A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians at the University of Copenhagen have solved a mathematical riddle that allows for a person’s geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.
People have used codes and encryption to protect information from falling into the wrong hands for thousands of years. Today, encryption is widely used to protect our digital activity from hackers and cybercriminals who assume false identities and exploit the internet and our increasing number of digital devices to steal from us.
As such, there is an ever-growing need for new security measures to detect hackers posing as our banks or other trusted institutions. Within this realm, researchers from the University of Copenhagen’s Department of Mathematical Sciences have just made a giant leap.
“There is a constant battle in cryptography between those who want to protect information and those seeking to crack it. New security keys are being developed and later broken and so the cycle continues. Until, that is, a completely different type of key has been found”., says Professor Matthias Christandl.
For nearly twenty years, researchers around the world have been trying to solve the riddle of how to securely determine a person’s geographical location and use it as a secure ID. Until now, this had not been possible by way of normal methods like GPS tracking.
“Today, there are no traditional ways, whether by internet or radio signals for example, to determine where another person is situated geographically with one hundred percent accuracy. Current methods are not unbreakable, and hackers can impersonate someone you trust even when they are far far away. However, quantum physics opens up a few entirely different possibilities,” says Matthias Christandl.
Quantum physics makes hacking impossible
Using the laws of quantum physics, the researchers developed a new security protocol that uses a person’s geographical location to guarantee that they are communicating with the right person. Position-based quantum encryption, as it is called, can be used to ensure that a person is speaking with an actual bank representative when the bank calls and asks a customer to make changes to their account.
“Ask yourself, why do I trust an employee at the bank counter? Because they’re in a bank. Their location creates trust. This explains the principle behind pposition-based cryptography, where physical location is used to identify oneself,” explains postdoc Andreas Bluhm.
The researchers’ recipe for securing a person’s location combines the information in a single quantum bit – a qubit – followed by classical bits, consisting of the ones and zeroes that we are familiar with from ordinary computers.
Both types of bits are needed to send a message that is impossible for cybercriminals to read, hack or manipulate, and which can confirm whether a person is in your bank’s office or in some far-off country.
The quantum bit serves as a kind of lock on the message, due to the role of Heisenberg’s Uncertainty Principle in quantum physics, which causes quantum information to be disrupted and impossible to decode when trying to measure it. It is also due to what is known as the “no-cloning theorem“, which makes quantum information impossible to intercept and secretly copy. This will remain the case for quite some time.
“Until a full-fledged quantum computer is built and hackers gain access to one, our method is completely secure and impossible to hack,” says Andreas Bluhm.
Could soon be a reality
The researchers highlight the fact that the new method is particularly handy because only a single quantum bit is needed for position verification. So, unlike many other quantum technologies that require further development, this new discovery can be put to use today. Suitable quantum sources that can send a quantum bit of light already exist.
“The particular strength of our technique is that it is relatively straightforward to implement. We’re already able to send individual quantum bits, which is all this technique requires,” says Matthias Christandl.
The security ID needs to be developed commercially, by a company for example, before it can be widely adopted. However, its quantum foundation is in place.
The new research result is particularly useful in contexts where communications between two parties need to be extremely secure. This could be payments on the internet or transmission of sensitive personal data.
“Secure communication is a key element of our daily lives. Whenever we communicate with public authorities, our banks or any party that manages our personal data and information, we need to know that the people we’re dealing with are those who we expect them to be – and not criminals,” says Andreas Bluhm.
Original Article: Scientific advance leads to a new tool in the fight against hackers
More from: University of Copenhagen
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
- Forecast 2028 for the Quantum Cryptography Market in terms of size, returns, gross margin, and market share
The major players covered in the Quantum Cryptography market report are: Quantum Cryptography Marketsize, segment (mainly coveringMajorType (, Quantum key distribution, Quantum Coin Flipping, Position ...
- Aes-32 cryptographic accelerator IP Listing
This IP provides comprehensive RSA encryption / ... Rambus DPA & Fault Injection Resistant AES-AE Cryptographic Cores prevent against the leakage of secret cryptographic key material through attacks ...
- What’s happening with quantum-safe cryptography?
Our study shows great promise in expediting the application of current noisy quantum computers, and paves the way to factor large integers of realistic cryptographic significance.” They ...
- DoraHacks and Cryptosat Run the First Cryptographic Trusted-Setup for Zero-Knowledge in Space
So far, the cryptographic ceremonies such as the "Powers of Tau" required to bootstrap a proof-system had either trust issues, or required bringing large numbers of participants which resulted in ...
- A 30-Year-Old Cryptographic Challenge Is About To Be Solved
And they say their work paves the way for quantum computers to become capable of cracking codes of “cryptographic significance”, such as RSA-2048. The security of public key cryptosystems depends on ...
Go deeper with Google Headlines on:
[google_news title=”” keyword=”pposition-based cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
- Cybertrust Japan Integrates Quantum-Computing-Hardened Private Keys from Quantinuum into New IoT Authentication Platform
Japan's first commercial certificate authority incorporating Quantinuum's Quantum Origin solution to strengthen security protections for IoT devices against current and future threats CAMBRIDGE, ...
- Quantum Cryptography Market 2022 Economic Outlook, Market Structure Analysis and Forecast to 2028
Get a Sample Copy of the report @ The quantum cryptography market is at a nascent stage with massive potential to break through the cybersecurity industry. The quantum cryptography market players are ...
- Why enterprises trust hardware-based security over quantum computing
Quantum computing is being realized, but its limitations in cybersecurity are prompting organizations to adopt hardware-based security.
- Quantum Cryptography Market Future Business Trends and Growth 2023 to 2029 | ID Quantique, SeQureNet, Quintessence Labs, MagiQ Technologies
A latest extensive market study titled Quantum Cryptography Market enfolds a comprehensive analysis and assessment of the global market, allowing everyone to understand all-inclusive information ...
- Mobilen is the first privacy-focused wireless service provider that is both post-quantum and 5G
Telecom expert Christopher Stojcev, Founder and CEO of Mobilen, has designed the first 5G post-quantum network that is targeted for business and government use and can be set up within a matter of ...
Go deeper with Google Headlines on:
[google_news title=”” keyword=”quantum cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]