A logical phi-bit was generated by replicating the experimental arrangement described in10, the setup consisted of three aluminum rods, approximately 60cm long, arranged in a linear array with a lateral gap of 2mm filled with epoxy. Transducers were used to drive and detect the acoustic field at the ends of the rods. The waveguides are labeled 1, 2, and 3, where waveguide 2 is sandwiched between waveguides 1 and 3. Two driving transducers located on waveguide 1 and waveguide 2 were excited with sinusoidal signals at the primary frequencies ({f}_{1}) and ({f}_{2}), respectively. The third waveguide was not driven. The driving transducers were connected to different function generators and amplifiers and were driven with the same peak-to-peak voltage of 80V. Three detecting transducers were connected to an oscilloscope to measure the voltage (displacement field) generated at the other ends of the waveguides. The detected temporal signals are fast Fourier transformed (FFT) to produce a power spectrum. In the spectral domain, we observed strong peaks associated with the primary frequencies as well as weaker peaks associated with nonlinear vibrational modes supported by the inherently nonlinear system. A logical phi-bit,i, is defined as a nonlinear mode in which frequency can be written as a linear combination of the primary frequencies:
$${F}^{(i)}=p{f}_{1}+q{f}_{2}$$
(1)
where p and q are integer coefficients.
A single logical phi-bit i is characterized by its frequency but also the corresponding relative phases between the acoustic waveguides. The relative phases between waveguides 1 and 2 and between waveguides 1 and 3 at the phi-bit frequency, ({F}^{(i)}), are written as the phase difference ({varphi }_{12}^{(i)}={varphi }_{2}^{(i)}-{varphi }_{1}^{(i)}) and ({varphi }_{13}^{(i)}={varphi }_{3}^{(i)}-{varphi }_{1}^{left(iright)}), respectively. Here, the phase of the nonlinear mode at the end of waveguide 1 is used as a reference.
The two-phase differences serve as degrees of freedom for representing a logical phi-bit as a two-level system that may be characterized as a 21 vector with complex components. Within this representation, a logical phi-bit is analogous to a qubit. Notably, logical phi-bits co-exist in the same physical space, that is, the space of the physical system. Since logical phi-bits are nonlinear vibrational modes generated from the same driving frequencies, their associated phase differences are correlated to each other. Subsequently, the two-level system representations of multiple phi-bits are also strongly correlated and can be simultaneously manipulated by tuning the driving conditions of the system. Effectively, the state of N logical phi-bits may be represented as a 2N1 complex vector spanning an exponentially scaling space (i.e., a Hilbert space). The representation of the N phi-bit state depends on the choice of the basis of the Hilbert space. The strong nonlinear coupling between the phi-bits enables manipulation of the component of this large complex vector in a parallel manner by changing the driving conditions. Furthermore, the components of the large multi-phi-bit state vector can be used to encode information. Parallel manipulation of these components can be used to encrypt the encoded information. The inverse manipulation can also be used to decrypt the encrypted information in an efficient manner.
We illustrate this encryption method in the case of a N=5 phi-bit system. For this, the driving frequencies are taken as ({f}_{1}=62,text{kHz}) and ({f}_{2}=66,text{kHz}). We tune ({f}_{1}) by increments of (Delta nu left(nright)=left(n-1right)*50,text{Hz}) with (nin [text{1,81}]), thus spanning a range of frequency of 0 to 4kHz.
We are considering phi-bits 1 through 5 with corresponding values p and q of (5, 4), (4, 3), (1, 2), (1, 1), and (4, 1), respectively. The phi-bits are selected at random which indicates randomness of the p and q values. In Fig.1a, we report experimentally measured ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )) for the five selected phi-bits. We note that the phase differences exhibit two different behaviors. The first behavior is associated with a common monotonous variation of the phase differences. The second behavior which is only occurring in the case of phi-bits 4 and 5 takes the form of sharp 180 ((pi)) jumps. The possible physical origin of these two behaviors has been discussed at length in references14. Here we focus on the first behavior by correcting the phase differences by the (pi) jumps to obtain continuous variations for all phi-bits. Moreover, in the case of the first behavior we have shown in15 that the phase differences of the phi-bits relate to the phase differences at the primary frequencies in a linear manner. Indeed, we can write.
$${varphi }_{12}^{left(iright)}left({f}_{1}+Delta nu ,{f}_{2}right)=p{varphi }_{12}left({f}_{1}+Delta nu right)+q{varphi }_{12}left({f}_{2}right)$$
(2a)
$${varphi }_{13}^{left(iright)}left({f}_{1}+Delta nu ,{f}_{2}right)=p{varphi }_{13}left({f}_{1}+Delta nu right)+q{varphi }_{13}left({f}_{2}right)$$
(2b)
where p and q are the same coefficients as in Eq.(1).
