For the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a cinch.
But a team of cryptographers which includes QUT‘s Dr Douglas Stebila is already working at future-proofing the privacy of today’s Internet communications from tomorrow’s powerful computers.
Dr Stebila, along with researchers Joppe Bos from chip maker NXP Semiconductors and Craig Costello and Michael Naehrig from Microsoft Research, have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.
“Governments and the computing industry are working with scientists to try to build quantum computers. It’s a very significant scientific challenge, but quantum computers could be reality in a few decades,” Dr Stebila said.
“Quantum computers will be able to solve complex scientific problems, like simulating chemical reactions, much faster than today’s most powerful supercomputers, but they’ll also be able to break much of the public key cryptography that’s used to protect Internet, mobile telephone, and other electronic communication.”
“Though quantum computers don’t exist yet, they could be used to retroactively decrypt past transmissions,” Dr Stebila explained.
“That’s why it’s important that we start updating our communication infrastructure. We’ve tested some new techniques and found some very promising first steps towards future-proofing Internet encryption.”
Dr Stebila said that Internet communication was currently protected by encryption using the Transport Layer Security (TLS) standard, which ensures that web browsers can’t be tricked into sending data to the wrong web server, and that eavesdroppers can’t intercept passwords or other personal information.
“The TLS Internet encryption protocol uses a variety of mathematical techniques to protect information, some of which would need to be updated to be resistant to quantum computers.
“We’ve developed a new quantum-proof version of TLS that incorporates a mathematical technique called the ‘ring learning with errors problem’, a fairly recent technique that mathematicians think has the potential to resist quantum attacks.
“We’ve tested our new protocol to encrypt data moving between two PCs — the new techniques are a little slower than existing ones, but the confidentiality of the data is improved.
“The speed of the new protocol is now something we will work on, but this is a big step forward, demonstrating the practicality of these new techniques. We’re optimistic this will provide a framework for developing effective ways of future-proofing our data in the world of quantum computers.”
Read more: Securing data from tomorrow’s supercomputers
The Latest on: Securing data
via Google News
The Latest on: Securing data
- Stu Steiner: EWU is committed to securing the critical infrastructure of the state of Washington and U.S.on April 18, 2021 at 12:30 am
By Stu Steiner, Ph.D. EWU is committed to securing the critical infrastructure of the state of Washington and U.S. The 2020 SolarWinds cybersecurity breach potentially compromised millions of servers ...
- How identity management remains important for data securityon April 17, 2021 at 9:20 am
Control of personal digital identity is of increasing importance, given the number and nature of breaches recorded. A leading expert looks at the challenges racing consumers and business with ...
- Why Security Pros Can’t Ignore Big Data Monopolieson April 15, 2021 at 6:00 am
Big data monopolies create a number of security challenges. See how insight, regulations and privacy change at a massive scale.
- Data Center Security Market Analysis 2021, Outlook and Upcoming Business Opportunitieson April 14, 2021 at 2:50 am
Apr 14, 2021 (WiredRelease via Comtex) -- The impacts of the Covid-19 pandemic on the global Data Center Security Market are not equal- different regions and countries have been affected in different ...
- 5 Key Data Privacy and Security Risks That Arise When Organizations Record Job Interviews & Strategies for Mitigating Themon April 13, 2021 at 9:48 am
COVID-19 drove many formerly in-person interactions onto a variety of video conferencing platforms. But as millions of vaccinations are administered each day, and case numbers decline, it’ ...
- Turning Down the Noise: Adding Context to the SIEM With Modern Data Securityon April 13, 2021 at 9:00 am
Modern data security solutions help avoid cluttering an otherwise efficient SIEM. See why context matters and how you can sort alerts more efficiently.
- Clear & Present Danger: Data Hoarding Undermines Better Securityon April 13, 2021 at 6:42 am
Facebook and Google can identify patterns of attack within their own data, but smaller businesses rarely see enough traffic to successfully identify an attack or warn users.
- Why data security is even more crucial to your business in 2021on April 12, 2021 at 5:25 pm
In today's era of digital marketing and the Internet of Things (IoT), cybersecurity threats are always on the rise. Businesses are facing potential security risks such as data breaches, ransomware ...
- Security News This Week: Oh Look, LinkedIn Also Had 500M Users' Data Scrapedon April 12, 2021 at 1:06 pm
A week into the revelation that Facebook leaked the data of 500 million users—including phone numbers and other potentially sensitive info—and the company still hasn't given a full account of what ...
- Data security: A tripartite game Data security: A tripartite gameon April 12, 2021 at 4:02 am
What kind of data are social networking companies collecting? When signing up and using a social networking site, most users are more or less aware that the personal information they've typed in, such ...
via Bing News