Configuration of the security protocol: One device (center) produces the encryption key coded in the form of entangled pairs of light particles which are then transferred to the two communicating devices (Alice and Bob). Coding information in pairs of particles ensures security, as there is no third particle that can be intercepted by an “eavesdropper.” (Illustration: Department of Physics, University of Basel)
How can we protect communications against “eavesdropping” if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers at the University of Basel and ETH Zurich have succeeded in laying the theoretical groundwork for a communication protocol that guarantees one hundred percent privacy.
Hackers in possession of quantum computers represent a serious threat to today’s cryptosystems. Researchers are therefore working on new encryption methods based on the principles of quantum mechanics. However, current encryption protocols assume that the communicating devices are known, trustworthy entities. But what if this is not the case and the devices leave a back door open for eavesdropping attacks?
A team of physicists led by Professor Nicolas Sangouard of the University of Basel and Professor Renato Renner of ETH Zurich have developed the theoretical foundations for a communication protocol that offers ultimate privacy protection and can be implemented experimentally. This protocol guarantees security not only against hackers with quantum computers, but also in cases where the devices used for communication are “black boxes” whose trustworthiness is a completely unknown quality. They published their results in the journal Physical Review Letters and have applied for a patent.
Diluting information with noise
While there are already some theoretical proposals for communication protocols with black boxes, there was one obstacle to their experimental implementation: the devices used had to be highly efficient in detecting information about the crypto key. If too many of the information units (in the form of entangled pairs of light particles) remained undetected, it was impossible to know whether they had been intercepted by a third party.
The new protocol overcomes this hurdle with a trick – the researchers add artificial noise to the actual information about the crypto key. Even if many of the information units are undetected, an “eavesdropper” receives so little real information about the crypto key that the security of the protocol remains guaranteed. In this way, the researchers lowered the requirement on the detection efficiency of the devices.
“Since the first small-scale quantum computers are now available, we urgently need new solutions for protecting privacy,” says Professor Sangouard. “Our work represents a significant step toward the next milestone in secure communications.”
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Secure communications
- Spirent Communications announces acquisition of octoScope to establish it as 'market leader' in the wi-fi spaceon March 4, 2021 at 11:40 pm
StockMarketWire.com - Technology company Spirent Communications has acquired US-based technology company octoScope in a deal that will establish it as the 'wi-fi test leader'. The company has bought ...
- Synzi Obtains Advanced Healthcare Security Measures for Patient Communications through Covax Dataon March 4, 2021 at 10:12 pm
Covax Data, Inc., a visionary cybersecurity SaaS provider, today announced a data security services relationship with Synzi, LLC.
- IRS Tax-Exempt Arm To Launch Secure Messaging In Summeron March 4, 2021 at 6:10 pm
The Internal Revenue Service's Tax Exempt and Government Entities Division plans to roll out a secure messaging program for electronic communication with taxpayers in the summer, an acting director in ...
- Cutting off stealthy interlopers: a framework for secure cyber-physical systemson March 4, 2021 at 7:26 am
Cyber-physical systems (CPS), which combine modern networking with physical actuators, can be vulnerable against hackers. Recently, researchers at DGIST developed a new framework for CPSs that is ...
- Globex Data CEO Interviewed on Proactive to Announce Its Multi-Currency Platform for Its Global Launch of Sekur.Com Communication Platformon March 3, 2021 at 10:00 pm
Ghiai joined Steve Darling from Proactive to share news the company is launching a multi-currency platform for its secure communications solution platform Sekur in anticipation of a global mass-market ...
Go deeper with Google Headlines on:
Secure communications
Go deeper with Bing News on:
Quantum cryptography
- Global Quantum Computing Market (2021 to 2025) - Featuring Atos, Alphabet and Honeywell International Among Others - ResearchAndMarkets.comon March 4, 2021 at 7:58 am
The "Global Quantum Computing Market 2021-2025" report has been added to ResearchAndMarkets.com's offering. The publisher has been monitoring the quantum computing market and it is poised to grow by ...
- New Optical Antennas Could Overcome Data Limitson March 3, 2021 at 11:54 pm
Researchers at Berkeley Lab and UC Berkeley have harnessed the properties of lightwaves that radically increase the amount of data they carry.
- Quantum Cryptography Market Size to Record 38.2% CAGR During 2020-2027on March 3, 2021 at 3:46 am
Selbyville, Delaware, Market Study Report LLC recently added a new title on 2020-2027 Global Quantum Cryptography Market Report from its database. The report provides study with in-depth overview, ...
- Quantum Cryptography Market to Witness Massive Growth by 2025 | IBM, ID Quantique, QuintessenceLabson March 3, 2021 at 1:34 am
A new business intelligence report released by Advance Market Analytics with title Global Quantum Cryptography Market Insights Forecast to 2025 This report provides a detailed overview of key factors ...
- An approach for security evaluation and certification of a complete quantum communication systemon March 2, 2021 at 4:00 pm
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol ...