Cybersecurity and Space News
Featured Post
Thursday, May 12, 2022
Wednesday, May 11, 2022
Plan for Perfect Time
Introduction
Synchronous
timing remains a problem for cybersecurity, encryption and communications
systems. Technologies have tried various
approaches, including atomic clocks (Snyder, 1973), elaborate time messaging schemes (Luo et al., 2019), use of primary and secondary clocks (Engler, 1883), and the Global Positioning System (National Research Council, 1995).
However, all of these time synchronization methods have errors. Time synchronous errors lead to uncertainty
in location, inability to use encryption, and an inability to optimize communications
protocols. This sociotechnical plan proposes an
innovative solution for synchronous timing by using features of quantum
entanglement.
Scope
Quantum
entanglement means that certain physical traits of two particles are
correlated, even at a distance. A key
feature of quantum entanglement is that changes to the physical state of one
member of an entangled pair are replicated in its twin, even while physically
separated. Entanglement is what Einstein
described as spooky action at a distance and unfortunately caused Einstein to
disagree incorrectly with quantum theories (Snyder, 2019).
It may be
possible to use the concept of quantum entanglement to synchronize clocks and
provide near-perfect time. If two clocks
that require timing synchronization can detect entangled photons, the system's
accuracy is the accuracy of the primary clock, not the combined errors of both
clocks. Current philosophies of quantum
entanglement-based clocks tend to have a derived assumption that there is a
common phase reference between the two clocks.
Unfortunately, if there is a common phase reference, the phase reference
itself provides more errors, obviating the need for quantum clocks. However, Ebubechukwu et al. (2020) have recently proposed a solution
that does not require a phase reference, making quantum entanglement timing
theoretically possible. The innovation
has two goals: using quantum
entanglement to provide clock corrections between a primary and secondary
clock, and ultimately providing a timing device to all users that is
synchronized to a national standard (e.g., connected to the Naval Observatory).
Purpose
The
current approach in telecommunications and cybersecurity accepts timing uncertainty,
resulting in inaccurate location data, the use of coarse and fine
synchronization approaches in systems with strong encryption, and margin added
to communications systems. The root
cause of timing synchronization uncertainty is physical distance, particularly
if an endpoint is moving. The precise
distance and speed cannot accurately be measured since there is no perfect time
source, resulting in errors. Noise and
device frequency instability are also contributors. In other words, internal timing sources are
only accurate to a specification dictated by their electronic and mechanical
design. When two clocks need to
synchronize, errors accumulate from both clocks. Engineers and scientists have accepted
imperfect timing synchronization and developed numerous workarounds (Liu et al., 2021).
Communications
protocols that require precise timing include Orthogonal Frequency-Division Multiple
Access (OFDMA), time division multiple access, and frequency hopping communications
systems. For note, OFDMA is the standard used for 4G
and 5G cell phone systems. Further,
numerous cybersecurity methods, both defensive and offensive, rely on
synchronous timing. Encryption requires
knowing where the encrypted string starts and stops. Man-in-the-middle attacks generally require
precise timing to replicate end point protocols. Current timing standards use Global
Positioning System (GPS) and internet-based Network Time Protocols
(NTP). NTP servers are accurate to
within 1 millisecond if the NTP servers are on the local area network, and as
high as 100 milliseconds if over an asymmetric connection using public internet
servers (Shinton, 2020). Although GPS
is most commonly known and used for precise timing, it is currently accurate to
within three nanoseconds, resulting in GPS receivers being accurate to 10-20
meters and two or three factors of ten improvement over internet-based
time
(Smithsonian, 2021).
An easy method to understand timing uncertainty is to think of a notional one Gigabit per second transmitter. One Gigabit is equal to 109 bits. A nanosecond is equal to 10-9 seconds. The notional transmitter would be sending one bit every one nanosecond to transmit one Gigabit every second. As an example, with an uncertainty of three nanoseconds, the start or stop time of the transmitter would have an uncertainty of 3 bits. This uncertainty requires a system that provides some sort of timing margin or uses synchronization bits; both solutions effectively waste bandwidth. Or, encrypted systems must account for the bit uncertainty by adopting less than ideal encryption schemes. As data rates increase, the need for more precise timing is necessary. A 100 Gigabit per second communications system may have 300 bits of uncertainty for starts and stops, if the timing accuracy is three nanoseconds. The timing uncertainty is far worse for internet-based timing.
Supporting Forces
Supporting
forces for using quantum entanglement for time synchronization are recent
advances in quantum entanglement for other uses, and increasing bandwidth
requirements. Recent quantum
entanglement demonstrations show that tangled states can be detected via
satellite at 1200 kilometers (Yin et
al., 2017), assuming
near-perfect conditions (Ecker et
al., 2019). Quantum entanglement was first proposed for
cryptographic key distribution in 1984, with the Swiss using quantum key
distribution to secure their elections in 2007 (Messmer, 2007).
An improved application was proposed in 2015 to lengthen the key
distribution distance over fiber to 307 kilometers (Korzh et al., 2015).
Quantum entanglement has also been proposed for secure communications (Tseng et al., 2012).
All of these applications show that quantum entanglement can be
implemented for real-world applications and could be used for timing
synchronization.
Bandwidth
requirements, and bandwidth speeds are increasing. A major driver for bandwidth speeds is
virtual reality, which requires large amounts of streaming data, with dynamic
real time changes to create a realistic experience. Virtual reality has many uses to include
medical diagnostics, training, and education.
Huawei defined four levels of virtual reality, with Ultimate
Virtual Reality as its final evolution.
For Ultimate Virtual Reality, resolution and frame rates are increased,
approaching eye retina perception (Huawei, 2017). According to Hu et al. (2020), Ultimate Virtual Reality systems
will require streaming bandwidths of 100 Gigabits per second, even after using
a compression ratio of 20:1. To achieve
the bandwidths required for virtual reality, systems will be unable to waste
any bandwidth, particularly if wireless systems are used as wireless systems
typically provide less bandwidth than fiber systems. Therefore, near-perfect time becomes a major
requirement for these bandwidth speeds.
Challenging Forces
The major
challenging forces are cost, size, and equipment maturity. A quantum entanglement-based timing
synchronization is a Technology Readiness Level 3 technology, where a proof of
concept was developed (NASA, 2021).
However, the technology requires much engineering maturity to be
practical. Since the accuracy of GPS is
three nanoseconds (Smithsonian, 2021), for a new method to be considered
useful, the new methodology should provide an improvement of several orders of magnitude. The equipment required should be small and inexpensive. The equipment used to produce entanglement is
large and expensive, and consists of lasers, crystals, and Indium Gallium
Arsenide detectors, typical of laboratory tests (Cao et al., 2020).
Unfortunately, the Indium Gallium Arsenide detectors alone cost
approximately $4000 dollars (Teledyne, 2021).
However, with the need for
greater bandwidth and data rate speeds, a mechanism for improving timing
accuracy is required. A government
organization, such as NASA, may be agreeable to prototype quantum entangled
timing, especially if there is a free space application (Edwards, 2014).
Methods
In order
to successfully implement a quantum entangled-based timing synchronized device,
a structured design process is required.
A structured design methodology is comprised of two parts: hierarchy and regularity. Hierarchies, similar to work breakdown
structures, define all requisite design activities and partition the activities
into small work packages. In this way
the entire design can be visualized by all team members. Regularity means that common methods of implementing
the small work packages are used; in other words, a same process or design
feature is not re-designed each time it is needed (Trimberger et al., 1981).
Stage one of the design is to use quantum entanglement to provide clock
corrections between a primary and secondary clock. Accuracy (what timing improvement), distance
(how far for free space, free space-terrestrial, and fiber), and persistence
(how long does the entanglement last) will be the chief metrics. The new timing system should provide an
improvement of at least an order of magnitude or greater than three picoseconds
to be considered useful. This effort
will determine the appropriate use cases and suitable environments, define
requisite timing protocols, and evaluate the technology readiness, moving to a
Technology Readiness Level of six of prototype demonstration in an operational
environment (NASA, 2021).
