Configuration of the security protocol: One device (center) produces the encryption key coded in the form of entangled pairs of light particles which are then transferred to the two communicating devices (Alice and Bob). Coding information in pairs of particles ensures security, as there is no third particle that can be intercepted by an “eavesdropper.” (Illustration: Department of Physics, University of Basel)
How can we protect communications against “eavesdropping” if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers at the University of Basel and ETH Zurich have succeeded in laying the theoretical groundwork for a communication protocol that guarantees one hundred percent privacy.
Hackers in possession of quantum computers represent a serious threat to today’s cryptosystems. Researchers are therefore working on new encryption methods based on the principles of quantum mechanics. However, current encryption protocols assume that the communicating devices are known, trustworthy entities. But what if this is not the case and the devices leave a back door open for eavesdropping attacks?
A team of physicists led by Professor Nicolas Sangouard of the University of Basel and Professor Renato Renner of ETH Zurich have developed the theoretical foundations for a communication protocol that offers ultimate privacy protection and can be implemented experimentally. This protocol guarantees security not only against hackers with quantum computers, but also in cases where the devices used for communication are “black boxes” whose trustworthiness is a completely unknown quality. They published their results in the journal Physical Review Letters and have applied for a patent.
Diluting information with noise
While there are already some theoretical proposals for communication protocols with black boxes, there was one obstacle to their experimental implementation: the devices used had to be highly efficient in detecting information about the crypto key. If too many of the information units (in the form of entangled pairs of light particles) remained undetected, it was impossible to know whether they had been intercepted by a third party.
The new protocol overcomes this hurdle with a trick – the researchers add artificial noise to the actual information about the crypto key. Even if many of the information units are undetected, an “eavesdropper” receives so little real information about the crypto key that the security of the protocol remains guaranteed. In this way, the researchers lowered the requirement on the detection efficiency of the devices.
“Since the first small-scale quantum computers are now available, we urgently need new solutions for protecting privacy,” says Professor Sangouard. “Our work represents a significant step toward the next milestone in secure communications.”
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
- Commercial Bank launches Qatar’s ‘first of its kind’ digitally secure service ‘CBSafe ID’
Commercial Bank has launched its latest innovation, ‘CBSafe ID’, a first of its kind digitally secure service in Qatar.
- How To Better Secure Your Intelligent Machines
As the cyber arms race continues, attackers will at times innovate past the current technical capabilities or operational execution of the defenders.
- Las Vegas and AT&T streamline field communications for secure, efficient delivery and management of mobile solutions
AT&T reports that the City of Las Vegas has implemented its managed services for Unified Endpoint Management (UEM) to streamline its field communications. AT&T Cybersecurity Managed Services are ...
- Gov’t agencies establish new efforts to secure emergency communications network
As the 2021 hurricane season comes to an end, the Puerto Rico Innovation and Technology Services (PRITS) and the Public Safety Department met with representativ ...
- NECP Webinar: Stay Flexible and Adaptable by Planning for Communications Continuity
Speakers will discuss specific communications elements that should be considered and explain how existing capabilities should be updated.
Go deeper with Google Headlines on:
Go deeper with Bing News on:
- China's quantum leap plunges West into a race to protect its secrets
In December 2020, a group of Chinese researchers boasted of their own quantum moment. Scientists at the Hefei National Laboratory in eastern China were able to solve a physics problem known as boson ...
- ASD says quantum no immediate threat to encrypted government data
Australia’s cyber spy agency believes quantum computing poses no immediate threat to the cryptographic methods used to encrypt data across the federal government. But it is conscious that this will ...
- Setting the scene for a quantum marketplace: where quantum business is up to and how it might unfold
Taken from the December 2021 issue of Physics World where it first appeared under the headline "Setting the scene for a quantum marketplace". Members of the Institute of Physics can enjoy the full ...
- What you need to know before investing in quantum technology
Quantum science and technology is a hot ticket today, with governments, major tech companies and financiers around the world pouring money into research and development. As a result, the need to ...
- Quantum hackers can bring down Bitcoin: expert
NEW YORK – $3 trillion of cryptocurrency assets are, or soon will be, vulnerable to hacking by quantum computers, one of China's top cryptographe ...