Quantum communication systems offer the promise of virtually unbreakable encryption.
Unlike classical encryption, which is used to send secure data over networks today and whose security depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data. This approach ensures that an eavesdropper with access only to the data could not decipher the key. However, researchers have recently demonstrated that even quantum encryption may be susceptible to hacking.
In a presentation next month at the Conference on Lasers and Electro-Optics (CLEO: 2013) in San Jose, Calif., Renato Renner of the Institute for Theoretical Physics in Zurich will discuss how he and his team of theoretical physicists are working on new ways to calculate the failure probability of certain quantum encryption schemes. The numbers would allow users to estimate how likely it would be that an adversary could read their secret messages—information that is critical for ensuring the overall security of quantum communications.
Quantum key distribution (QKD) is a kind of quantum encryption in which a secret password is shared between two distant parties (usually named Alice and Bob in thought experiments). The secret password, or key, is distributed as bits of quantum data, so that if an eavesdropper (usually named Eve) tries to intercept the message, the bits will be disturbed and Alice and Bob will know the transmission has been compromised. If the key is not disturbed, it can be used to encode messages that are sent over an insecure channel.
“The security of Quantum Key Distribution systems is never absolute,” says Renner. He notes that the security of QKD systems depends on three assumptions: the initial secrecy of the password, the correctness and completeness of quantum theory, and the reliability of the devices in the quantum communication system.
Recent work by other research groups has illustrated how real-world devices that are not 100 percent reliable can leave weaknesses in quantum communication schemes that may be exploited by a clever hacker. For example, the photon detectors used in QKD should click with a certain probability whenever a photon is detected, but in practice the devices can be “blinded” by a strong light pulse and not click. “In fact, an adversary may use strong light pulses to ‘remotely control’ the detector,” says Renner.
Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making assumptions about the reliability of the devices. The quest has generated a lot of interest in a field called device-independent cryptography.
The Latest Bing News on:
- Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Toolson August 5, 2022 at 9:00 am
Concrete steps to address the threat quantum computing poses to current cryptographic standards have been taken by NIST, as it has selected four algorithms for future use.
- The time is now for quantum-safe securityon August 5, 2022 at 6:35 am
Agencies must understand what data is at risk and mitigate that risk with crypto-agile solutions as post quantum crypto standards are finalized.
- Amazon, IBM Move Swiftly on Post-Quantum Cryptographic Algorithms Selected by NISTon August 4, 2022 at 2:03 pm
A month after the algorithms were revealed, some companies have already begun incorporating the future standards into their products and services.
- Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Houron August 4, 2022 at 2:59 am
It took researchers about 62 minutes to crack a late-stage Post-Quantum Encryption candidate algorithm using a single-core CPU.
- Post-quantum cryptography candidate cracked in hours using simple CPUon August 3, 2022 at 8:09 am
Researchers claim to have cracked SIKE using a single-core Xeon processor - a far cry from the exotic world of quantum computers ...
- MUCSE introduces first commercial post-quantum cryptography chip ready for the post-quantum eraon August 2, 2022 at 3:16 am
Wuxi,Jiangsu,China -- Beijing, July 11, 2022, MUCSE, a pioneer in security and integrated circuit, announced its latest secure chip -- PQC 1.0. The PQC 1.0 is believed to be the first commercial ...
- Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Lateron July 28, 2022 at 8:33 am
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers.
- Quantum cryptography: Hacking is futileon July 27, 2022 at 1:00 pm
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...
- A key role for quantum entanglementon July 27, 2022 at 10:57 am
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...
- IBM bolsters quantum cryptography for z16 mainframeon July 27, 2022 at 8:03 am
IBM adds NIST’s new public-key encryption and digital signatures algorithms to defend against attacks by future quantum computers.
The Latest Google Headlines on:
The Latest Bing News on:
- University of California, Los Angeles: UCLA-led team develops new approach for building quantum computerson August 3, 2022 at 6:32 am
Quantum computing, though still in its early days, has the potential to dramatically increase processing power by harnessing the strange behavior of particles at the smallest scales. Some research ...
- Developing a new approach for building quantum computerson August 2, 2022 at 10:00 am
In the long term, quantum computers could provide unbreakable encryption and simulations of nature beyond today's capabilities. A UCLA-led interdisciplinary research team including collaborators ...
- ‘Quantum cryptography’ raises possibility of unbreakable codeson July 27, 2022 at 4:01 pm
Scientists have achieved a new form of quantum cryptography that harnesses the laws of physics to create unbreakable codes ... on the internet uses a form of encryption based on the mathematics ...
- Why Public-Private Partnership Can Spur QKD Adoption In The U.S.on July 27, 2022 at 6:15 am
Using QKD, two parties can create a shared random “key” to encrypt and decrypt messages, i.e., data communication sent through a designed fiberoptic cable.
- The Best VPN Apps: Top 10 for 2022on July 15, 2022 at 2:28 pm
This VPN service boasts lightning-fast bandwidth, unbreakable encryption, and an independently certified no-logs policy. Because of its user-friendly interfaces and superior functionality ...
- Mega's unbreakable encryption proves to be anything buton June 22, 2022 at 2:01 pm
Mega, the New Zealand-based file-sharing biz co-founded a decade ago by Kim Dotcom, promotes its "privacy by design" and user-controlled encryption keys to claim that data stored on Mega's servers ...
- Message Encryption on Androidon February 1, 2022 at 4:04 am
Install Unbreakable SMS from the Android Market. Open Unbreakable SMS and set an encryption password, known as a cipher key in the app. Type a message into the Type Your Plain Text Message box ...
- What is encryption?on October 1, 2021 at 8:12 am
If you've read anything about technology in the last few years, you may have seen the term encryption floating around. It's a simple concept, but the realities of its use are enormously complicated.
- Unbreakable Encryption: Work Has Begun on the World's First Quantum Enigma Machineon September 15, 2016 at 7:04 am
Several recent studies in cryptography and encryption have led scientists to theorize that we could send an unbreakable encrypted message with a key that is much shorter than the message itself.