Featured Post

Perfect Time for the Future

 

Wednesday, May 11, 2022

Plan for Perfect Time

Introduction

Synchronous timing remains a problem for cybersecurity, encryption and communications systems.  Technologies have tried various approaches, including atomic clocks (Snyder, 1973), elaborate time messaging schemes (Luo et al., 2019), use of primary and secondary clocks (Engler, 1883), and the Global Positioning System (National Research Council, 1995).  However, all of these time synchronization methods have errors.  Time synchronous errors lead to uncertainty in location, inability to use encryption, and an inability to optimize communications protocols.  This sociotechnical plan proposes an innovative solution for synchronous timing by using features of quantum entanglement. 

Scope

Quantum entanglement means that certain physical traits of two particles are correlated, even at a distance.  A key feature of quantum entanglement is that changes to the physical state of one member of an entangled pair are replicated in its twin, even while physically separated.  Entanglement is what Einstein described as spooky action at a distance and unfortunately caused Einstein to disagree incorrectly with quantum theories (Snyder, 2019). 

It may be possible to use the concept of quantum entanglement to synchronize clocks and provide near-perfect time.  If two clocks that require timing synchronization can detect entangled photons, the system's accuracy is the accuracy of the primary clock, not the combined errors of both clocks.  Current philosophies of quantum entanglement-based clocks tend to have a derived assumption that there is a common phase reference between the two clocks.  Unfortunately, if there is a common phase reference, the phase reference itself provides more errors, obviating the need for quantum clocks.  However, Ebubechukwu et al. (2020) have recently proposed a solution that does not require a phase reference, making quantum entanglement timing theoretically possible.  The innovation has two goals:  using quantum entanglement to provide clock corrections between a primary and secondary clock, and ultimately providing a timing device to all users that is synchronized to a national standard (e.g., connected to the Naval Observatory).

Purpose

The current approach in telecommunications and cybersecurity accepts timing uncertainty, resulting in inaccurate location data, the use of coarse and fine synchronization approaches in systems with strong encryption, and margin added to communications systems.  The root cause of timing synchronization uncertainty is physical distance, particularly if an endpoint is moving.  The precise distance and speed cannot accurately be measured since there is no perfect time source, resulting in errors.  Noise and device frequency instability are also contributors.  In other words, internal timing sources are only accurate to a specification dictated by their electronic and mechanical design.  When two clocks need to synchronize, errors accumulate from both clocks.  Engineers and scientists have accepted imperfect timing synchronization and developed numerous workarounds (Liu et al., 2021).      

Communications protocols that require precise timing include Orthogonal Frequency-Division Multiple Access (OFDMA), time division multiple access, and frequency hopping communications systems.  For note, OFDMA is the standard used for 4G and 5G cell phone systems.  Further, numerous cybersecurity methods, both defensive and offensive, rely on synchronous timing.  Encryption requires knowing where the encrypted string starts and stops.  Man-in-the-middle attacks generally require precise timing to replicate end point protocols.  Current timing standards use Global Positioning System (GPS) and internet-based Network Time Protocols (NTP).  NTP servers are accurate to within 1 millisecond if the NTP servers are on the local area network, and as high as 100 milliseconds if over an asymmetric connection using public internet servers (Shinton, 2020).  Although GPS is most commonly known and used for precise timing, it is currently accurate to within three nanoseconds, resulting in GPS receivers being accurate to 10-20 meters and two or three factors of ten improvement over internet-based time  (Smithsonian, 2021). 

An easy method to understand timing uncertainty is to think of a notional one Gigabit per second transmitter.  One Gigabit is equal to 109 bits.  A nanosecond is equal to 10-9 seconds.  The notional transmitter would be sending one bit every one nanosecond to transmit one Gigabit every second.  As an example, with an uncertainty of three nanoseconds, the start or stop time of the transmitter would have an uncertainty of 3 bits.  This uncertainty requires a system that provides some sort of timing margin or uses synchronization bits; both solutions effectively waste bandwidth.  Or, encrypted systems must account for the bit uncertainty by adopting less than ideal encryption schemes.  As data rates increase, the need for more precise timing is necessary. A 100 Gigabit per second communications system may have 300 bits of uncertainty for starts and stops, if the timing accuracy is three nanoseconds.  The timing uncertainty is far worse for internet-based timing.

