• Get In Touch
June 23, 2013

Time Cloaking, the latest in Data Security

Need Hosting? Try ours, it's fast, reliable and feature loaded with support you can depend on.
View Plans

The thought that governments may be able to freely peruse anyone’s personal communications as and when they feel like it is quite disturbing to most Internet users. Research conducted by Purdue University into hiding data by developing time cloaks will subsequently be received as good news by all (except, maybe, governments). While turning on phase modulators every time users want to send a personal e-mail may not necessarily be a practical solution just yet, the possibilities are certainly encouraging. So what is it all about?

Essentially, the whole thing is based on the question whether a message that is not read exists. According to Bishop Berkeley (Anglo-Irish philosopher, 1685 – 1753), the answer to this question is no, and gaps in time during transmissions of messages – created by temporal cloaks – may just serve to prove him right.

Purdue University recently managed to create a cloak hiding approximately 46% of time needed to transmit data via fibre-optic cable – making around half of this transmission invisible. This further elaborates on the concept, which was first demonstrated in 2011 (Cornell University), when an experiment managed to hide one-ten-thousands of just one per cent of a transmission. The repetition rate used at the time was 41 kHz.

Purdue team member Joseph Lukens explained that the difference between the two experiments lays not so much in the length of time the cloak is established for, but in the fact that the cloak can be repeated at very high rates, subsequently allowing high speed data transmissions to be hidden.

Using optical fibre, fibre Bragg gratings (distributed Bragg reflector type consisting of alternating materials of different refractive indices through which light passes differently) and phase control modulators, the team at Purdue University is able to generate cloaks at frequencies of 12.7 billion times/ second. Multiple cloaks can be generated in regular or staggered sequences or simultaneously.

Improvements to the process’ stability could ultimately mean transmissions can be cloaked ‘for all time’. In essence, the process allows communications to be hidden as and when required by turning the phase modulators on/ off. This techniques has the potential to be improved sufficiently to hide over 90% of transmissions – with the potential to achieve close to 100% some time in the future.

According to Enderle Group’s principal analyst, Rob Enderle, optical feed security is a very clear potential application of this technique. In order for anyone to access data – which can not be recorded – they would first of all have to know that it is there. Then they would have to figure out – in real time – how to access and read it. He also suggests it could be used to increase bandwidth, as it almost creates pocket dimensions into which data can be placed.

Need Hosting? Try ours, it's fast, reliable and feature loaded with support you can depend on.
View Plans

Share this Article!

Related Posts

5 Website Hosting Solution Trends for 2022 and Beyond

5 Website Hosting Solution Trends for 2022 and Beyond

Looking for the right web hosting solution for your website can be an intimidating task. Options nowadays are more diversified than ever, and each year brings new developments in the web hosting market. If you have no clue of what to look out for, you can find yourself overwhelmed with the choices. Hence, you must […]

64 Content Marketing Statistics Demonstrating the Power of Content

64 Content Marketing Statistics Demonstrating the Power of Content

Content marketing continues to be one of the most valuable tools for today’s online businesses. With content, you can improve your chances of reaching your target audience, boost your search engine standing, and even unlock new opportunities for sales. The more content you produce, the more you can strengthen your domain authority, demonstrate your thought […]

53 User Experience Stats for 2022

53 User Experience Stats for 2022

User Experience (UX) is one of the most crucial factors to consider in web design. As the number of websites and applications in the world today continues to accelerate, businesses are under more pressure than ever to impress customers straight away. If a user visits your website and finds slow-loading pages, clunky navigation, or errors, […]

How to increase the memory limit in WordPress

How to increase the memory limit in WordPress

Do you need to increase the memory limit in WordPress? Getting an error about memory Exhausted? The memory limit is one of the most common WordPress errors as the default limit of memory in WordPress is only set to 64mb! But there’s good news! The Memory Exhausted error is one of the easiest to fix […]

All in One WordPress Migration Vulnerability

All in One WordPress Migration Vulnerability

A vulnerability has been discovered in the “All In One WordPress Migration” WordPress plugin. All versions earlier than, and including 6.97 contain a vulnerability which allows Cross-Site Scripting (XSS). With over 2 million active installations, this vulnerability has the potential to be high impact, however, this is lessened by the nature of the vulnerability, which […]