Configuration of the security protocol: One device (center) produces the encryption key coded in the form of entangled pairs of light particles which are then transferred to the two communicating devices (Alice and Bob). Coding information in pairs of particles ensures security, as there is no third particle that can be intercepted by an “eavesdropper.” (Illustration: Department of Physics, University of Basel)
How can we protect communications against “eavesdropping” if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers at the University of Basel and ETH Zurich have succeeded in laying the theoretical groundwork for a communication protocol that guarantees one hundred percent privacy.
Hackers in possession of quantum computers represent a serious threat to today’s cryptosystems. Researchers are therefore working on new encryption methods based on the principles of quantum mechanics. However, current encryption protocols assume that the communicating devices are known, trustworthy entities. But what if this is not the case and the devices leave a back door open for eavesdropping attacks?
A team of physicists led by Professor Nicolas Sangouard of the University of Basel and Professor Renato Renner of ETH Zurich have developed the theoretical foundations for a communication protocol that offers ultimate privacy protection and can be implemented experimentally. This protocol guarantees security not only against hackers with quantum computers, but also in cases where the devices used for communication are “black boxes” whose trustworthiness is a completely unknown quality. They published their results in the journal Physical Review Letters and have applied for a patent.
Diluting information with noise
While there are already some theoretical proposals for communication protocols with black boxes, there was one obstacle to their experimental implementation: the devices used had to be highly efficient in detecting information about the crypto key. If too many of the information units (in the form of entangled pairs of light particles) remained undetected, it was impossible to know whether they had been intercepted by a third party.
The new protocol overcomes this hurdle with a trick – the researchers add artificial noise to the actual information about the crypto key. Even if many of the information units are undetected, an “eavesdropper” receives so little real information about the crypto key that the security of the protocol remains guaranteed. In this way, the researchers lowered the requirement on the detection efficiency of the devices.
“Since the first small-scale quantum computers are now available, we urgently need new solutions for protecting privacy,” says Professor Sangouard. “Our work represents a significant step toward the next milestone in secure communications.”
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Secure communications
- TMC names PanTerra Networks a 2022 Communications Solutions Products of the Year Award Winner
Streams Connect Recognized for Exceptional InnovationSAN JOSE, Calif., Aug. 01, 2022 (GLOBE NEWSWIRE) -- PanTerra Networks announced today that TMC, a global, integrated media company, has awarded ...
- InventHelp Inventor Develops a Communication Device to Assist Patients and Medical Professionals (PLB-169)
"I have witnessed the lack of communication between patients and medical professionals and a lack of privacy for those who are hard of hearing and deaf," said an inventor ...
- AG Kaul, Secretary Romanski Secure $15 Million Agreement with Frontier Communications
This agreement will lead to better service for Frontier customers in Wisconsin,” said AG Kaul. “This case is another example of how DOJ and DATCP work together to protect consumers.” “Wisconsin ...
- It really does take a village to keep you secure in the cloud
Everyone has to communicate when problems pop up, share the best practices and pull together as a community to prevent or mitigate security events.
- How Johnson & Johnson’s Secure Data Pipeline Helped Speed the COVID-19 Vaccine Production
Inductive Automation’s Ignition platform and Cirrus Link’s MQTT modules are the heart of the secure data pipeline built for Johnson & Johnson by system integrator Automated Control Concepts.
Go deeper with Google Headlines on:
Secure communications
Go deeper with Bing News on:
Quantum cryptography
- MUCSE introduces first commercial post-quantum cryptography chip ready for the post-quantum era
MUCSE, a pioneer in security and integrated circuit, announced its latest secure chip -- PQC 1.0. The PQC 1.0 is believed to be the first commercial post-quantum security chip supporting the recent ...
- JPMorgan hires scientist Charles Lim to help protect financial system from quantum-supremacy threat
Tech giants including Alphabet and IBM are racing toward building a quantum computer, and financial firms including JPMorgan are exploring possible uses.
- Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Later
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers.
- ‘Quantum cryptography’ raises possibility of unbreakable codes
Scientists have achieved a new form of quantum cryptography that harnesses the laws of physics to create unbreakable codes.The new system, described in the jour ...
- Quantum cryptography: Hacking is futile
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...