< img src = "/uploads/blogs/a5/e1/ib-ibs4tkv_fc931624.jpg" Alt = "noise instead of data: how China hides information and transmits it at a speed < p > Shanghai University Jiaotun solved one of the oldest problems of telecommunications. Scientists conveyed 1 TB/C & mdash; About 40 streams of Ultra-Hd Netflix & mdash; after 1200 km of standard fiber, leaving no interceptors nothing but noise.
< p > About this & nbsp; writes & nbsp; edition interestingenGineering.com.
< p > The technology combines the secrecy of a single -rose cipher blocknote with a bandwidth in therabit, leaving only a senseless noise to interceptors. The focus consists of a program-determined layer of “integrated encryption and communication” (IEAC) that hides the cipher inside the physics of the light itself.
< H2 > Why is it difficult to combine the speed and secrecy of data transmission
< p >Modern trunk channels are already transmitting hundreds of gigabit, but they rely on IPSEC, TLS encryption, which, however, does not prevent hackers from intercepting raw optical signal. There are physical level encryption options & mdash; quantum key distribution or chaotic lasers, & mdash; However, they slow down the networks to a minimum or require expensive equipment.
< p > The traditional flash drives are the opposite problem: the secrecy of a single cipher (OTP), but at kilobuimal speeds. Ieac & mdash; The first architecture that promises both at the same time as it enables modulation format, “alphabet” of light pulses, doubled as a cipher.
< H2 > How IEAC converts each character to a one -time code
< p >Imagine light inside the fiber as a target for Darts: each point is a combination of amplitude and phase that encodes several bits. The neural network has chosen a new pseudo -pattern for each such “target”, driven by high -speed generators of random numbers on the transmitter and receiver. As a result, the authorized users were able to share their original number, so they saw a neat template, but the one who tried to make an unauthorized data interception, saw only something like “Snow Storm”.
~ ~ > 62 > 62 > < P > Mathematically, researchers optimized for maximum mutual information (Mi) between two legal nodes and a minimum Mi for those who have no key. In practice, mi interceptor has fallen from the usual four bits to a symbol to a level below 0.2, so low that the restored flow is statistically different from the background noise.
< H2 > How 1 TB of Data on Fiber Fiber < p >The equipment demonstration used 26 wavelengths distributed throughout the C-band, which was a spectrum of 3.9 THz. Each channel worked with 32-gigabit signals with double polarization generated by the generated AI constellations, then passed through a recirculation circuit, which mimic the 1200 km of installed fiber with nonlinear distortions. At the far end, the team registered the incidence of bits below 2 & Times; 10- & sup2; & mdash; comfortable within the commercial correction of errors & mdash; At the same time, still tacting 1 tbits/s of pure amounts.
< h2 > Why new development is important for si
< P > Global traffic of data centers doubles every two & ndash; three years, pushed by models and cloud analytics. Operators need a large capacity and guaranteed confidentiality for medical records, financial transactions or work of Shi models.
< p > Since IEAC uses standard coherent optics & mdash; nothing quantum, no vacuum-German “black boxes” & mdash; It can be deployed as updating the firmware inside the existing transponder. The design is also scaled: machine learning mechanism can be overlooked for longer ranges, denser wavelengths or higher order modulation as the equipment is improved.< P > Scientists call the structure “the bridge between the security of tomorrow and the terabit channels”. With one laboratory prototype, the command showed that encryption should no longer be an additional tax & mdash; It can be embedded in light, at the speed of the line, at continental distances.
< img src = "/uploads/blogs/82/59/ib-FS5m3kleh_a4999ea2a.jpg" Alt = "Woman made money through social networks allegedly at…
< IMG SRC = "/Uploads/Blogs/71/8A/IB-FS5M7HKMR_316240df.jpg" Alt = "The Committee for the Protection of Journalists declared…
< IMG SRC = "/Uploads/Blogs/44/78/IB-FS5roansg_3C01C634.jpg" Alt = "in Turkey reported the development of new prototypes…
< img src = "/uploads/blogs/3a/04/ib-FS5sAptqt_715237c6.jpg" Alt = "Burn the UAV swarm per seconds: Marines received…
< img src = "/uploads/blogs/94/4a/IB-FS5RJC8BH_4999EA2A6.jpg" Alt = "Apple reported on hackers on iPhone in 100…
< IMG SRC = "/Uploads/Blogs/9C/AE/IB-FS5RM590j_15237c6f.jpg" Alt = "Skype is finally stopped work: users are transferred…