Quantum communication systems offer the promise of virtually unbreakable encryption.
Unlike classical encryption, which is used to send secure data over networks today and whose security depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data. This approach ensures that an eavesdropper with access only to the data could not decipher the key. However, researchers have recently demonstrated that even quantum encryption may be susceptible to hacking.
In a presentation next month at the Conference on Lasers and Electro-Optics (CLEO: 2013) in San Jose, Calif., Renato Renner of the Institute for Theoretical Physics in Zurich will discuss how he and his team of theoretical physicists are working on new ways to calculate the failure probability of certain quantum encryption schemes. The numbers would allow users to estimate how likely it would be that an adversary could read their secret messages—information that is critical for ensuring the overall security of quantum communications.
Quantum key distribution (QKD) is a kind of quantum encryption in which a secret password is shared between two distant parties (usually named Alice and Bob in thought experiments). The secret password, or key, is distributed as bits of quantum data, so that if an eavesdropper (usually named Eve) tries to intercept the message, the bits will be disturbed and Alice and Bob will know the transmission has been compromised. If the key is not disturbed, it can be used to encode messages that are sent over an insecure channel.
“The security of Quantum Key Distribution systems is never absolute,” says Renner. He notes that the security of QKD systems depends on three assumptions: the initial secrecy of the password, the correctness and completeness of quantum theory, and the reliability of the devices in the quantum communication system.
Recent work by other research groups has illustrated how real-world devices that are not 100 percent reliable can leave weaknesses in quantum communication schemes that may be exploited by a clever hacker. For example, the photon detectors used in QKD should click with a certain probability whenever a photon is detected, but in practice the devices can be “blinded” by a strong light pulse and not click. “In fact, an adversary may use strong light pulses to ‘remotely control’ the detector,” says Renner.
Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making assumptions about the reliability of the devices. The quest has generated a lot of interest in a field called device-independent cryptography.
The Latest Bing News on:
- How financial institutions can chart a roadmap to post-quantum securityon March 21, 2023 at 12:19 pm
By Ben Packman, Senior Vice President of Strategy at post-quantum cryptography company, PQShield Quantum computing is expected to be revolutionary for financial institutions. During 2022, we saw a ...
- Tech warning: Albanese government must act on quantum threat: Cloudflare’s Matthew Princeon March 21, 2023 at 7:13 am
The Albanese government is being urged to consider the cyber security implications of quantum computing technologies, amid concerns that China’s rapid advancement in quantum technologies will allow ...
- What is the ‘steal now, crack later’ quantum computing threat?on March 21, 2023 at 3:24 am
The rise in quantum computing this decade is pushing cyber criminals into stealing encrypted business data with the hopes of cracking it in the future ...
- 2023-2028 Post-Quantum Cryptography Market Analysis: Understanding The Current State and Future Trendson March 21, 2023 at 3:14 am
Mar 21, 2023 (The Expresswire) -- "Final Report will add the analysis of the impact of COVID-19 on this industry." The Post-Quantum Cryptography Market ...
- Quantum Cryptography Market Analysis 2023-2028, Newly Upgraded Reporton March 20, 2023 at 9:51 pm
Global “Quantum Cryptography Market” Size 2023 Key players Profiled in the Report are [, ID Quantique , SeQureNet ...
- AI disentangles quantum patentson March 20, 2023 at 8:51 am
A new study in the International Journal of Intellectual Property Management demonstrates how so-called artificial intelligence (AI) techniques can be used instead of conventional text analysis to ...
- Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Defaulton March 16, 2023 at 12:13 pm
Today's CISOs and CIOs know they need to prepare today to migrate to post-quantum cryptography before this happens. Unfortunately, emerging vendors want to capitalize on this to charge unnecessarily ...
- Cloudflare, Inc.: Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Defaulton March 16, 2023 at 10:51 am
Already powering more than 99% of all websites that support NIST standard track post-quantum cryptography today, Cloudflare aims to help defend online users against threats of advanced computing Cloud ...
- Why We Must Prepare For The Quantum Threaton March 16, 2023 at 4:00 am
What should companies, leaders and governments do to try and weather the gathering storm of quantum decryption?
- GAO Offers Quantum Guidance to Federal Agencieson March 14, 2023 at 6:17 am
As the federal government continues its push for mass post-quantum cryptography transitions, the Government Accountability Office offered fact-based summary and guidance.
The Latest Google Headlines on:
[google_news title=”” keyword=”quantum cryptography” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
The Latest Bing News on:
- Anand Mahindra: ‘Unbreakable, united India’, man sings Kesariya in five languageson March 17, 2023 at 4:46 am
Anand Mahindra’s presence on Twitter can be seen through his creative, informative, and interactive content. Recently, he took to Twitter to share a video of a Punjabi man singing Brahmastra’s ...
- 'I've never felt pain like it, I thought he was unbreakable' - Orchard Park remembers Macauley Hatchon March 16, 2023 at 8:06 pm
I've never known pain like it, I thought he was unbreakable." After PCSO Dawn Brown gave her account of her final moments with Macauley, the film finished with a comment from Billie-Jo about the ...
- NordVPN Review 2023: Is it Still the Best VPN?on March 14, 2023 at 5:00 pm
This Panama-based VPN service utilizes NordLynx tunneling technology to ensure lightning-fast connections and complete anonymity with unbreakable encryption and a third-party audited no-logs policy.
- Vast Data focuses on metadata cataloging, encryption support and snapshotson March 14, 2023 at 7:47 am
Enterprise key management: Vast 4.6 adds support for Key Management Interoperability Protocol (KMIP) 1.2, which allows tenants to bring and manage their own encryption keys, rotate their keys and ...
- Black women firefighters in Aurora discuss unbreakable bondon March 13, 2023 at 4:31 am
It's a bond that has truly been tested by fire. "No words can describe the bond," Lt. Kathleen Hancock said. "I'm super thankful for them." Hancock, Danielle Allen and Brooke Simms are the only ...
- State AA boys: 'Unbreakable bond' defines Hellgate's first outright state title since 2013on March 11, 2023 at 5:21 pm
But we said our goal and we stuck with it.” "We have an unbreakable bond." Surrounded by family and friends, Headswift held the trophy as if he never wanted to let it go. “This feels amazin ...
- WhatsApp will risk being banned in the UK to save encryptionon March 10, 2023 at 1:02 am
The UK’s online safety bill in its current form will expand the government’s powers to demand the removal of end-to-end encryption, raising privacy concerns. Meta has said it will not comply ...
- WhatsApp Has Started a Fight With the UK About Encryptionon March 9, 2023 at 7:22 pm
The head of Meta’s WhatsApp messaging service has traveled to the UK to whip up a row with the government about end-to-end encryption. Speaking to journalists in London on Thursday, Will ...
- WhatsApp would not remove end-to-end encryption for UK law, says chiefon March 9, 2023 at 1:34 pm
“End-to-end” encryption is used in messaging services to prevent anyone but the recipients of a communication from being able to decrypt it. WhatsApp cannot read messages sent over its own ...
- WhatsApp may leave UK due to encryption battleon March 9, 2023 at 12:39 pm
If this occurs, Cathcart told The Guardian, WhatsApp would refuse to comply, because it would force them to stop end-to-end encryption. "Ninety-eight percent of our users are outside the UK ...
The Latest Google Headlines on:
[google_news title=”” keyword=”unbreakable encryption” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]