Research & Development World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE

Internet Laser Security: Digital System Acts as Key Bearer

By R&D Editors | March 26, 2010

Internet Laser Security: Digital System Acts as Key Bearer 

A British computer hacker equipped with a “Dummies” guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and national security is put at risk. The same goes for personal and financial information transmitted by phone, on the Internet or through bank machines.

Now, a new device developed by Jacob Scheuer of Tel Aviv University’s School of Electrical Engineering promises an information security system that can beat today’s hackers — and the hackers of the future — with existing fiber-optic and computer technology. Transmitting binary lock-and-key information in the form of light pulses, his device is designed to ensure that a shared key code can be unlocked by the sender and receiver, and absolutely nobody else. He will present his new findings to peers at the next laser and electro-optics conference in May 2010 at the Conference for Lasers and Electro-Optics (CLEO) in San Jose, CA.

“When the RSA system for digital information security was introduced in the 1970s, the researchers who invented it predicted that their 200-bit key would take a billion years to crack,” says Scheuer. “It was cracked five years ago. But it’s still the most secure system for consumers to use today when shopping online or using a bank card. As computers become increasingly powerful, though, the idea of using the RSA system becomes more fragile.”

Plugging a leak in a loophole

Sheuer says the solution lies in a new kind of system to keep prying eyes off secure information. “Rather than developing the lock or the key, we’ve developed a system which acts as a type of key bearer,” he explains.

But how can a secure key be delivered over a non-secure network — a necessary step to get a message from one user to another? If a hacker sees how a key is being sent through the system, that hacker could be in a position to take the key. Sheuer has found a way to transmit a binary code (the key bearer) in the form of 1s and 0s, but using light and lasers instead of numbers. “The trick,” says Scheuer, “is for those at either end of the fiber-optic link to send different laser signals they can distinguish between, but which look identical to an eavesdropper.”

New laser is key

Scheuer developed his system using a special laser he invented, which can reach over 3,000 miles without any serious parts of the signal being lost. This approach makes it simpler and more reliable than quantum cryptography, a new technology that relies on the quantum properties of photons, explains Scheuer. With the right investment to test the theory, Scheuer says it is plausible and highly likely that the system he has built is not limited to any range on earth, even a round-the-world link, for international communications.

“We’ve already published the theoretical idea and now have developed a preliminary demonstration in my lab. Once both parties have the key they need, they could send information without any chance of detection. We were able to demonstrate that, if it’s done right, the system could be absolutely secure. Even with a quantum computer of the future, a hacker couldn’t decipher the key,” Scheuer says.

Related Articles Read More >

R&D 100 winner of the day: Electromagnetic spectrum management system (ESMS)
Claude computer use
AI agents could begin transforming how we work in 2025
refinery
AI takes center stage in Honeywell-Chevron collaboration
Firefly blurred lines between a human and machine researcher 72875
Copyleaks CEO: OpenAI’s o1 emergence could blur the lines between human researcher and AI assistant
rd newsletter
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, trends, and strategies in Research & Development.
RD 25 Power Index

R&D World Digital Issues

Fall 2024 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R&D magazine today.

Research & Development World
  • Subscribe to R&D World Magazine
  • Enews Sign Up
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • Global Funding Forecast

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE