SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
The 'unjammable' quantum radar that could
render ALL stealth planes useless
U.S. researchers have employed the quantum properties of photons to create an unjammable
radar signal.

Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to
create false reflections to drowning the radar frequency with noise.

More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are
able to intercept the the signals and send back false information.




A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of
radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft
systems

However, a team from the University of Rochester, New York have shown how the quantum
properties of photons can be used to outsmart this advanced stealth technology.

The new radar concept relies on the fact that any attempt to measure a photon always destroys its
quantum properties, MIT's Technology Review explains.
Physicists have exploited the quantum properties of photons to create the first imaging system
that is unjammable




Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and
resend them in a way that disguises its position, it would inevitably change the photons' quantum
properties




Jamming radar signals is an increasingly sophisticated affair. There are various techniques such
as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the
most advanced radar systems can get around these ruses.

So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives
false information about the target before sending it back. That’s much harder to outsmart.

But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a
way to do it.

These guys base their technique on the quantum properties of photons and in particular on the
fact that any attempt to measure a photon always destroys its quantum properties.

So their idea is to use polarised photons to detect and image objects. Reflected photons can of
course be used to build up an image of the object. But an adversary could intercept these photons
and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
However, such a process would always change the quantum properties of the photons such as
their polarisation. And so it should always be possible to detect such interference. “In order to
jam our imaging system, the object must disturb the delicate quantum state of the imaging
photons, thus introducing statistical errors that reveal its activity,” say Malik and co.

That’s more or less exactly how quantum key distribution for cryptography works. The idea here
is that any eavesdropper would change the quantum properties of the key and so reveal his or her
presence. The only difference in the quantum imaging scenario is that the “message” is sent and
received by the same person.

Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and
measuring the polarisation error rate in the return signal. Without any eavesdropping the system
easily imaged the aeroplane.

But when an adversary intercepted the photons and modified them to send back an image of a
bird, the interference was easy to spot, say Malik and co.

That’s an impressive demonstration of the first imaging system that is unjammable thanks to
quantum mechanics.

That’s not to say the technique is perfect. It suffers from the same limitations that plague early
quantum cryptographic systems, which are theoretically secure but crackable in practice.

For example, instead of sending single photons, the quantum imaging system sends photon
pulses which contain several photons. One or more of these can easily be siphoned away and
analysed by an adversary without anybody else being any the wiser.

However, there are an increasingly wide range of fixes for these problems for quantum key
distribution that could help make this quantum imaging system more secure.

Perhaps best of all, this kind of system could easily be put to work now. The techniques are well
known and widely used in optics labs all over the world. So there’s no reason, this security
cannot be added relatively quickly and cheaply to existing imaging systems.

Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging

The technology works in a similar way to quantum key distribution for cryptography, where any
eavesdropper would change the quantum properties of the key by listening in, revealing his or
her presence.

Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics,
tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the
return signal's polarisation error rate.
The system easily imaged the war plane without any eavesdropping, but when the adversary
intercepted the signal and modified it to send back the image of a bird, the radar was easily able
to see through the ruse.




No fooling us: When there is no jamming attack, the received image faithfully reproduces the
actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right,
the imaging system can detect the presence of the jamming attack, because of the large error rate
in the received polarization

However, the researchers admit that their novel radar system is still not perfect. As MIT's
blogger explains, it suffers from the same limitations that plagued early quantum cryptographic
systems.

The quantum radar sends photons in pulses that contain several of the quantum particles, one or
more of which could be easily siphoned away and replicated to tune the signal sent back to the
same state as the one sent.

'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state
of our querying photons onto photons carrying false position or time information,' says the study.

However, while the equipment needed to carry out such sophisticated jamming is readily
available in labs worldwide, it is not thought yet to be deployed by the military.

