³Ô¹ÏÍøÕ¾

Unique testbed in Eindhoven paves way for unhackable ‘quantum internet’

Our encrypted communications might be in trouble – powerful quantum computers are coming. By fighting fire with fire though, we can use the magic of quantum physics to create so-called quantum key distribution methods and protect our data against quantum hacking. Eindhoven University of Technology is currently setting up a unique testbed to validate this technology in several societal settings, thus paving the way for a fast and unhackable quantum internet. First user case: autonomous driving. Our researchers aim to have the world’s first quantum-secured autonomous driving car ready by next year.

The quantum computing age is coming, and with it the serious threat to all of our encrypted communications. Current cryptography protocols used to secure our data can be cracked by a quantum computer in no time at all (see info box below). This means that state secrets, medical records, and banking systems would all be vulnerable once the quantum computer becomes a reality.

This worrying data protection issue could be prominent within five years, according to , TU/e Professor at the Electro-Optical Communication group and the (QT/e). He also recognizes the particular threat to systems that require a lot of accurate control, such as autonomous driving. “For example, a hack could trick others into thinking your car is in a different location, slowing down, or changing direction,” he says. “It is even possible that your car is hacked and commandeered by someone external to the vehicle.”

What makes quantum computers a threat to our encrypted data?

A conventional computer performs operations using bits, which can be either zero or one. A quantum computer, on the other hand, uses quantum bits or qubits. Qubits can be photons, or electrons, or any system that can exist in so-called quantum states.

What is special about quantum physics is that these states can exist simultaneously. This so-called ‘superposition’ allows you to hold much more information in comparison to the bits in conventional computers.

Whereas two classical bits can exist in one of four possible combinations (22), qubits can exist in all these combinations simultaneously. This number grows exponentially with each additional qubit. Twenty qubits can already store over a million values in parallel (220), and 300 qubits can store as many particles as there are in the universe (2300).

This immense computing power is especially useful in calculations with many different outcomes: these can be done in one operation at the same time. To crack our current encryption, a conventional computer takes longer than the age of the universe to try-out every possible solution. A quantum computer tries them all at once and cracks it in the blink of an eye. The potential security problems are quite clear right?

Fighting quantum with quantum

So what can we do to prevent this from happening? One method that has been getting a lot of attention in recent years is actually using the power of quantum technologies against quantum technologies, “a quantum way of attacking another quantum technology,” as Tafur Monroy refers to it. This is the aforementioned Quantum Key Distribution (QKD).

In QKD, quantum properties of photons such as polarization state and entanglement – wonders of quantum physics – are used to create cryptographic keys. These keys can be seen as recipes that tell the recipient of some secret data what measurements of the photons are needed to properly decode and access the data.

The strength of QKD lies in the fact that someone who tries to decrypt the data without the right cryptographic key is immediately noticed by the creator of the key and recipient even before any actual data is transmitted. The laws of quantum physics – which form the basis of operation for quantum computers – stipulate that measurements of any quantum particle have direct consequences for the particle itself. Think of the letters that make up the words of a postcard that immediately fade as soon as you read them.

Compared to other solutions against the computational cryptographic cracking power of quantum computers, QKD is already quite a mature technology, according to Tafur Monroy. “The first generation of QKD products are already commercially available, so you can already start deploying them.”

The problem, however, is that at the moment there is no existing infrastructure to determine if a QKD system is actually safe when integrated into existing telecommunication infrastructure. Tafur Monroy: “For our current cryptographic standards, we have protocols, security, and validation tests. There are even authorities that can certify whether your system is safe. There is no such thing for QKD.”

5G autonomous driving

Hence, Tafur Monroy is currently building a timely testbed to ascertain if a QKD system is viable and safe for societal use. “It’s not a lab, it’s not a computer, but it is the closest thing to real-world deployment, with real nodes, real fibers, real systems, and we’re also going to run real attacks to test whether systems are secure.”

Other departments of TU/e are also conducting field tests with autonomous driving cars. Photo: Bart van Overbeeke

Tafur Monroy’s testbed of choice is based on autonomous driving. Existing research projects at TU/e are already conducting tests with autonomous driving cars, on the TU/e campus, on the highway between Eindhoven and Helmond, and also in the urban area of Helmond.

These cars will be connected via an on-board box to an experimental 5G network, set up by the TU/e, consisting of three antennas on campus. This is the fastest form of 5G – 100 times faster than the current 4G (from 100 Mbps to 10 Gbps) – and will probably be introduced in 2025.

“It uses millimeter waves, with frequencies around 30 GHz”, says Tafur Monroy. “This is the only real-time 5G network in the world that utilizes these millimeter waves. That provides the high capacity and low latency (time delay) needed for autonomous driving. The millimeter wave 5G connection supports the communication of this autonomous driving and also makes the localization much more accurate.”

“QKD will be used to secure communication between the 5G link, the cars and the edge computing nodes – local devices that process large amounts of data and are placed closer to the end-user to provide fast response times,” says Tafur Monroy. “We’re securing specifically the control mechanism that says which car a data beam should follow, or whether to switch to another car.” Within the context of the EU-funded BRAINE project, the final touches are currently being put to this impressive testbed configuration. “We expect to have a fully quantum-secured 5G autonomous driving system by the end of next year.”

Robotics and civilian data are next

All elements of the testbed are connected to each other via the existing optical fiber network ring around the city of Eindhoven (diameter 110 km). This ring also connects the labs on the TU/e campus with various test locations in the region, enabling the expansion of the test bed for other applications.

For example, after autonomous driving, robotics is next on the list to be protected against quantum attacks. “We want to use QKD to secure robotic communications for industrial inspection,” says Tafur Monroy. “These robots are also connected to the 5G network and communicate with other robots in manufacturing processes.”

Another ambition is to secure civilian and governmental data in the small city of Waalre, which is also connected to the network ring. “Waalre has its own local fiber optic operator that provides information for the city hall in addition to other ICT services,” says Tafur Monroy. “Among the use cases of interest for the local operator are the use of QKD technology for data access authentication and secure long-term data storage, government secure communication.”

Idelfonso Tafur Monroy hopes that Eindhoven ultimately can play a role in the ‘certification’ of QKD cybersecurity solutions.

With such practical examples, he aims to find other interested parties who see the Eindhoven testbed as a valuable test location. “Hopefully these examples will motivate people to explore the use of this technology for other applications. We can then look into other business cases as well.”

Ultimate dream

Although QKD has matured to the point that commercial systems are available, current solutions have limitations on transmission distances and key transmission rates. “To accelerate global uptake and deployment of QKD systems, miniaturization and cost reduction is also necessary,” says Tafur Monroy.

Therefore, in the long run, Tafur Monroy also wants to bridge the gap to, putting it simply, place all of these necessary technologies in a chip. “We have the knowledge and technology in Eindhoven to eventually manufacture QKD in chips – such as the photonic integration technologies – so that they also fit into a mobile phone,” says Tafur Monroy.

His ultimate dream is to play a role in the ‘certification’ of QKD cybersecurity solutions. “This would allow you can come to Eindhoven with your chip or QKD product and we can guarantee that you pass the test for quantum cryptography.”

One word of advice to any quantum computer seeking to hack data or control technological systems: you better avoid Eindhoven for the next few years…

/TU/e Public Release. View in full .