Supporting Forces

Supporting forces for using quantum entanglement for time synchronization are recent advances in quantum entanglement for other uses, and increasing bandwidth requirements.  Recent quantum entanglement demonstrations show that tangled states can be detected via satellite at 1200 kilometers (Yin et al., 2017), assuming near-perfect conditions (Ecker et al., 2019).  Quantum entanglement was first proposed for cryptographic key distribution in 1984, with the Swiss using quantum key distribution to secure their elections in 2007 (Messmer, 2007).  An improved application was proposed in 2015 to lengthen the key distribution distance over fiber to 307 kilometers (Korzh et al., 2015).  Quantum entanglement has also been proposed for secure communications (Tseng et al., 2012).  All of these applications show that quantum entanglement can be implemented for real-world applications and could be used for timing synchronization.

Bandwidth requirements, and bandwidth speeds are increasing.  A major driver for bandwidth speeds is virtual reality, which requires large amounts of streaming data, with dynamic real time changes to create a realistic experience.  Virtual reality has many uses to include medical diagnostics, training, and education.  Huawei defined four levels of virtual reality, with Ultimate Virtual Reality as its final evolution.  For Ultimate Virtual Reality, resolution and frame rates are increased, approaching eye retina perception (Huawei, 2017).  According to Hu et al. (2020), Ultimate Virtual Reality systems will require streaming bandwidths of 100 Gigabits per second, even after using a compression ratio of 20:1.  To achieve the bandwidths required for virtual reality, systems will be unable to waste any bandwidth, particularly if wireless systems are used as wireless systems typically provide less bandwidth than fiber systems.  Therefore, near-perfect time becomes a major requirement for these bandwidth speeds.

Challenging Forces

The major challenging forces are cost, size, and equipment maturity.  A quantum entanglement-based timing synchronization is a Technology Readiness Level 3 technology, where a proof of concept was developed (NASA, 2021).  However, the technology requires much engineering maturity to be practical.  Since the accuracy of GPS is three nanoseconds (Smithsonian, 2021), for a new method to be considered useful, the new methodology should provide an improvement of several orders of magnitude.  The equipment required should be small and inexpensive.  The equipment used to produce entanglement is large and expensive, and consists of lasers, crystals, and Indium Gallium Arsenide detectors, typical of laboratory tests (Cao et al., 2020).  Unfortunately, the Indium Gallium Arsenide detectors alone cost approximately $4000 dollars (Teledyne, 2021).   However, with the need for greater bandwidth and data rate speeds, a mechanism for improving timing accuracy is required.  A government organization, such as NASA, may be agreeable to prototype quantum entangled timing, especially if there is a free space application (Edwards, 2014)

Methods

In order to successfully implement a quantum entangled-based timing synchronized device, a structured design process is required.  A structured design methodology is comprised of two parts:  hierarchy and regularity.  Hierarchies, similar to work breakdown structures, define all requisite design activities and partition the activities into small work packages.  In this way the entire design can be visualized by all team members.  Regularity means that common methods of implementing the small work packages are used; in other words, a same process or design feature is not re-designed each time it is needed (Trimberger et al., 1981).   Stage one of the design is to use quantum entanglement to provide clock corrections between a primary and secondary clock.  Accuracy (what timing improvement), distance (how far for free space, free space-terrestrial, and fiber), and persistence (how long does the entanglement last) will be the chief metrics.  The new timing system should provide an improvement of at least an order of magnitude or greater than three picoseconds to be considered useful.  This effort will determine the appropriate use cases and suitable environments, define requisite timing protocols, and evaluate the technology readiness, moving to a Technology Readiness Level of six of prototype demonstration in an operational environment (NASA, 2021).  The critical path for both protocol and technology will need to be defined.  Only after achieving the first stage will a determination be made if it is possible to provide a timing standard to all users.  For example, the quantum entangled devices may be too expensive and too bulky for an average consumer, but may be marketed to a data center-type user.  The chief requirement for stage two is size, weight, and power.  If achievable, then it will be possible to provide a timing device to all users that is synchronized to a national standard (e.g., connected to the Naval Observatory).

