Quantum communication systems offer the promise of virtually unbreakable encryption.
Unlike classical encryption, which is used to send secure data over networks today and whose security depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data. This approach ensures that an eavesdropper with access only to the data could not decipher the key. However, researchers have recently demonstrated that even quantum encryption may be susceptible to hacking.
In a presentation next month at the Conference on Lasers and Electro-Optics (CLEO: 2013) in San Jose, Calif., Renato Renner of the Institute for Theoretical Physics in Zurich will discuss how he and his team of theoretical physicists are working on new ways to calculate the failure probability of certain quantum encryption schemes. The numbers would allow users to estimate how likely it would be that an adversary could read their secret messages—information that is critical for ensuring the overall security of quantum communications.
Quantum key distribution (QKD) is a kind of quantum encryption in which a secret password is shared between two distant parties (usually named Alice and Bob in thought experiments). The secret password, or key, is distributed as bits of quantum data, so that if an eavesdropper (usually named Eve) tries to intercept the message, the bits will be disturbed and Alice and Bob will know the transmission has been compromised. If the key is not disturbed, it can be used to encode messages that are sent over an insecure channel.
“The security of Quantum Key Distribution systems is never absolute,” says Renner. He notes that the security of QKD systems depends on three assumptions: the initial secrecy of the password, the correctness and completeness of quantum theory, and the reliability of the devices in the quantum communication system.
Recent work by other research groups has illustrated how real-world devices that are not 100 percent reliable can leave weaknesses in quantum communication schemes that may be exploited by a clever hacker. For example, the photon detectors used in QKD should click with a certain probability whenever a photon is detected, but in practice the devices can be “blinded” by a strong light pulse and not click. “In fact, an adversary may use strong light pulses to ‘remotely control’ the detector,” says Renner.
Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making assumptions about the reliability of the devices. The quest has generated a lot of interest in a field called device-independent cryptography.
The Latest Bing News on:
Quantum cryptography
- Experiments with quantum cause and effect reveal hidden nonclassicalityon May 26, 2022 at 9:00 am
Latest Explore all the latest news and information on Physics World; Research updates Keep track of the most exciting research breakthroughs and technology innov ...
- The Future is Hybrid: How hybrid can accelerate the early industrial application of quantum computing.on May 26, 2022 at 8:44 am
Markus Pflitsch and Karan Pinto from Terra Quantum write about how hybrid quantum computing to drive the industry toward scaling adoption ...
- NSF tags FAU researcher for post-quantum cryptography in NextG networkson May 26, 2022 at 6:44 am
FAU's Reza Azarderakhsh, Ph.D., was among 34 investigators nationwide selected by the NSF for RINGS, which is short for Resilient and Intelligent Next-Generation Systems. His project is the only one ...
- QuSecure Carves Out Space in Quantum Cryptography With Its Vision of a Post-RSA Worldon May 23, 2022 at 2:13 pm
NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like QuProtect.
- Waging War on Quantumon May 23, 2022 at 1:46 pm
Quantum computing will never work. Keeping enough qubits stable long enough to do any significant calculating or processing, is a mathematical ...
- Quantum Cryptography Market Growth, Industry Analysis, Share, Trend, Top Key Players and Forecast by 2028on May 23, 2022 at 6:23 am
Quantum Cryptography Market OverviewGlobal Quantum Cryptography Market to Reach US$291.9 Million by the Year 2028. Quantum cryptography harnesses the ...
- QuSecure Launches E2E Post-quantum Cybersecurity Solutionon May 22, 2022 at 6:08 pm
QuSecure launches industry's first end-to-end post-quantum cybersecurity solution to uniquely address current and future ...
- Quantum Cryptography Market In 2022 : Increasing Demand In Financial, Government, Military & Defense Driving the growth of Industryon May 20, 2022 at 5:00 pm
Quantum cryptography uses physics instead of mathematics to encode messages, which provides greater security. The worldwide market for Quantum Cryptography is expected to grow at a CAGR of roughly xx% ...
- QuSecure releases first end-to-end post-quantum solutionon May 19, 2022 at 12:00 pm
Quamtum computing provider QuSecure launches first end-to-end post quantum cryptograhy solution for enterprises.
- QuSecure launches end-to-end post-quantum cybersecurity solutionon May 19, 2022 at 5:00 am
QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.
The Latest Google Headlines on:
Quantum cryptography
The Latest Bing News on:
Unbreakable encryption
- Quantum Cryptography Market Growth, Industry Analysis, Share, Trend, Top Key Players and Forecast by 2028on May 23, 2022 at 6:23 am
Quantum Cryptography Market OverviewGlobal Quantum Cryptography Market to Reach US$291.9 Million by the Year 2028. Quantum cryptography harnesses the ...
- NSA involvement in encryption project raises suspicionson May 19, 2022 at 8:00 pm
The National Security Agency is assisting with an effort to define a new encryption standard that's unbreakable by the quantum computers of the future, and the agency has promised it won't build ...
- Apple and Google push Obama to prevent encryption backdoorson May 18, 2022 at 5:01 pm
Comey, who demanded access to user data after Google and Apple said they were going to create unbreakable encryption. He said, "there's no doubt that all of us should care passionately about ...
- Why Your Email Isn’t the Only Thing That Should Be Encryptedon May 13, 2022 at 5:56 am
However, when used correctly, email encryption is essentially unbreakable, offering the most secure way to share data currently available. For this reason, many companies are now looking toward ...
- Arqit Demonstrates Industrial IoT Securityon May 11, 2022 at 6:11 am
About Arqit Arqit supplies a unique quantum encryption platform-as-a-service ... Making IoT data unbreakable - using QuantumCloud for security and MQTT for the communications layer.
- Arqit Demonstrates Industrial IoT Securityon May 11, 2022 at 6:07 am
DCMS supported project enhances IoT security standardLONDON, May 11, 2022 (GLOBE NEWSWIRE) -- Arqit Quantum Inc. (“Arqit”), a leader in quantum encryption technology, and Blue Mesh Solutions Limited ( ...
- Global Quantum Cryptography Market to Reach US$291.9 Million by the Year 2026on May 11, 2022 at 4:43 am
Quantum cryptography harnesses the quantum-mechanical properties of light for creating a secure encryption and enabling ... with a virtually unbreakable mode of relaying information, as the ...
- Global Quantum Cryptography Market to Reach US$291.9 Million by the Year 2026on May 11, 2022 at 4:39 am
Quantum cryptography presents a more practical and cost-effective approach for securing communications, with a virtually unbreakable mode of relaying ... The proliferation of encryption-based ...
- Global Quantum Cryptography Market to Reach US$291.9 Million by the Year 2026on May 11, 2022 at 4:38 am
Quantum cryptography presents a more practical and cost-effective approach for securing communications, with a virtually unbreakable ... The proliferation of encryption-based applications in ...
- Scientific advance leads to a new tool in the fight against hackerson April 27, 2022 at 5:00 pm
Today, encryption is widely used to protect our ... Current methods are not unbreakable, and hackers can impersonate someone you trust even when they are far far away. However, quantum physics ...