limiting the threats to a handful who you can easily watch out for.
Re:But why? (Score:1)
Quantum Cryptography (Score:5, Informative)
This isn't exactly new either. Its been around since at least the 70's.
More info:
http://www.cs.mcgill.ca/~crepeau/CRYPTO/Biblio-
http://www.cyberbeach.net/~jdwyer/quantum_c
Re:Quantum Cryptography (Score:1)
FYI, for those not owning photon transmitters/receivers, it might be interesting to know of its vague relative, a software method of communicating confidentially over an insecure link, called Chaffing and Winnowing [mit.edu]. It, too, is based on mere plaintext embed into random noise with keys for the sender and receiver to recognize the right packets off the stream. Unlike in quantum transmission, the participants to the protocol won't notice someone sniffing but the changes for the sniffer to manage to pick up the right packets is near impossible in both cases.
Re:Quantum Cryptography (Score:1)
We need a 'Just plain wrong' moderation.
As many others have typed, this is not quantum crypto.
Re:Quantum Cryptography (Score:1)
Re:Quantum Cryptography (Score:3, Informative)
http://www.simonsingh.com/codebook.htm
Only if you know which 50% (Score:1)
If every bit individually has a 50% chance of being wrong, then you still know nothing. Bits have only two possible states, and if they each have a 1-in-2 chance of being in the wrong state, then they carry no information.
And I always though copper was secure... (Score:3, Funny)
Re:And I always thought string was secure (Score:1, Funny)
Because it was harder to tap than two guys yelling across the yard at each other.
Re:And I always thought yelling was secure (Score:1)
Because that lawn gnome you bought last year is deaf, dumb, and blind
Re:And I always though copper was secure... (Score:1)
All the same, As a kid, my friends and I did this all the time. Come to think of it, we may have invented the conference call.
Re:And I always though copper was secure... (Score:1)
However, it is possible. One would have to lay a taught length any type of transparent monofilament line (probably fishing line), affixed to thinner, lighter can. The tap could be easily missed by visual inspection, and would only lightly contact the main communication line, therefore only minutely changing the angle of the line. The lighter line and receiver would barely change the string resistance, and would be more difficult to detect.
Fiber Optic will soon be tapped..thanks to NSA (Score:4, Informative)
Boy did you think wrong. The USS Jimmy Carter is being retrofitted just for the purpose of tapping fiber optic cable [com.com].
Re:Fiber Optic will soon be tapped..thanks to NSA (Score:2)
The USS Jimmy Carter is being retrofitted just for the purpose of tapping fiber optic cable.
Yeah, what is that supposed to contradict? That fiber is "pretty secure", or that it's "harder to tap than copper"?
Re:Fiber Optic will soon be tapped..thanks to NSA (Score:1)
Re:Fiber Optic will soon be tapped..thanks to NSA (Score:2, Funny)
Re:Fiber Optic will soon be tapped..thanks to NSA (Score:1)
We already know fiber can be tapped. The question on whether it is "more secure" is whether the total cost in resources (manpower, equipment cose, time) is greater for tapping fiber than copper. If so, then it is more secure.
Thats the real metric.
If you are transmitting data that is worth it to the people in ctonrtol of the USS Jimmy Carter to intercept, and you are sending it over fiber under water, then damnit, you had better take more precautions. Security is risk management afterall. Security measures only need to be adequet to manage the risk.
-Steve
It's not a retrofit (Score:2)
The modifications to the JIMMY CARTER are being done in new-construction, a modification to SEA WOLF design. It's an expensive change, sure. But it's not a retrofit. What PARCHE got was a retrofit.
choice quote (Score:2)
How long till speculating on the means are punishable? This shit's not rocket science. Get the fiber, make a tiny scratch in the suface. Focus a detector on the scratch as it reflects the signals. You are done. As for the polarized gadget, it looks like you might have to set up a beam splitter and figure out how many angles they have set up. It's more complicated by not impossible.
Of course, all of this has the ring of Big Brother's underground mole invasion device. Why would you go for a calble under the sea when you could just tap a silly desktop or phone line of interest instead? Kind of like traveling underground when you could just fly. Your tax dollars at work! Buy your 2.4 billion dollar submarine and tap cables today.
Cool (Score:1)
That's OK (Score:3, Funny)
I t@pp3d your f1b3r.. (Score:1)
Securing Fiber (Score:1)
lame, lame, lame (Score:1)
Then, after explaining exactly how a remote site extracts the signal, the offical release says: "This is quite a clever method, which hides the signal in noise," says ONR science officer Mike Shlesinger, who oversees the research. "It provides a definite advantage over direct encoding of polarization, leaving an eavesdropper only chaotic static, and no means to extract the signal." Hiding a signal hardly makes it secure, and certainly does ot do it after you have just told the world how you are hiding it and how you recover it! I wonder if I can get my tax money that was wasted on this back?
Re:lame, lame, lame (Score:2)
Please explain to me (Score:1)
... otherwise known as Quantum Cryptography (Score:2, Informative)
The table of contents is here. [counterpane.com]
Re:... otherwise known as Quantum Cryptography (Score:1)
Repeat after me.
This is not Quantum Crytography.