Analytical Plan

For an invention that is still in its infancy, with a technology readiness of two (NASA, 2021), government organizations should be used for the research.  The plan would be a partnership between NIST and NASA, where NIST provides a timing source adjustment using entangled photons to a timing server in NASA-Goddard.  The first test phase would use a direct fiber connection of approximately 30 miles between the two organizations.  The test would check the distance and persistence of entanglement, develop a timing adjustment protocol, and determine the accuracy of the timing adjustments.  Since the accuracy of GPS is three nanoseconds (Smithsonian, 2021), for a new method to be considered useful, the new methodology should provide an improvement of several orders of magnitude, or greater than three picoseconds (10-12), preferably three femtoseconds (10-15).   The second test would determine if free space optics could be used, potentially involving the Naval Research Laboratory (Rabinovich et al., 2015).  The Naval Research Laboratory is 16 miles from NASA-Goddard, so they may be willing to be part of the fiber test as well.  Or, NASA could contribute lessons learned from their Laser Communications Relay Demonstration project (NASA, 2022).  If either of those test phases are feasible, then NASA could suggest ways of improving size, weight, and power or turn over the prototypes to another organization.  NIST could provide a standard for the timing protocol that was developed from the testing.     

Anticipated Results

All inventions have negative and positive uses for society.  The negative uses are legion; this invention enables large amounts of bandwidth, with the near-real time ability to create virtual realities.  Further, this technology can be used for state-sponsored monitoring, making the methods used by the Chinese government for monitoring dissidents and the Uyghurs seem simplistic (Berg, 2021).  If the Chinese government has developed artificial intelligence to monitor emotions and is testing the software on the Uyghurs (Wakefield, 2021), near perfect time enabling large communications speeds would allow this type of monitoring in real time.  And, the virtual reality created by this bandwidth and timing would allow deep fakes unlike any that exist today (Mahmud & Sharmin, 2020)

Positive uses for society with the enablement of virtual reality include medical uses, training, and entertainment (Berntsen et al., 2016).  Virtual reality at this scale enables holograms and holodecks, to include virtual meetings with holograms instead of Zoom.  This technology enables self-driving cars and other forms of self-driving transportation, since real time sensing and correcting is critical for these systems.

Conclusion

Society continues to push for higher bandwidths.  Improved synchronous timing will be required to provide the data rates and bandwidths required.  Ironically, society will not notice this invention per se, as time synchronization is too detailed and esoteric a concept for general society.  However, society wants the benefits of higher bandwidths, and will the embrace the benefits of virtual reality.  The entertainment potential alone of virtual reality is sufficient to drive the need for large data rates with the need for time synchronization.  The ability to create holograms and holodecks will have significant impact on the gaming industry, and working from home will be more feasible.  Diffusing this technology into society will be no different than implementing 4G or 5G service; society will notice that their phones and computers are more capable, but will not be concerned about the mechanisms.  Most users will enjoy the new games, better forms of long-distance relationships, new methods of education, self-driving vehicles, new ways of visualizing problems, true telemedicine, and so forth.  However, all new technology will have its doubters, and it is probable that various conspiracy theories will emerge, linking the new time synchronization and higher bandwidths to disease or aliens (Bruns et al., 2020).  Free space optical communications, particularly with its use of lasers, is an easy target for many conspiracy theories.  In conspiracy culture, lasers from space have started fires in several places, including New Zealand (Graham & Bodkin, 2020).  The cellular standard 5G causes COVID or cell towers themselves cause cancer (Bruns et al., 2020).  Worse, metaverses, which are early attempts at virtual reality, could be used to spread more believable conspiracy theories.  This is ironic, given that the conspiracy theories may disbelieve some of the core technology needed for the metaverse (Baker-White, 2022).  Education will be required to counter conspiracy theories, but this is necessary for any future new technology.  Countering the conspiracy theories with factual information is also required, as education alone may be insufficient. 

