Researchers at LMU and the University of Singapore have experimentally realized an expanded form of quantum cryptography for the first time.
- Its coding protocol is device-independent, making it even more secure than previous quantum cryptographic methods.
- The research lays the foundation for future quantum networks, in which absolutely secure communication is possible between far distant locations.
The Internet is teeming with highly sensitive information. Sophisticated encryption techniques generally ensure that such content cannot be intercepted and read. But in the future high-performance quantum computers could crack these keys in a matter of seconds.
Quantum key distribution (QKD) – as the jargon has it – is secure against attacks on the communication channel. This renders QKD immune against outside attacks from quantum computers, but not against attacks from or manipulations of the devices themselves. The devices could output a key which the manufacturer had previously saved and might conceivably have forwarded to a hacker. But device-independent QKD (abbreviated to DIQKD) is capable of testing the security of the devices. Theoretically known since the 1990s, this method has now been experimentally realized for the first time, by an international research group led by LMU physicist Harald Weinfurter and Charles Lim from the National University of Singapore (NUS).
In the present experiment, the physicists used two entangled rubidium atoms, situated in two laboratories located 400 meters from each other on the LMU campus, for the key distribution. The two locations are connected via a fiber optic cable 700 meters in length, which runs beneath Geschwister Scholl Square in front of the main building.
To exchange a key, the two parties measure the quantum states of their atoms. In each case, this is done randomly in two or four directions. If the directions correspond, the measurement results are identical on account of entanglement and can be used to generate a secret key. With the other measurement results, a so-called Bell inequality can be evaluated. John Bell originally developed these inequalities to test whether nature can be described with hidden variables. In DIQKD, the test is now being used “to ensure that there are no manipulations at the devices – that is to say, that hidden measurement results have not been saved in the devices beforehand,” explains Weinfurter.
The NUS protocol now uses two measurement settings. “This makes it much more difficult to intercept information. And so more noise can be tolerated and secret keys can be generated even when there is more noise,” says Charles Lim.
“With our method, we can securely generate secret keys even with uncharacterized and potentially untrustworthy devices,” explains Weinfurter. “Our work lays the foundation for future quantum networks, in which absolutely secure communication is possible between far distant locations,” says Charles Lim.
Original Article: Quantum cryptography: Hacking futile
The Latest on: Quantum cryptography
- Indian Army focusses on Quantum computing to improve communication, gain edge over rivalson August 5, 2022 at 9:23 am
To augment information secrecy the Indian Army is focussing on leveraging Quantum Computing and is actively collaborating with the Industries and academia who ...
- Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Toolson August 5, 2022 at 9:00 am
Concrete steps to address the threat quantum computing poses to current cryptographic standards have been taken by NIST, as it has selected four algorithms for future use.
- The time is now for quantum-safe securityon August 5, 2022 at 6:35 am
Agencies must understand what data is at risk and mitigate that risk with crypto-agile solutions as post quantum crypto standards are finalized.
- Post-quantum cryptography candidate cracked in hours using simple CPUon August 3, 2022 at 8:09 am
Researchers claim to have cracked SIKE using a single-core Xeon processor - a far cry from the exotic world of quantum computers ...
- MUCSE introduces first commercial post-quantum cryptography chip ready for the post-quantum eraon August 2, 2022 at 3:16 am
Wuxi,Jiangsu,China -- Beijing, July 11, 2022, MUCSE, a pioneer in security and integrated circuit, announced its latest secure chip -- PQC 1.0. The PQC 1.0 is believed to be the first commercial ...
- Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Lateron July 28, 2022 at 8:33 am
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers.
- ‘Quantum cryptography’ raises possibility of unbreakable codeson July 27, 2022 at 4:01 pm
Scientists have achieved a new form of quantum cryptography that harnesses the laws of physics to create unbreakable codes.The new system, described in the jour ...
- Quantum cryptography: Hacking is futileon July 27, 2022 at 1:00 pm
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...
- A key role for quantum entanglementon July 27, 2022 at 10:57 am
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...
- IBM bolsters quantum cryptography for z16 mainframeon July 27, 2022 at 8:03 am
IBM adds NIST’s new public-key encryption and digital signatures algorithms to defend against attacks by future quantum computers.
via Bing News
The Latest on: Quantum cryptography
via Google News