Skip to Content

Information Technology

New publications, experiments, and breakthroughs in information technology – and what they mean.

After Silicon
Microprocessors made of a different semiconductor

Source: “Beyond CMOS: Logic Suitability of In0.7Ga0.3As HEMT”
D. H. Kim and J. A. del Alamo
Paper presented at the International Conference on Compound Semiconductor Manufacturing Technology, April 24-27, 2006, Vancouver, British Columbia

Results: MIT researchers have made a transistor out of a nonsilicon semiconductor that, in early stages of development, provides speed and performance similar to those of state-of-the-art silicon transistors while consuming less power.

Why it matters: The properties of compound semiconductors such as indium gallium arsenide or indium antimonide make them attractive alternatives to silicon. Electrons move through compound semiconductors as much as 50 times faster than they do through silicon; compound-semiconductor transistors thus operate at a lower voltage, consume less power, and produce less heat that can damage a chip.

The excellent optical properties of compound semiconductors could offer another advantage. Since compound semiconductors easily produce light, photons could potentially zip data between transistors without copper wires.

Methods: The researchers used a common deposition process to build up layers of indium gallium arsenide and of the insulating material indium aluminum arsenide – the “gate dielectric” that prevents electron leakage between the transistor and its “gate,” which turns it on and off. They then used an electron beam to carve out the gate. Finally, the researchers added the metal contacts – made of nickel, germanium, and gold – that are used to put electrons in and take them out of the transistor.

Next Steps: With silicon transistors, the gate dielectric, which is made of an insulator called silicon dioxide, grows on top of the silicon when it is exposed to oxygen. Compound semiconductors, however, have poor interfaces with their oxides. The researchers are conducting tests to determine which gate dielectric material will optimize the performance of their transistors.

Quantum Key Extended
Technique keeps information private over greater distances

Source: “Experimental Quantum Key Distribution with Decoy States”
Yi Zhao et al.
Physical Review Letters 96: 070502

Results: Researchers at the University of Toronto have dramatically increased the distance that a quantum key – photons that represent bits of data for encoding and decoding secret communications – can travel by modifying a commercial quantum encryption system.

Why it matters: Quantum encryption is, in theory, a perfectly secure method for communications. Perfect security would require sending an encryption key on the backs of polarized photons, which would be transmitted – either via fiber optics or through the air – one at a time. The peculiar laws of quantum mechanics dictate that, if an eavesdropper picked off just one of these photons, the entire transmission would be altered, prompting the sender to transmit another key along a more secure path.

Unfortunately, no single-photon emitter actually exists. So scientists use the next best thing: strong filters that can winnow a laser pulse down to approximately one photon. Long-distance transmissions, however, require laser pulses of particularly high intensity, which increases the proba-bility that two photons per pulse will slip past the filter. If two identically polarized photons are sent at once, an eavesdropper can pick off one of them without disturbing the other.

Hoi-Kwong Lo and his group used the duplicate photons to their advantage. They purposely generated extra photons that contained no information about the key by passing a laser beam through a weak filter instead of a strong one. An eavesdropper wouldn’t know which photons held the key and which were decoys.

Methods: The researchers modified a commercial quantum encryption system by adding a modulator that adjusts the intensity of both decoy and key-carrying laser pulses. The filter allows the person who sends the key to randomly blend both types of pulses into the transmission.

Next Steps: On their first pass, the researchers were able to transmit a blended light signal over 60 kilometers of telecommunication fibers. With some slight modifications, the scientists say, their quantum decoy system will be able to securely send key-carrying photons 120 kilometers, a range comparable to that of commercial systems with less-rigorous security.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.