Precise timing synchronization has the potential to disrupt cryptography.  Legacy encryption standards will need to be relooked for weaknesses if femtosecond precision occurs.  However, quantum computing with its more powerful algorithms is likely to be more disruptive to encryption (Gidney & Ekerå, 2021).  NIST is currently planning encryption standards for the post-quantum computing world (NIST, 2022), and these algorithms are likely to withstand increase timing precision.  In a post quantum world, any device using legacy encryption would be effectively unencrypted, so there will be a need to remove legacy devices as quickly as possible.

A free society will need a universal right to privacy, at least as strong as that provided by the European Union (European Union, 2018), since all facets of life could be converted to data streams.  The European Union laws protect data, but do not confer a fundamental right to a person.  When the level of bandwidth is available to create ultimate virtual realities or to create dystopian monitoring, the fundamental right to privacy for a person is critical.  As an example, a person’s mannerisms, appearance, and environment could be stolen without their knowledge and placed into a virtual reality.  Artificial intelligence could be used to simulate a realistic persona from the stolen data.  Privacy laws must be written so that this type of occurrence is illegal.  Identity leakage will be more of a threat and stronger laws will be needed (Kasem-Madani et al., 2020).  Holograms of individuals could be used for a variety of illegal activities.  Cyber phishing would be much easier if a hologram of one’s aunt invited a person to click on a link.  Cyber education will need to be expanded, since the threats will have overtaken the defenses.  Education will be needed to ensure all users understand how to guard their privacy, and what legal recourse they have (Sørum et al., 2022) given how easy it will be to have no privacy.

Areas of Future Research

As data rates increase, there will always be a need for more precise timing systems.  Although this method proposes using quantum entanglement, other methods should be investigated.  Further, the supporting infrastructure for the increased bandwidth made available by precise timing should be studied.  In other words, if virtual reality requires 100 Gigabits per second, and our current 5G cell phone standard is approximately 25 Megabits per second, there is a huge mismatch between the wireless communications technology and the requirements.  Higher frequencies offer more bandwidth (Kurdoghlian et al., 2017), but for 100 Gigabits, the need is for free space optics communications system, as current radio frequency wireless is too slow.  Further, even existing fiber systems will have problems with virtual reality requirements, so improvements to that infrastructure are required.  Lastly, all encryption should be verified to ensure that it can withstand femtosecond timing precision.

References

 

Baker-White, E. (2022). Meta Wouldn’t Tell Us How It Enforces Its Rules In VR, So We Ran A Test To Find Out. https://www.buzzfeednews.com/article/emilybakerwhite/meta-facebook-horizon-vr-content-rules-test

 

Berg, A. (2021). Problems of digital control. The digital repression, religious persecution and genocide of the Uyghurs in Xinjiang by the Communist Republic China. https://helda.helsinki.fi/bitstream/handle/10138/331041/Berg_Anton_thesis_2021.pdf?sequence=2

 

Berntsen, K., Palacios, R. C., & Herranz, E. (2016). Virtual reality and its uses: a systematic literature review. Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, 435–439. https://doi.org/10.1145/3012430.3012553

 

Bruns, A., Harrington, S., & Hurcombe, E. (2020). ‘Corona? 5G? or both?’: The dynamics of COVID-19/5G conspiracy theories on Facebook. Media International Australia, 177(1), 12-29. https://doi.org/10.1177/1329878X20946113

 

Cao, H., Gao, S.-C., Zhang, C., Wang, J., He, D.-Y., Liu, B.-H., Zhou, Z.-W., Chen, Y.-J., Li, Z.-H., & Yu, S.-Y. (2020). Distribution of high-dimensional orbital angular momentum entanglement over a 1 km few-mode fiber. Optica, 7(3), 232-237. https://doi.org/10.1364/OPTICA.381403