The critical path for both protocol and technology will need to be
defined. Only after achieving the first
stage will a determination be made if it is possible to provide a timing
standard to all users. For example, the
quantum entangled devices may be too expensive and too bulky for an average
consumer, but may be marketed to a data center-type user. The chief requirement for stage two is size,
weight, and power. If achievable, then
it will be possible to provide a timing device to all users that is
synchronized to a national standard (e.g., connected to the Naval Observatory).
Analytical Plan
For an
invention that is still in its infancy, with a technology readiness of two (NASA, 2021), government organizations should be
used for the research. The plan would be
a partnership between NIST and NASA, where NIST provides a timing source
adjustment using entangled photons to a timing server in NASA-Goddard. The first test phase would use a direct fiber
connection of approximately 30 miles between the two organizations. The test would check the distance and
persistence of entanglement, develop a timing adjustment protocol, and
determine the accuracy of the timing adjustments. Since the accuracy of GPS is three
nanoseconds (Smithsonian, 2021), for a new method to be considered
useful, the new methodology should provide an improvement of several orders of magnitude,
or greater than three picoseconds (10-12), preferably three femtoseconds
(10-15). The second test would determine if free space
optics could be used, potentially involving the Naval Research Laboratory (Rabinovich et al., 2015).
The Naval Research Laboratory is 16 miles from NASA-Goddard, so they may
be willing to be part of the fiber test as well. Or, NASA could contribute lessons learned
from their Laser Communications Relay Demonstration project (NASA, 2022).
If either of those test phases are feasible, then NASA could suggest
ways of improving size, weight, and power or turn over the prototypes to
another organization. NIST could provide
a standard for the timing protocol that was developed from the testing.
Anticipated Results
All inventions
have negative and positive uses for society.
The negative uses are legion; this invention enables large amounts of
bandwidth, with the near-real time ability to create virtual realities. Further, this technology can be used for
state-sponsored monitoring, making the methods used by the Chinese government
for monitoring dissidents and the Uyghurs seem simplistic (Berg, 2021). If the Chinese government has developed
artificial intelligence to monitor emotions and is testing the software on the
Uyghurs (Wakefield, 2021), near perfect time enabling large communications
speeds would allow this type of monitoring in real time. And, the virtual reality created by this
bandwidth and timing would allow deep fakes unlike any that exist today (Mahmud & Sharmin, 2020).
Positive uses for
society with the enablement of virtual reality include medical uses, training,
and entertainment (Berntsen et al., 2016). Virtual reality at this scale enables
holograms and holodecks, to include virtual meetings with holograms instead of
Zoom. This technology enables
self-driving cars and other forms of self-driving transportation, since real
time sensing and correcting is critical for these systems.
Conclusion
Society continues
to push for higher bandwidths. Improved synchronous
timing will be required to provide the data rates and bandwidths required. Ironically, society will not notice this
invention per se, as time synchronization is too detailed and esoteric a
concept for general society. However,
society wants the benefits of higher bandwidths, and will the embrace the
benefits of virtual reality. The
entertainment potential alone of virtual reality is sufficient to drive the
need for large data rates with the need for time synchronization. The ability to create holograms and holodecks
will have significant impact on the gaming industry, and working from home will
be more feasible. Diffusing this
technology into society will be no different than implementing 4G or 5G
service; society will notice that their phones and computers are more capable,
but will not be concerned about the mechanisms.
Most users will enjoy the new games, better forms of long-distance
relationships, new methods of education, self-driving vehicles, new ways of
visualizing problems, true telemedicine, and so forth. However, all new technology will have its
doubters, and it is probable that various conspiracy theories will emerge, linking
the new time synchronization and higher bandwidths to disease or aliens (Bruns et al., 2020). Free
space optical communications, particularly with its use of lasers, is an easy
target for many conspiracy theories. In
conspiracy culture, lasers from space have started fires in several places,
including New Zealand (Graham & Bodkin, 2020). The cellular standard 5G causes COVID or cell
towers themselves cause cancer (Bruns et al., 2020). Worse,
metaverses, which are early attempts at virtual reality, could be used to
spread more believable conspiracy theories.