(a) Experimentally measured ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )) for the five phi-bits i=1,5. (b) Rescaled and corrected ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )). See text for details.
In Fig.1b, we rescale the corrected phase differences of the phi-bits by the factor p only, since the ({varphi }_{12}left({f}_{2}right)) and ({varphi }_{13}left({f}_{2}right)) remain constant. The rescaled and corrected phase differences of the five phi-bits behave simultaneously in the same manner. The vertical offset is simply due to the constant ({qvarphi }_{12}left({f}_{2}right)) and ({qvarphi }_{13}left({f}_{2}right)).
Each phi-bit, i, is represented in a two-dimensional Hilbert space, taking the form reminiscent of a Bloch sphere representation:
$$V^{left( i right)} = left( {begin{array}{*{20}c} {sin left( {beta^{left( i right)} } right)} \ {e^{{igamma^{left( i right)} }} cos left( {beta^{left( i right)} } right)} \ end{array} } right).$$
(3)
In that representation, for the sake of simplicity, we assume (gamma^{left( i right)} = 0), and
$$beta^{left( i right)} left( {Delta nu left( n right)} right) = Kleft( {varphi_{12}^{left( i right)} left( {Delta nu left( n right)} right) - varphi_{12}^{left( i right)} left( {Delta nu left( {n = 1} right)} right)} right) + frac{3pi }{4}$$
(4)
To address the offset in the rescaled and corrected phases of Fig.1b we use ({varphi }_{12}^{(i)}left(Delta nu left(n=1right)right)) as origins as well as the reference for encoding information. In Eq.(4), K is a scaling factor to amplify the range spanned by ({varphi }_{12}^{(i)}). For the sake of simplicity, we have made ({beta }^{left(iright)}) a function of ({varphi }_{12}^{(i)}) only, other forms could be defined as function of ({varphi }_{12}^{(i)}) and ({varphi }_{13}^{(i)}) offering an extra degree of freedom in the manipulation of the phi-bit state vector. At the driving frequency ({f}_{1}=62,text{kHz} ,,text{and},, n=1), ({beta }^{left(iright)}=frac{3pi }{4}) and
$$V^{left( i right)} = frac{1}{sqrt 2 }left( {begin{array}{*{20}c} 1 \ { - 1} \ end{array} } right).$$
(5)
Let us consider a system made of five phi-bits, we can define the state of the system as the tensor product of the phi-bits:
$$V = V^{left( 1 right)} otimes V^{left( 2 right)} otimes V^{left( 3 right)} otimes V^{left( 4 right)} otimes V^{left( 5 right)} .$$
(6)
This tensor product evaluated at the reference driving frequency takes the form:
$$V^{T} = frac{1}{{2^{5/2} }}left[ {1,, - 1,,- 1,,1,,- 1,,1,,1,,- 1,,- 1,,1,,1,,- 1,,1,,- 1,,- 1,,1,,- 1,,1,,1,,- 1,,1,,- 1,,- 1,,1,,1,,- 1,,- 1,,1,,- 1,,1,,1,,- 1} right].$$
(7)
We now consider a new representation of the five phi-bit state vector,
$$widehat{V}= frac{left(1+ {V}^{{prime}T}right)}{2}= left[1,,0,,0,,1,,0,,1,,1,,0,,0,,1,,1,,0,,1,,0,,0,,1,,0,,1,,1,,0,,1,,0,,0,,1,,1,,0,,0,,1,,0,,1,,1 0right]$$
(8)
where ({V}^{{prime}T}={{2}^{5/2}V}^{T}).
This new representation of the five phi-bit state corresponds to a change of basis of the Hilbert space. While the vector V is separable, the vector (widehat{V}) is not separable into a tensor product of single phi-bit states. In quantum information science non-separability of multiple qubit states is necessary for establishing quantum correlations between the qubits. In the case of phi-bit based information science, the components of a multi-phi-bit state vector such as Eq.(7) are correlated via the nonlinearity of the physical system. The string of correlated ones and zeros in (widehat{V}) can therefore be employed to encode a message as well as encrypt that message by applying a unitary transformation on (widehat{V}). Here we illustrate this encryption process in the case of a short message encoded using 5 phi-bits. In general, the state vector (widehat{V}) of a N phi-bit system is a 2Nx1 vector with 1 and 0 elements providing sufficient bits for encoding very long messages when N is large. For instance, when N=50 the number of bits available for encoding a message is on the order of 1015. The encryption of a message encoded on this large number of bits would only require a change in the driving condition of the array of waveguides to achieve the encrypting unitary transformation. Such an operation takes approximately a millisecond on the physical system used here, since the speed of sound in the constitutive materials is on the order of a few thousand meters per second.
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]