 

Ecker, S., Bouchard, F., Bulla, L., Brandt, F., Kohout, O., Steinlechner, F., Fickler, R., Malik, M., Guryanova, Y., Ursin, R., & Huber, M. (2019). Overcoming noise in entanglement distribution. Physical Review X, 9(4), 041042. https://doi.org/10.1103/PhysRevX.9.041042

 

Edwards, B. L. (2014). NASA’s current activities in free space optical communications. International Conference on Space Optics. https://doi.org/10.1117/12.2304175

 

Engler, E. A. (1883). Time keeping in London. The Popular Science Monthly, XXII, 328–341. https://archive.org/details/popularsciencemo22newy/page/328/mode/2up

 

European Union. (2018). General Data Protection Reguation. OJ L 119, 04.05.2016. https://gdpr-info.eu

 

Gidney, C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5, 433. https://doi.org/10.22331/q-2021-04-15-433

 

Graham, B., & Bodkin, P. (2020). Conspiracists say lasers and exploding smart meteors used to start bush fires to make way for a new train network. New Zealand Herald. https://www.nzherald.co.nz/world/conspiracists-say-lasers-and-exploding-smart-meters-used-to-start-bush-fires-to-make-way-for-a-new-train-network/EFL6V737L4GWCODJ7DWXII55KU/

 

Hu, F., Deng, Y., Saad, W., Bennis, M., & Aghvami, A. H. (2020). Cellular-connected wireless virtual reality: Requirements, challenges, and solutions. IEEE Communications Magazine, 58(5), 105-111. https://doi.org/10.1109/MCOM.001.1900511

 

Huawei. (2017). Cloud Virtual Reality Bearer Networks. https://www-file.huawei.com/-/media/corporate/pdf/ilab/cloud_vr_oriented_bearer_network_white_paper_en_v2.pdf

 

Ilo-Okeke, E. O., Tessler, L., Dowling, J. P., & Byrnes, T. (2020). Entanglement-based quantum clock synchronization. AIP Conference Proceedings, 2241(1). https://doi.org/doi.org/10.1063/5.0011396

 

Kasem-Madani, S., Malderle, T., Boes, F., & Meier, M. (2020). Privacy-preserving warning management for an identity leakage warning network. Proceedings of the European Interdisciplinary Cybersecurity Conference, Article 4. https://doi.org/10.1145/3424954.3424955

 

Korzh, B., Lim, C. C. W., Houlmann, R., Gisin, N., Li, M. J., Nolan, D., Sanguinetti, B., Thew, R., & Zbinden, H. (2015, 2015/03/01). Provably secure and practical quantum key distribution over 307 km of optical fibre. Nature Photonics, 9(3), 163-168. https://doi.org/10.1038/nphoton.2014.327

 

Kurdoghlian, A., Moyer, H., Sharifi, H., Brown, D. F., Nagele, R., Tai, J., Bowen, R., Wetzel, M., Grabar, R., Santos, D., & Micovic, M. (2017, 4-9 June 2017). First demonstration of broadband W-band and D-band GaN MMICs for next generation communication systems. 2017 IEEE MTT-S International Microwave Symposium (IMS),

 

Liu, S., Zhao, L., Deng, Z., & Zhang, Z. (2021). A digital adaptive calibration method of timing mismatch in TIADC based on adjacent channels Lagrange mean value difference. Circuits, Systems, and Signal Processing. https://doi.org/10.1007/s00034-021-01785-8

 

Luo, R., Hua, N., Zheng, X., & Zhou, B. (2019). High-reliability sub-nanosecond network time synchronization method enabled by double-frequency distributed time synchronization. Journal of Optical Communications and Networking, 11(1), A40-A51. https://doi.org/10.1364/JOCN.11.000A40

 