Now write it out 500 times. Cut and paste is not allowed.
No Security Here (Score:2, Informative)
their "descrambling" method doesn't sound hard - you take the light you receive and send half through a delay loop equal to one circuit through the originating ring laser. then you compare the two signals to obtain the data.
the only eavesdropper this will thrwart is the guy who uses only intensity (and not polarization) measurements. communication using "Polaritons" has been around for a while.
the easy way is to put your light through an birefringent crystal and modulate the input voltage - this produces a change in the polarization you can read out with a simple polarizer. the problem is, when you try to change the phase on a photon fast (like for data transfer), you screw up the frequency. and by screwing up the frequency you reduce the gain of your doped fiber amplifiers and you crowd signal space for other colors (although not much, admittedly).
conclusion: this is useless for sending obscure data. hiding your data in noise is useless if everyone knows how to remove the noise.
muerte
Info 'bout fiber... (Score:2, Interesting)
As for knowing what fiber goes where, again, good luck getting the info. I worked for a fiber optic mapping company for some time (hence why I'm posting AC), I've seen some of the maps and info the companies have for their -own- networks. Many companies are in the process of digitizing their maps, but most often the ones they have now are paper, fairly cryptic, with only one/two people really being 'in the know' as to what they mean, per. region.
The Alien communication (Score:1)
Harder isn't good enough (Score:2)
FTIR? (Score:2)
harder to tap? (Score:2)
with a soldering iron than a butt-polisher.
i readily admit that an optical amplifier has at
least one more stage than an electrical one, but
c'mon, that's just one more component on a circuit
board, if you're using an ASIC for the core.
being less popular doesn't really mean it's
*harder*. but i confess it does mean the
probability of tap is lower.
But doesn't everybody use crypto for sensitive
data? That being the case, physical vulnerability
is down in the noise. Spend your time and money
on key management instead, and you'll be safer.
At least until those quantum well devices start
coming out...
Why not ANY 239-nanosecond delay? (Score:2)
It seems to me that you could do the same thing with ANY modulation mode: just mix two copies of the signal, one delayed by 239-nanoseconds apart, with a noise background, and extract the signal by correlating it against a 239-nanosecond-delayed version of itself.
Seems like a fairly weak kind of encipherment, since all you need to know is what kind of modulation has been used and what the delay is.
Seems to me that even the kinds of ciphers I used to read about in junior high school (Vigenere, etc.) would be just as secure if not more.
I don't see much security just from a novel means of modulation. I mean, sure, if all anyone has are FM receivers you can send secret messages by using AM modulation. And an ordinary 2400 bps modem is pretty secure if all you can do is listen to it with the naked ear...
Bogus (Score:2)
in which the key is the ring radius. But the
time to defeat for reasonable ring sizes will not
be very great. Still, it's a good hardening layer
on top of conventional cryptography.
I know this is NOT Quantum Crypto but.... (Score:2, Interesting)
I know you can't put a quantum crytography signal through an EDFA, thus making lots of copies of the signal photons and giving you enough chances to beamsplit and measure the polarisation states.
How do I know this? Because it wouldn't be a good system if you could. What I want to know is why doesn't this work? What fundamentally stops this happening?
It can't be that Eve might NOT split off all but one of the amplified bunch of photons for any individual bit and thus giving the game away to Alice because Eve could just retransmit from scratch.
Is it instead something about the beamsplitting process? I seem to remember a presentation at Uni from one of the theory guys which implied that 2 identical photons (such as the original and a copy out of an amplifier) are not independantly beamsplit but that instead take to reflection or transmission output path from the beamsplitter as a pair.
Is that right? Or is it something else entirely.
If there is anyone who can reply, that would be great. I know all the experimental side of these things, I built Erbium fibre ring lasers and looked at their output polarisation states for my PhD. I just don't have the quantum theory knowledge.
What if you tap the cable? (Score:2)
Years ago I looked at doing a type of computer generated hologram. It involved something like ray tracing backwards. So instead of 1024x768 pixels and figuring out where the light went, you had a 1024x768x10k and you had to backtrack the other way and add up all the wave interference. Looks to me like you could throw in one more axis for polarization to this system and you'd have it cracked in no time --assuming you do the all the calculation in no time
Rather like "Contact" (Score:1)
Wow - really? (Score:1)
<sheesh>
Re:Phase Modulation Anyone? (Score:1)
Phase modulation the same as polarity? Maybe by some metaphor that I'm missing... Phase modulation is a way of transmitting data via electromagnetic waves. But except for the incidental magnetic waves on the perpendicular axis, phase modulation is a two dimensional function.
Polarity involves changing the angle of transmission in the third dimension. So if you have time on the x-axis and amplitude on the y-axis, the z-axis is polarity. Changing polarity is equivalent to having a two dimsional wave pattern and twisting it in the third dimension. Like if you had a sine wave moving along a really long flat-head screw, changing polarity could be done with a screwdriver. Man what a cool analogy.
But I'm sure our friends in the slashdot community have posted better explanations and links to explanations than this. Interesting stuff.
Re:Why is this useful? (Score:1)
Not even close. That part is easy
The trick with QKD is not Eve retransmitting on the right poln state, it is knowing which state the incoming photon arrived in.