
Configuration of the security protocol: One device (center) produces the encryption key coded in the form of entangled pairs of light particles which are then transferred to the two communicating devices (Alice and Bob). Coding information in pairs of particles ensures security, as there is no third particle that can be intercepted by an “eavesdropper.” (Illustration: Department of Physics, University of Basel)
How can we protect communications against “eavesdropping” if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers at the University of Basel and ETH Zurich have succeeded in laying the theoretical groundwork for a communication protocol that guarantees one hundred percent privacy.
Hackers in possession of quantum computers represent a serious threat to today’s cryptosystems. Researchers are therefore working on new encryption methods based on the principles of quantum mechanics. However, current encryption protocols assume that the communicating devices are known, trustworthy entities. But what if this is not the case and the devices leave a back door open for eavesdropping attacks?
A team of physicists led by Professor Nicolas Sangouard of the University of Basel and Professor Renato Renner of ETH Zurich have developed the theoretical foundations for a communication protocol that offers ultimate privacy protection and can be implemented experimentally. This protocol guarantees security not only against hackers with quantum computers, but also in cases where the devices used for communication are “black boxes” whose trustworthiness is a completely unknown quality. They published their results in the journal Physical Review Letters and have applied for a patent.
Diluting information with noise
While there are already some theoretical proposals for communication protocols with black boxes, there was one obstacle to their experimental implementation: the devices used had to be highly efficient in detecting information about the crypto key. If too many of the information units (in the form of entangled pairs of light particles) remained undetected, it was impossible to know whether they had been intercepted by a third party.
The new protocol overcomes this hurdle with a trick – the researchers add artificial noise to the actual information about the crypto key. Even if many of the information units are undetected, an “eavesdropper” receives so little real information about the crypto key that the security of the protocol remains guaranteed. In this way, the researchers lowered the requirement on the detection efficiency of the devices.
“Since the first small-scale quantum computers are now available, we urgently need new solutions for protecting privacy,” says Professor Sangouard. “Our work represents a significant step toward the next milestone in secure communications.”
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Secure communications
- Secure Microcontrollers Market Outlook By 2031
Furthermore, the movement to "smarten" the energy grid will also escalate the demand for secure communications to prevent hackers or terrorists from wreaking havoc on the power grid. This report ...
- Redefining The Crypto Narrative To Secure Technology Innovation
Focusing solely on the potential misuse of emerging technology can lead to costly mistakes and hinder our ability to seize opportunities for advancement.
- Research Team Finds Secure Digital Communications
A team led by University of Oxford researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible ...
- Quantum Secure Communication Market Size, Revenue, and Forecast 2030
Market Updates(360marketupdates.com) published a new research report on Quantum Secure Communication Market 2023 ...
- Acadia Village Resort Licenses Zerify's Secure Video Conferencing Platform
Acadia Village is a Premier Timeshare Resort located in Downeast Maine, a short distance from Acadia National Park and Bar Harbor. Jim Killam, Acadia Village's resort director, says, “We use the ...
Go deeper with Google Headlines on:
Secure communications
[google_news title=”” keyword=”secure communications” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Quantum cryptography
- ICFO spin-out leads €7M quantum encryption consortium
Quantum tech at the Mobile World Congress LuxQuanta Technologies, a startup that was spun out of Barcelona’s Institute of Photonic Science (ICFO) less than two years ago, is heading up a new European ...
- DT, IBM, R&D group fuel Europe’s quantum computing sector
Europe is a hotbed of quantum computing action right nowDeutsche Telekom’s T-Systems to offer cloud access to IBM platform Euro consortium lands quantum ...
- Quantum Cryptography Solutions Market Share and Growth Developments 2023-2029
Mar 22, 2023 (The Expresswire) -- "Final Report will add the analysis of the impact of COVID-19 on this industry." Global “Quantum Cryptography ...
- Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. The U.S. Na ...
- How financial institutions can chart a roadmap to post-quantum security
By Ben Packman, Senior Vice President of Strategy at post-quantum cryptography company, PQShield Quantum computing is expected to be revolutionary for financial institutions. During 2022, we saw a ...
Go deeper with Google Headlines on:
Quantum cryptography
[google_news title=”” keyword=”quantum cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]