Mais conteúdo relacionado

Mais procurados

LIGO - General Information
LIGO - General InformationLIGO - General Information
LIGO - General Information
Ian Rothbarth
 
Radiation detectors
Radiation detectorsRadiation detectors
Radiation detectors
jmocherman
 
Surface acoustic wave (saw) based sensors
Surface acoustic wave (saw) based sensorsSurface acoustic wave (saw) based sensors
Surface acoustic wave (saw) based sensors
sjykmuch
 
Radar transmitter 4 (1)
Radar transmitter 4 (1)Radar transmitter 4 (1)
Radar transmitter 4 (1)
Ritesh Goel
 
Non ionising radiation
Non ionising radiationNon ionising radiation
Non ionising radiation
Mike Slater
 

Mais procurados (20)

Dr. Jason Valentine-Metamaterials 2017
Dr. Jason Valentine-Metamaterials 2017Dr. Jason Valentine-Metamaterials 2017
Dr. Jason Valentine-Metamaterials 2017
 
Surface acoustic wave technology
Surface acoustic wave technologySurface acoustic wave technology
Surface acoustic wave technology
 
LIGO - General Information
LIGO - General InformationLIGO - General Information
LIGO - General Information
 
Pulse Doppler Radar
Pulse Doppler RadarPulse Doppler Radar
Pulse Doppler Radar
 
Radiation detectors
Radiation detectorsRadiation detectors
Radiation detectors
 
Active methods of neutron detection
Active methods of neutron detectionActive methods of neutron detection
Active methods of neutron detection
 
Surface acoustic wave (saw) based sensors
Surface acoustic wave (saw) based sensorsSurface acoustic wave (saw) based sensors
Surface acoustic wave (saw) based sensors
 
Different types of sensors
Different types of sensorsDifferent types of sensors
Different types of sensors
 
L i g o ( Laser Interferometer Gravitational-Wave Observatory)
L i g o ( Laser Interferometer Gravitational-Wave Observatory)L i g o ( Laser Interferometer Gravitational-Wave Observatory)
L i g o ( Laser Interferometer Gravitational-Wave Observatory)
 
What is photonics - PDplus at RiAus
What is photonics - PDplus at RiAusWhat is photonics - PDplus at RiAus
What is photonics - PDplus at RiAus
 
Radar
RadarRadar
Radar
 
RADAR
RADARRADAR
RADAR
 
Lasers and optical fibre communications
Lasers and optical fibre  communicationsLasers and optical fibre  communications
Lasers and optical fibre communications
 
Radar transmitter 4 (1)
Radar transmitter 4 (1)Radar transmitter 4 (1)
Radar transmitter 4 (1)
 
Icrp60
Icrp60Icrp60
Icrp60
 
Optical fiber laser
Optical fiber laser Optical fiber laser
Optical fiber laser
 
Thermal Imaging and its Applications
Thermal Imaging and its ApplicationsThermal Imaging and its Applications
Thermal Imaging and its Applications
 
Radiation detection instrumentation fundamentals
Radiation detection instrumentation fundamentalsRadiation detection instrumentation fundamentals
Radiation detection instrumentation fundamentals
 
Non ionising radiation
Non ionising radiationNon ionising radiation
Non ionising radiation
 
Unit 1 ppt notes /BM8702 /RADIOLOGICAL EQUIPMENTS
Unit 1 ppt notes /BM8702 /RADIOLOGICAL EQUIPMENTSUnit 1 ppt notes /BM8702 /RADIOLOGICAL EQUIPMENTS
Unit 1 ppt notes /BM8702 /RADIOLOGICAL EQUIPMENTS
 

Destaque (8)

Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
stealth technology
stealth technologystealth technology
stealth technology
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A Few
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Semelhante a The 'unjammable' quantum radar

上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
algous
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Tahoe Silicon Mountain
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
Clifford Stone
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
Dr. Ali Nassib
 

Semelhante a The 'unjammable' quantum radar (20)

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
 
Ai covers space
Ai covers spaceAi covers space
Ai covers space
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
 
November 30, Projects
November 30, ProjectsNovember 30, Projects
November 30, Projects
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - medium
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUB
 
Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09
 
Jermaine Taylor Presentation
Jermaine Taylor PresentationJermaine Taylor Presentation
Jermaine Taylor Presentation
 
1047 bae[1]
1047 bae[1]1047 bae[1]
1047 bae[1]
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptx
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems ones
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Mais de Mustakeem Chaudhri

Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
Mustakeem Chaudhri
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
Mustakeem Chaudhri
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
Mustakeem Chaudhri
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
Mustakeem Chaudhri
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
Mustakeem Chaudhri
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
Mustakeem Chaudhri
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
Mustakeem Chaudhri
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
Mustakeem Chaudhri
 

Mais de Mustakeem Chaudhri (20)

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying america
 
Doomsday seed vault
Doomsday seed vaultDoomsday seed vault
Doomsday seed vault
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynasty
 
Jews origin (Rothschild)
Jews origin (Rothschild)Jews origin (Rothschild)
Jews origin (Rothschild)
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the world
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyed
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild family
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about america
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarks
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
 
Israel has nuclear weapons
Israel has nuclear weaponsIsrael has nuclear weapons
Israel has nuclear weapons
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

The 'unjammable' quantum radar

  • 1. The 'unjammable' quantum radar that could render ALL stealth planes useless U.S. researchers have employed the quantum properties of photons to create an unjammable radar signal. Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to create false reflections to drowning the radar frequency with noise. More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are able to intercept the the signals and send back false information. A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft systems However, a team from the University of Rochester, New York have shown how the quantum properties of photons can be used to outsmart this advanced stealth technology. The new radar concept relies on the fact that any attempt to measure a photon always destroys its quantum properties, MIT's Technology Review explains.
  • 2. Physicists have exploited the quantum properties of photons to create the first imaging system that is unjammable Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and resend them in a way that disguises its position, it would inevitably change the photons' quantum properties Jamming radar signals is an increasingly sophisticated affair. There are various techniques such as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the most advanced radar systems can get around these ruses. So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives false information about the target before sending it back. That’s much harder to outsmart. But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a way to do it. These guys base their technique on the quantum properties of photons and in particular on the fact that any attempt to measure a photon always destroys its quantum properties. So their idea is to use polarised photons to detect and image objects. Reflected photons can of course be used to build up an image of the object. But an adversary could intercept these photons and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
  • 3. However, such a process would always change the quantum properties of the photons such as their polarisation. And so it should always be possible to detect such interference. “In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity,” say Malik and co. That’s more or less exactly how quantum key distribution for cryptography works. The idea here is that any eavesdropper would change the quantum properties of the key and so reveal his or her presence. The only difference in the quantum imaging scenario is that the “message” is sent and received by the same person. Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and measuring the polarisation error rate in the return signal. Without any eavesdropping the system easily imaged the aeroplane. But when an adversary intercepted the photons and modified them to send back an image of a bird, the interference was easy to spot, say Malik and co. That’s an impressive demonstration of the first imaging system that is unjammable thanks to quantum mechanics. That’s not to say the technique is perfect. It suffers from the same limitations that plague early quantum cryptographic systems, which are theoretically secure but crackable in practice. For example, instead of sending single photons, the quantum imaging system sends photon pulses which contain several photons. One or more of these can easily be siphoned away and analysed by an adversary without anybody else being any the wiser. However, there are an increasingly wide range of fixes for these problems for quantum key distribution that could help make this quantum imaging system more secure. Perhaps best of all, this kind of system could easily be put to work now. The techniques are well known and widely used in optics labs all over the world. So there’s no reason, this security cannot be added relatively quickly and cheaply to existing imaging systems. Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging The technology works in a similar way to quantum key distribution for cryptography, where any eavesdropper would change the quantum properties of the key by listening in, revealing his or her presence. Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics, tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the return signal's polarisation error rate.
  • 4. The system easily imaged the war plane without any eavesdropping, but when the adversary intercepted the signal and modified it to send back the image of a bird, the radar was easily able to see through the ruse. No fooling us: When there is no jamming attack, the received image faithfully reproduces the actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right, the imaging system can detect the presence of the jamming attack, because of the large error rate in the received polarization However, the researchers admit that their novel radar system is still not perfect. As MIT's blogger explains, it suffers from the same limitations that plagued early quantum cryptographic systems. The quantum radar sends photons in pulses that contain several of the quantum particles, one or more of which could be easily siphoned away and replicated to tune the signal sent back to the same state as the one sent. 'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state of our querying photons onto photons carrying false position or time information,' says the study. However, while the equipment needed to carry out such sophisticated jamming is readily available in labs worldwide, it is not thought yet to be deployed by the military.