This is ironic, given that the conspiracy theories may disbelieve some
of the core technology needed for the metaverse (Baker-White, 2022). Education
will be required to counter conspiracy theories, but this is necessary for any
future new technology. Countering the
conspiracy theories with factual information is also required, as education
alone may be insufficient.
Precise timing
synchronization has the potential to disrupt cryptography. Legacy encryption standards will need to be
relooked for weaknesses if femtosecond precision occurs. However, quantum computing with its more
powerful algorithms is likely to be more disruptive to encryption (Gidney & Ekerå, 2021). NIST is currently planning encryption
standards for the post-quantum computing world (NIST, 2022),
and these algorithms are likely to withstand increase timing precision. In a post quantum world, any device using
legacy encryption would be effectively unencrypted, so there will be a need to
remove legacy devices as quickly as possible.
A free society
will need a universal right to privacy, at least as strong as that provided by
the European Union (European Union, 2018), since all facets of life could
be converted to data streams. The
European Union laws protect data, but do not confer a fundamental right to a
person. When the level of bandwidth is
available to create ultimate virtual realities or to create dystopian
monitoring, the fundamental right to privacy for a person is critical. As an example, a person’s mannerisms, appearance,
and environment could be stolen without their knowledge and placed into a
virtual reality. Artificial intelligence
could be used to simulate a realistic persona from the stolen data. Privacy laws must be written so that this
type of occurrence is illegal. Identity
leakage will be more of a threat and stronger laws will be needed (Kasem-Madani et al., 2020). Holograms of individuals could be used for a
variety of illegal activities. Cyber
phishing would be much easier if a hologram of one’s aunt invited a person to
click on a link. Cyber education will
need to be expanded, since the threats will have overtaken the defenses. Education will be needed to ensure all users
understand how to guard their privacy, and what legal recourse they have (Sørum et al., 2022) given how easy it will be to have no privacy.
Areas of Future Research
As data rates
increase, there will always be a need for more precise timing systems. Although this method proposes using quantum
entanglement, other methods should be investigated. Further, the supporting infrastructure for
the increased bandwidth made available by precise timing should be
studied. In other words, if virtual
reality requires 100 Gigabits per second, and our current 5G cell phone
standard is approximately 25 Megabits per second, there is a huge mismatch
between the wireless communications technology and the requirements. Higher frequencies offer more bandwidth (Kurdoghlian et al., 2017), but for 100 Gigabits, the
need is for free space optics communications system, as current radio frequency
wireless is too slow. Further, even
existing fiber systems will have problems with virtual reality requirements, so
improvements to that infrastructure are required. Lastly, all encryption should be verified to
ensure that it can withstand femtosecond timing precision.
References
Baker-White,
E. (2022). Meta Wouldn’t Tell Us How It
Enforces Its Rules In VR, So We Ran A Test To Find Out. https://www.buzzfeednews.com/article/emilybakerwhite/meta-facebook-horizon-vr-content-rules-test
Berg,
A. (2021). Problems of digital control. The digital repression, religious
persecution and genocide of the Uyghurs in Xinjiang by the Communist Republic
China. https://helda.helsinki.fi/bitstream/handle/10138/331041/Berg_Anton_thesis_2021.pdf?sequence=2
Berntsen,
K., Palacios, R. C., & Herranz, E. (2016). Virtual reality and its uses: a
systematic literature review. Proceedings
of the Fourth International Conference on Technological Ecosystems for
Enhancing Multiculturality, 435–439. https://doi.org/10.1145/3012430.3012553
Bruns,
A., Harrington, S., & Hurcombe, E. (2020). ‘Corona? 5G? or both?’: The
dynamics of COVID-19/5G conspiracy theories on Facebook. Media International Australia, 177(1), 12-29. https://doi.org/10.1177/1329878X20946113
Cao,
H., Gao, S.-C., Zhang, C., Wang, J., He, D.-Y., Liu, B.-H., Zhou, Z.-W., Chen,
Y.-J., Li, Z.-H., & Yu, S.-Y. (2020). Distribution of high-dimensional
orbital angular momentum entanglement over a 1 km few-mode fiber. Optica, 7(3), 232-237. https://doi.org/10.1364/OPTICA.381403
