Skip to Content

Information Technology

New publications, experiments, and breakthroughs in information technology – and what they mean.

After Silicon
Microprocessors made of a different semiconductor

Source: “Beyond CMOS: Logic Suitability of In0.7Ga0.3As HEMT”
D. H. Kim and J. A. del Alamo
Paper presented at the International Conference on Compound Semiconductor Manufacturing Technology, April 24-27, 2006, Vancouver, British Columbia

Results: MIT researchers have made a transistor out of a nonsilicon semiconductor that, in early stages of development, provides speed and performance similar to those of state-of-the-art silicon transistors while consuming less power.

Why it matters: The properties of compound semiconductors such as indium gallium arsenide or indium antimonide make them attractive alternatives to silicon. Electrons move through compound semiconductors as much as 50 times faster than they do through silicon; compound-semiconductor transistors thus operate at a lower voltage, consume less power, and produce less heat that can damage a chip.

The excellent optical properties of compound semiconductors could offer another advantage. Since compound semiconductors easily produce light, photons could potentially zip data between transistors without copper wires.

Methods: The researchers used a common deposition process to build up layers of indium gallium arsenide and of the insulating material indium aluminum arsenide – the “gate dielectric” that prevents electron leakage between the transistor and its “gate,” which turns it on and off. They then used an electron beam to carve out the gate. Finally, the researchers added the metal contacts – made of nickel, germanium, and gold – that are used to put electrons in and take them out of the transistor.

Next Steps: With silicon transistors, the gate dielectric, which is made of an insulator called silicon dioxide, grows on top of the silicon when it is exposed to oxygen. Compound semiconductors, however, have poor interfaces with their oxides. The researchers are conducting tests to determine which gate dielectric material will optimize the performance of their transistors.

Quantum Key Extended
Technique keeps information private over greater distances

Source: “Experimental Quantum Key Distribution with Decoy States”
Yi Zhao et al.
Physical Review Letters 96: 070502

Results: Researchers at the University of Toronto have dramatically increased the distance that a quantum key – photons that represent bits of data for encoding and decoding secret communications – can travel by modifying a commercial quantum encryption system.

Why it matters: Quantum encryption is, in theory, a perfectly secure method for communications. Perfect security would require sending an encryption key on the backs of polarized photons, which would be transmitted – either via fiber optics or through the air – one at a time. The peculiar laws of quantum mechanics dictate that, if an eavesdropper picked off just one of these photons, the entire transmission would be altered, prompting the sender to transmit another key along a more secure path.

Unfortunately, no single-photon emitter actually exists. So scientists use the next best thing: strong filters that can winnow a laser pulse down to approximately one photon. Long-distance transmissions, however, require laser pulses of particularly high intensity, which increases the proba-bility that two photons per pulse will slip past the filter. If two identically polarized photons are sent at once, an eavesdropper can pick off one of them without disturbing the other.

Hoi-Kwong Lo and his group used the duplicate photons to their advantage. They purposely generated extra photons that contained no information about the key by passing a laser beam through a weak filter instead of a strong one. An eavesdropper wouldn’t know which photons held the key and which were decoys.

Methods: The researchers modified a commercial quantum encryption system by adding a modulator that adjusts the intensity of both decoy and key-carrying laser pulses. The filter allows the person who sends the key to randomly blend both types of pulses into the transmission.

Next Steps: On their first pass, the researchers were able to transmit a blended light signal over 60 kilometers of telecommunication fibers. With some slight modifications, the scientists say, their quantum decoy system will be able to securely send key-carrying photons 120 kilometers, a range comparable to that of commercial systems with less-rigorous security.

Keep Reading

Most Popular

open sourcing language models concept
open sourcing language models concept

Meta has built a massive new language AI—and it’s giving it away for free

Facebook’s parent company is inviting researchers to pore over and pick apart the flaws in its version of GPT-3

transplant surgery
transplant surgery

The gene-edited pig heart given to a dying patient was infected with a pig virus

The first transplant of a genetically-modified pig heart into a human may have ended prematurely because of a well-known—and avoidable—risk.

Muhammad bin Salman funds anti-aging research
Muhammad bin Salman funds anti-aging research

Saudi Arabia plans to spend $1 billion a year discovering treatments to slow aging

The oil kingdom fears that its population is aging at an accelerated rate and hopes to test drugs to reverse the problem. First up might be the diabetes drug metformin.

Yann LeCun
Yann LeCun

Yann LeCun has a bold new vision for the future of AI

One of the godfathers of deep learning pulls together old ideas to sketch out a fresh path for AI, but raises as many questions as he answers.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.