“Time Cloak” Could Secure Data Transmission

Experiment generates time gaps where data can hide

4 min read
“Time Cloak” Could Secure Data Transmission
Image: Mark Swallow/iStockphoto

06NWCloakedSignalsmasterImage: Mark Swallow/iStockphoto

Invisibility cloaks—spots of impenetrable darkness that can conceal objects, making them undetectable to ordinary observers—are real, physicists have shown in recent years. Even stranger, researchers from Cornell University announced last year that they had successfully hidden not an object but an event in a “time cloak.” This week, scientists from Purdue University reported in the journal Nature that they’ve improved on that “temporal cloaking” technique in a way that might lead to real applications, such as securing data transmitted through optical fibers. The previous cloak hid a single event for just 50 trillionths of a second, long enough to obscure a single bit of data in a typical telecom transmission scheme. The new cloak was able to hide about 12 billion such events per second, making them invisible to an eavesdropper.

“Our work is, to my knowledge, the second experiment in the temporal cloaking field,” says Andrew Weiner, a professor of electrical and computer engineering at Purdue who helped conceive and then supervised the Purdue study. “In temporal cloaking, we’re still talking about the control of the flow of light. But rather than steering it around spatial objects, we’re steering it forward and backward in time so it doesn’t overlap with events that happen in time.”

It may seem like the experimenters are pulling a clever magic trick, but that trick is based on immutable laws of physics. Light carries information. It shines on objects, and our eyes perceive the details of these objects. If light were somehow bent around an object, that object would become invisible.

Light also has a special relationship to time: Since light has speed, the moment a beam of light illuminates an event, it indicates when the event happened. If an event can occur without light to reveal it, the event can go unrecorded. This is what happens with temporal cloaking.

In essence, the demonstration reported by Weiner and his students wasn’t very different from the one that preceded it a year ago: A beam of light was sent into an experimental system that had been rigged with fiber optics and coupled with a detector. Somewhere along the fiber-optic cable, a tiny dark hole—a time gap—formed within the beam and then quickly closed back up, as if there had been no interference in the light at all. Inside that time hole, an event—or a bit of data—could have slipped through unbeknownst to an onlooker.

But in the original Cornell experiment, the time hole had been created by pulsing one laser beam with a second laser, which transformed the first laser’s wavelength into a range of wavelengths, thus manipulating light with light. Then the beam entered a special section of the cable that carried one wavelength of the light faster than the other. A gap of darkness 1 centimeter long and lasting 50 picoseconds opened up right in the middle. Then the beam was reassembled when the light entered a section of the cable that reversed this effect, decompressing the beam as though nothing strange had happened.

The researchers used amplified femtosecond lasers and nonlinear optics to create the time hole in this first setup. But in the experiment reported this week, Weiner and his students manipulated the beam of light with a phase modulator, which is typically used in telecommunications to encode data onto an optical fiber. The modulator manipulated the light in the same way as in the Cornell experiment, opening a time gap that also lasted for tens of picoseconds. But since telecom modulators are capable of encoding billions of bits per second and require less power than femtosecond lasers, this newer system can generate cloaks much more rapidly—at a rate of 12.7 billion times a second. At that rate, you could hide 46 percent of a typical telecom transmission. That’s a considerable improvement over the previous rate of 40 000 times per second.

The new cloak isn’t perfect—for one thing, an eavesdropper could still potentially retrieve more than half the signal. But from a security standpoint, removing half the data is still valuable. However, according to Weiner, in theory they could hide more than 90 percent of the signal if they improved their system by utilizing better (and pricier) phase modulators.

Alessandro Farsi, a doctoral student in the laboratory of Alexander L. Gaeta and a member of the Cornell team that conducted the first demonstration of temporal cloaking, agrees that this new experiment overcame one major limitation of their group’s old setup. “What they managed to do is to have the gap open in a more repetitive way,” he says. “If you are able to take a continuous signal, as they do, and compress it into many little peaks, now you have a lot of empty space where things can happen and not interact with the signal, and you’ll be able to hide them.”

Farsi imagined a few other new applications for the technology, including labeling different data streams and hiding noise to improve a signal. “The techniques that have been developed for generating the cloaking are useful also for enhancing data,” he says. He can also see how this new method could be another step toward the coveted “spatio-temporal cloaking,” the combination of cloaking in space and time. “This application of a [temporal] cloaking could be brought back to spatial cloaking devices,” Farsi says. “Ideas cross-pollinate, and this is an interesting approach.”

Vladimir Shalaev, a professor of electrical and computer engineering also at Purdue, whose work focuses on spatial cloaking but who was not involved in the research, is likewise optimistic about the direction of the field. “What I learned is that every time you have beautiful physics, applications will come,” he says. “A year ago, lots of people—for good reason—had quite a bit of skepticism [about cloaking], and now there’s a very real piece of application,” he says.

The Conversation (0)

How Police Exploited the Capitol Riot’s Digital Records

Forensic technology is powerful, but is it worth the privacy trade-offs?

11 min read
 Illustration of the silhouette of a person with upraised arm holding a cellphone in front of the U.S. Capitol building. Superimposed on the head is a green matrix, which represents data points used for facial recognition
Gabriel Zimmer

The group of well-dressed young men who gathered on the outskirts of Baltimore on the night of 5 January 2021 hardly looked like extremists. But the next day, prosecutors allege, they would all breach the United States Capitol during the deadly insurrection. Several would loot and destroy media equipment, and one would assault a policeman.

No strangers to protest, the men, members of the America First movement, diligently donned masks to obscure their faces. None boasted of their exploits on social media, and none of their friends or family would come forward to denounce them. But on 5 January, they made one piping hot, family-size mistake: They shared a pizza.

Keep Reading ↓Show less