Physics

Quantum Communication is expanded through the Use of Microlasers

Quantum Communication is expanded through the Use of Microlasers

Quantum communication is an application of quantum physics that is closely related to quantum information processing and quantum teleportation. Its most intriguing application is the use of quantum cryptography to protect information channels from eavesdropping. Quantum key distribution is the most well-known and developed application of quantum cryptography (QKD). The use of quantum mechanical effects to perform cryptographic tasks or to break cryptographic systems is referred to as QKD.

The vulnerability of digital communication is one of the most serious threats to our interconnected world. Hackers create new methods to steal our identities, money, and secrets. Cryptography is the science of secrets, allowing information to be exchanged over long distances while remaining hidden from unauthorized eavesdroppers. Most modern cryptographic methods rely on problems that digital computers struggle to solve, such as factoring. The possibility of quantum computers in the future necessitates a rethinking of how we safeguard our data.

Penn Engineering researchers have developed a chip that outperforms the security and robustness of existing quantum communications hardware. Their technology uses “qudits” to communicate, effectively doubling the quantum information space of any previous on-chip laser.

In a recent study published in Nature, Liang Feng, Professor in the Departments of Materials Science and Engineering (MSE) and Electrical Systems and Engineering (ESE), along with MSE postdoctoral fellow Zhifeng Zhang and ESE Ph.D. student Haoqi Zhao, demonstrated the technology. Scientists from the Polytechnic University of Milan, the Institute for Cross-Disciplinary Physics and Complex Systems, Duke University, and the City University of New York collaborated on the project (CUNY).

There is a lot of concern, that mathematical encryption, no matter how complex, will become less and less effective as computing technologies advance so quickly.” Because quantum communication relies on physical rather than mathematical barriers, it is immune to future threats. It’s more important than ever to keep developing and refining quantum communication technologies.”

Liang Feng

Bits, qubits, and qudits

While non-quantum chips store, transmit and compute data using bits, state-of-the-art quantum devices use qubits. Bits can be 1s or 0s, while qubits are units of digital information capable of being both 1 and 0 at the same time. In quantum mechanics, this state of simultaneity is called “superposition.”

A quantum bit in a state of superposition greater than two levels is called a qudit to signal these additional dimensions.

“In classical communications,” says Feng, “a laser can emit a pulse coded as either 1 or 0. These pulses can easily be cloned by an interceptor looking to steal information and are therefore not very secure. In quantum communications with qubits, the pulse can have any superposition state between 1 and 0. Superposition makes it so a quantum pulse cannot be copied. Unlike algorithmic encryption, which blocks hackers using complex math, quantum cryptography is a physical system that keeps information secure.”

Qubits, however, aren’t perfect. With only two levels of superposition, qubits have limited storage space and a low tolerance for interference.

The four-level qudits of the Feng Lab device enable significant advances in quantum cryptography, increasing the maximum secrete key rate for information exchange from one bit per pulse to two bits per pulse. The device has four levels of superposition and allows for further dimension increases.

“The most difficult challenge,” says Zhang, “was the standard setup’s complexity and inability to scale.” We already knew how to create these four-level systems, but controlling all of the parameters associated with the increase in dimension required a lab and a variety of optical tools. Our goal was to do it all on a single chip. And that is precisely what we did.”

Quantum-Communication-is-expanded-through-the-Use-of-Microlasers-1
Microlaser chip adds new dimensions to quantum communication

The physics of cybersecurity

Quantum communication uses photons in tightly controlled states of superposition. Properties such as location, momentum, polarization, and spin exist as multiplicities at the quantum level, each of which is governed by probabilities. These probabilities describe the likelihood of a quantum system—an atom, a particle, a wave—taking on a single attribute when measured.

In other words, quantum systems are neither here nor there. They are both here and there. It is only the act of observation—detecting, looking, measuring—that causes a quantum system to take on a fixed property. Like a subatomic game of Statues, quantum superpositions take on a single state as soon as they are observed, making it impossible to intercept them without detection or copy them.

The hyperdimensional spin-orbit microlaser builds on the team’s earlier work with vortex microlasers, which sensitively tune the orbital angular momentum (OAM) of photons. The most recent device upgrades the capabilities of the previous laser by adding another level of command over photonic spin.

This additional level of control—being able to manipulate and couple OAM and spin—is the breakthrough that allowed them to achieve a four-level system. The difficulty of controlling all these parameters at once is what had been hindering qudit generation in integrated photonics and represents the major experimental accomplishment of the team’s work.

“Think of the quantum states of our photon as two planets stacked on top of each other,” says Zhao. “Before, we only had information about these planets’ latitude. With that, we could create a maximum of two levels of superposition. We didn’t have enough information to stack them into four. Now, we have longitude as well. This is the information we need to manipulate photons in a coupled way and achieve dimensional increase. We are coordinating each planet’s rotation and spin and holding the two planets in strategic relation to each other.”

Quantum cryptography with Alice, Bob, and Eve

Quantum cryptography relies on superposition as a tamper-evident seal. In a popular cryptography protocol known as Quantum Key Distribution (QKD), randomly generated quantum states are sent back and forth between sender and receiver to test the security of a communications channel.

If sender and receiver (always Alice and Bob in the story world of cryptography) discover a certain amount of discrepancy between their messages, they know that someone has attempted to intercept their message. But, if the transmission remains mostly intact, Alice and Bob understand the channel to be safe and use the quantum transmission as a key for encrypted messages.

How does this improve on non-quantum communication security? If we imagine the photon as a sphere rotating upwards, we can get a rough idea of how a photon might classically encode the binary digit 1. If we imagine it rotating downwards, we understand 0.

When Alice sends classical photons coded in bits, Eve the eavesdropper can steal, copy and replace them without Alice or Bob realizing. Even if Eve cannot decrypt the data she has stolen, she may be squirreling it away for the near future when advances in computing technology might allow her to break through.

Quantum communication adds a stronger layer of security. If we imagine the photon as a sphere rotating upwards and downwards at the same time, coding 1 and 0 simultaneously, we get an idea of how a qubit maintains dimension in its quantum state.

When Eve tries to steal, copy and replace the qubit, her ability to capture the information will be compromised and her tampering will be apparent in the loss of superposition. Alice and Bob will know the channel is not secure and will not use a security key until they can prove that Eve has not intercepted it. Only then will they send the intended encrypted data using an algorithm enabled by the qubit key.

However, while the laws of quantum physics may prevent Eve from copying the intercepted qubit, she may be able to disturb the quantum channel. Alice and Bob will need to continue generating keys and sending them back and forth until she stops interfering. Accidental disturbances that collapse superposition as the photon travels through space also contribute to interference patterns.

A qubit’s information space, limited to two levels, has a low tolerance for these errors. To solve these problems, quantum communication requires additional dimensions. If we imagine a photon rotating (the way the earth rotates around the sun) and spinning (the way the earth spins on its own axis) in two different directions at once, we get a sense of how the Feng Lab qudits work.

Eve will be unable to extract any information if she attempts to steal, copy, and replace the qudit, and her tampering will be obvious. The message sent will be much more forgiving of errors—not just Eve’s interference, but also accidental flaws introduced as the message travels through space. Alice and Bob will be able to exchange information in an efficient and secure manner.

“There is a lot of concern,” Feng says, “that mathematical encryption, no matter how complex, will become less and less effective as computing technologies advance so quickly.” Because quantum communication relies on physical rather than mathematical barriers, it is immune to future threats. It’s more important than ever to keep developing and refining quantum communication technologies.”