via Pinterest
A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians at the University of Copenhagen have solved a mathematical riddle that allows for a person’s geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.
People have used codes and encryption to protect information from falling into the wrong hands for thousands of years. Today, encryption is widely used to protect our digital activity from hackers and cybercriminals who assume false identities and exploit the internet and our increasing number of digital devices to steal from us.
As such, there is an ever-growing need for new security measures to detect hackers posing as our banks or other trusted institutions. Within this realm, researchers from the University of Copenhagen’s Department of Mathematical Sciences have just made a giant leap.
“There is a constant battle in cryptography between those who want to protect information and those seeking to crack it. New security keys are being developed and later broken and so the cycle continues. Until, that is, a completely different type of key has been found”., says Professor Matthias Christandl.
For nearly twenty years, researchers around the world have been trying to solve the riddle of how to securely determine a person’s geographical location and use it as a secure ID. Until now, this had not been possible by way of normal methods like GPS tracking.
“Today, there are no traditional ways, whether by internet or radio signals for example, to determine where another person is situated geographically with one hundred percent accuracy. Current methods are not unbreakable, and hackers can impersonate someone you trust even when they are far far away. However, quantum physics opens up a few entirely different possibilities,” says Matthias Christandl.
Quantum physics makes hacking impossible
Using the laws of quantum physics, the researchers developed a new security protocol that uses a person’s geographical location to guarantee that they are communicating with the right person. Position-based quantum encryption, as it is called, can be used to ensure that a person is speaking with an actual bank representative when the bank calls and asks a customer to make changes to their account.
“Ask yourself, why do I trust an employee at the bank counter? Because they’re in a bank. Their location creates trust. This explains the principle behind pposition-based cryptography, where physical location is used to identify oneself,” explains postdoc Andreas Bluhm.
The researchers’ recipe for securing a person’s location combines the information in a single quantum bit – a qubit – followed by classical bits, consisting of the ones and zeroes that we are familiar with from ordinary computers.
Both types of bits are needed to send a message that is impossible for cybercriminals to read, hack or manipulate, and which can confirm whether a person is in your bank’s office or in some far-off country.
The quantum bit serves as a kind of lock on the message, due to the role of Heisenberg’s Uncertainty Principle in quantum physics, which causes quantum information to be disrupted and impossible to decode when trying to measure it. It is also due to what is known as the “no-cloning theorem“, which makes quantum information impossible to intercept and secretly copy. This will remain the case for quite some time.
“Until a full-fledged quantum computer is built and hackers gain access to one, our method is completely secure and impossible to hack,” says Andreas Bluhm.
Could soon be a reality
The researchers highlight the fact that the new method is particularly handy because only a single quantum bit is needed for position verification. So, unlike many other quantum technologies that require further development, this new discovery can be put to use today. Suitable quantum sources that can send a quantum bit of light already exist.
“The particular strength of our technique is that it is relatively straightforward to implement. We’re already able to send individual quantum bits, which is all this technique requires,” says Matthias Christandl.
The security ID needs to be developed commercially, by a company for example, before it can be widely adopted. However, its quantum foundation is in place.
The new research result is particularly useful in contexts where communications between two parties need to be extremely secure. This could be payments on the internet or transmission of sensitive personal data.
“Secure communication is a key element of our daily lives. Whenever we communicate with public authorities, our banks or any party that manages our personal data and information, we need to know that the people we’re dealing with are those who we expect them to be – and not criminals,” says Andreas Bluhm.
Original Article: Scientific advance leads to a new tool in the fight against hackers
More from: University of Copenhagen
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Pposition-based cryptography
- Quantum Cryptography Market Innovative Strategies for Harnessing Future Market Size Growth
The “Global Quantum Cryptography Market 2024“ research describes the competitive market environment based on production volume, profits, and sales. The report covers even the supply chain analysis of ...
- PuTTY SSH client flaw allows recovery of cryptographic private keys
A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.
- The Bitcoin's cryptographic labyrinth – explored
The Strengths and Vulnerabilities of Bitcoin’s Cryptography Bitcoin’s cryptography underpins the remarkable strengths that have propelled it to the forefront of the cryptocurrency landscape ...
- What Are Crypto Tokens, and How Do They Work?
Here are some factors to look for when you're looking at a crypto token: Crypto or cryptography refers to the various encryption algorithms and cryptographic techniques that safeguard crypto ...
- What Is Cryptography?
Cryptography puts the “crypto” in cryptocurrency. It has existed much longer than our digital age and has evolved like languages over the centuries. One of the most famous uses was developed ...
Go deeper with Google Headlines on:
Pposition-based cryptography
[google_news title=”” keyword=”pposition-based cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Quantum cryptography
- Swiss startup unveils post-quantum cryptography library for devs
Swiss startup Terra Quantum has released an open-source repository for quantum-resistant encryption algorithms.
- DigiCert addresses quantum threats and AI challenges in digital security
DigiCert, a digital certificate provider, aims to secure the digital landscape. Explore its solutions for identity, access and quantum readiness.
- nodeQ Launches PQtunnelTM: The Leading-Edge Cybersecurity Solution for Quantum-Safe Communication
The advent of Quantum Computing poses a significant threat to existing public-key cryptosystems. A large quantum computer can break algorithms like RSA or ECDH, which form the backbone of current ...
- Future Proof Encryption: Embracing Post-Quantum Cryptography For Quantum-Resilient Solutions
Let's look at how computing technology could challenge today's encryption protocols and the potential ways to secure ourselves.
- Keysight introduces new testing capabilities to strengthen post-quantum cryptography
Keysight Technologies, Inc. has announced industry-first testing capabilities designed to test the robustness of post-quantum cryptography (PQC). This latest addition to Keysight Inspector is a ...
Go deeper with Google Headlines on:
Quantum cryptography
[google_news title=”” keyword=”quantum cryptography” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]