Ecker,
S., Bouchard, F., Bulla, L., Brandt, F., Kohout, O., Steinlechner, F., Fickler,
R., Malik, M., Guryanova, Y., Ursin, R., & Huber, M. (2019). Overcoming
noise in entanglement distribution. Physical
Review X, 9(4), 041042. https://doi.org/10.1103/PhysRevX.9.041042
Edwards,
B. L. (2014). NASA’s current activities in free space optical communications. International Conference on Space Optics.
https://doi.org/10.1117/12.2304175
Engler,
E. A. (1883). Time keeping in London. The
Popular Science Monthly, XXII, 328–341. https://archive.org/details/popularsciencemo22newy/page/328/mode/2up
European
Union. (2018). General Data Protection Reguation. OJ L 119, 04.05.2016. https://gdpr-info.eu
Gidney,
C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours
using 20 million noisy qubits. Quantum, 5,
433. https://doi.org/10.22331/q-2021-04-15-433
Graham,
B., & Bodkin, P. (2020). Conspiracists say lasers and exploding smart
meteors used to start bush fires to make way for a new train network. New Zealand Herald. https://www.nzherald.co.nz/world/conspiracists-say-lasers-and-exploding-smart-meters-used-to-start-bush-fires-to-make-way-for-a-new-train-network/EFL6V737L4GWCODJ7DWXII55KU/
Hu, F.,
Deng, Y., Saad, W., Bennis, M., & Aghvami, A. H. (2020). Cellular-connected
wireless virtual reality: Requirements, challenges, and solutions. IEEE Communications Magazine, 58(5),
105-111. https://doi.org/10.1109/MCOM.001.1900511
Huawei.
(2017). Cloud Virtual Reality Bearer
Networks. https://www-file.huawei.com/-/media/corporate/pdf/ilab/cloud_vr_oriented_bearer_network_white_paper_en_v2.pdf
Ilo-Okeke,
E. O., Tessler, L., Dowling, J. P., & Byrnes, T. (2020). Entanglement-based
quantum clock synchronization. AIP
Conference Proceedings, 2241(1). https://doi.org/doi.org/10.1063/5.0011396
Kasem-Madani,
S., Malderle, T., Boes, F., & Meier, M. (2020). Privacy-preserving warning
management for an identity leakage warning network. Proceedings of the European Interdisciplinary Cybersecurity Conference,
Article 4. https://doi.org/10.1145/3424954.3424955
Korzh,
B., Lim, C. C. W., Houlmann, R., Gisin, N., Li, M. J., Nolan, D., Sanguinetti,
B., Thew, R., & Zbinden, H. (2015, 2015/03/01). Provably secure and
practical quantum key distribution over 307 km of optical fibre. Nature Photonics, 9(3), 163-168. https://doi.org/10.1038/nphoton.2014.327
Kurdoghlian,
A., Moyer, H., Sharifi, H., Brown, D. F., Nagele, R., Tai, J., Bowen, R.,
Wetzel, M., Grabar, R., Santos, D., & Micovic, M. (2017, 4-9 June 2017).
First demonstration of broadband W-band and D-band GaN MMICs for next
generation communication systems. 2017 IEEE MTT-S International Microwave
Symposium (IMS),
Liu,
S., Zhao, L., Deng, Z., & Zhang, Z. (2021). A digital adaptive calibration
method of timing mismatch in TIADC based on adjacent channels Lagrange mean
value difference. Circuits, Systems, and
Signal Processing. https://doi.org/10.1007/s00034-021-01785-8
Luo,
R., Hua, N., Zheng, X., & Zhou, B. (2019). High-reliability sub-nanosecond
network time synchronization method enabled by double-frequency distributed
time synchronization. Journal of Optical
Communications and Networking, 11(1), A40-A51. https://doi.org/10.1364/JOCN.11.000A40
Mahmud,
B. U., & Sharmin, A. (2020). Deep insights of deepfake technology: A
review. Dhaka University Journal of
Science, 5(2), 13-23. https://doi.org/10.48550/arXiv.2105.00192
Messmer,
E. (2007). Quantum cryptography to secure ballots in Swiss election. Network World. https://www.networkworld.com/article/2286834/quantum-cryptography-to-secure-ballots-in-swiss-election.html
NASA.
(2021). Technology Readiness Levels. https://www.nasa.gov/pdf/458490main_TRL_Definitions.pdf
NASA.
(2022). Laser Communications Relay
Demonstration (LCRD). https://www.nasa.gov/mission_pages/tdm/lcrd/index.html
National
Research Council. (1995). The Global
Positioning System: A Shared National Asset. National Academies Press. https://doi.org/10.17226/4920
NIST.
(2022). Post Quantum Cryptography Round
Three Submissions. https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions
Rabinovich,
W. S., Moore, C. I., Mahon, R., Goetz, P. G., Burris, H. R., Ferraro, M. S.,
Murphy, J. L., Thomas, L. M., Gilbreath, G. C., Vilcheck, M., & Suite, M.
R. (2015). Free-space optical communications research and demonstrations at the
U.S. Naval Research Laboratory. Applied
optics, 54(31), F189-200. https://doi.org/10.1364/ao.54.00f189
Shinton,
A. (2020). How accurate is Network Time Protocol (NTP)? TimeTools. https://timetoolsltd.com/ntp/ntp-timing-accuracy/
Smithsonian.
(2021). Synchronized Accurate Time. https://timeandnavigation.si.edu/satellite-navigation/gps/synchronized-accurate-time
Snyder,
D. (2019). Spooky action at a distance is not spooky-it is knowledge: Combining
entanglement and negative observation to show how The Einstein-Podolsky-Rosen
experiment works, not just how it doesn’t work. Bulletin of the American Physical Society, 64. https://doi.org/10.13140/RG.2.2.28269.03042
Snyder,
W. F. (1973). Lord Kelvin on atoms as fundamental natural standards (for base
units). IEEE Transactions on
Instrumentation and Measurement, 22(1), 99-99. https://doi.org/10.1109/TIM.1973.4314109
Sørum,
H., Eg, R., & Presthus, W. (2022). A Gender Perspective on GDPR and Information
Privacy. Procedia Computer Science, 196,
175-182. https://doi.org/10.1016/j.procs.2021.12.003
Teledyne.
(2021). Indium Gallium Arsenide
Detectors. http://www.teledynejudson.com/products/indium-gallium-arsenide-detectors
Trimberger,
S., Rowson, J., Lang, C., & Gray, J. (1981). A structured design
methodology and associated software tools. IEEE
Transactions on Circuits and Systems, 28(7), 618-634. https://doi.org/10.1109/TCS.1981.1085035
Tseng,
H., Hwang, T., & Lin, C.-Y. (2012). On the "Deterministic secure
quantum communication using four-particle entangled state and entanglement
swapping". Journal of Information
Science and Engineering, 28(3), 471-478. https://doi.org/10.1688/JIS:.2012.28.3.3
Wakefield,
J. (2021). AI emotion-detection software tested on Uyghurs. BBC News. https://www.bbc.com/news/technology-57101248
Yin,
J., Cao, Y., Li, Y.-H., Liao, S.-K., Zhang, L., Ren, J.-G., Cai, W.-Q., Liu,
W.-Y., Li, B., Dai, H., Li, G.-B., Lu, Q.-M., Gong, Y.-H., Xu, Y., Li, S.-L.,
Li, F.-Z., Yin, Y.-Y., Jiang, Z.-Q., Li, M., Jia, J.-J., Ren, G., He, D., Zhou,
Y.-L., Zhang, X.-X., Wang, N., Chang, X., Zhu, Z.-C., Liu, N.-L., Chen, Y.-A.,
Lu, C.-Y., Shu, R., Peng, C.-Z., Wang, J.-Y., & Pan, J.-W. (2017).
Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140. https://doi.org/10.1126/science.aan3211
-
Introduction Synchronous timing remains a problem for cybersecurity, encryption and communications systems. Technologies have tried vari...
-
Traditional forecasting predicts the future based on past historical information, has a short-term perspective, uses experts, is fact base...
-
Greetings, and welcome to the intersection of cybersecurity and space-based communications. I am a program manager for the US government...