Mahmud, B. U., & Sharmin, A. (2020). Deep insights of deepfake technology: A review. Dhaka University Journal of Science, 5(2), 13-23. https://doi.org/10.48550/arXiv.2105.00192

 

Messmer, E. (2007). Quantum cryptography to secure ballots in Swiss election. Network World. https://www.networkworld.com/article/2286834/quantum-cryptography-to-secure-ballots-in-swiss-election.html

 

NASA. (2021). Technology Readiness Levels. https://www.nasa.gov/pdf/458490main_TRL_Definitions.pdf

 

NASA. (2022). Laser Communications Relay Demonstration (LCRD). https://www.nasa.gov/mission_pages/tdm/lcrd/index.html

 

National Research Council. (1995). The Global Positioning System: A Shared National Asset. National Academies Press. https://doi.org/10.17226/4920

 

NIST. (2022). Post Quantum Cryptography Round Three Submissions. https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions

 

Rabinovich, W. S., Moore, C. I., Mahon, R., Goetz, P. G., Burris, H. R., Ferraro, M. S., Murphy, J. L., Thomas, L. M., Gilbreath, G. C., Vilcheck, M., & Suite, M. R. (2015). Free-space optical communications research and demonstrations at the U.S. Naval Research Laboratory. Applied optics, 54(31), F189-200. https://doi.org/10.1364/ao.54.00f189

 

Shinton, A. (2020). How accurate is Network Time Protocol (NTP)? TimeTools. https://timetoolsltd.com/ntp/ntp-timing-accuracy/

 

Smithsonian. (2021). Synchronized Accurate Time. https://timeandnavigation.si.edu/satellite-navigation/gps/synchronized-accurate-time

 

Snyder, D. (2019). Spooky action at a distance is not spooky-it is knowledge: Combining entanglement and negative observation to show how The Einstein-Podolsky-Rosen experiment works, not just how it doesn’t work. Bulletin of the American Physical Society, 64. https://doi.org/10.13140/RG.2.2.28269.03042

 

Snyder, W. F. (1973). Lord Kelvin on atoms as fundamental natural standards (for base units). IEEE Transactions on Instrumentation and Measurement, 22(1), 99-99. https://doi.org/10.1109/TIM.1973.4314109

 

Sørum, H., Eg, R., & Presthus, W. (2022). A Gender Perspective on GDPR and Information Privacy. Procedia Computer Science, 196, 175-182. https://doi.org/10.1016/j.procs.2021.12.003

 

Teledyne. (2021). ​Indium Gallium Arsenide Detectors​. http://www.teledynejudson.com/products/indium-gallium-arsenide-detectors

 

Trimberger, S., Rowson, J., Lang, C., & Gray, J. (1981). A structured design methodology and associated software tools. IEEE Transactions on Circuits and Systems, 28(7), 618-634. https://doi.org/10.1109/TCS.1981.1085035

 

Tseng, H., Hwang, T., & Lin, C.-Y. (2012). On the "Deterministic secure quantum communication using four-particle entangled state and entanglement swapping". Journal of Information Science and Engineering, 28(3), 471-478. https://doi.org/10.1688/JIS:.2012.28.3.3

 

Wakefield, J. (2021). AI emotion-detection software tested on Uyghurs. BBC News. https://www.bbc.com/news/technology-57101248

 

Yin, J., Cao, Y., Li, Y.-H., Liao, S.-K., Zhang, L., Ren, J.-G., Cai, W.-Q., Liu, W.-Y., Li, B., Dai, H., Li, G.-B., Lu, Q.-M., Gong, Y.-H., Xu, Y., Li, S.-L., Li, F.-Z., Yin, Y.-Y., Jiang, Z.-Q., Li, M., Jia, J.-J., Ren, G., He, D., Zhou, Y.-L., Zhang, X.-X., Wang, N., Chang, X., Zhu, Z.-C., Liu, N.-L., Chen, Y.-A., Lu, C.-Y., Shu, R., Peng, C.-Z., Wang, J.-Y., & Pan, J.-W. (2017). Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140. https://doi.org/10.1126/science.aan3211