
via LMU
Researchers at LMU and the University of Singapore have experimentally realized an expanded form of quantum cryptography for the first time.
- Its coding protocol is device-independent, making it even more secure than previous quantum cryptographic methods.
- The research lays the foundation for future quantum networks, in which absolutely secure communication is possible between far distant locations.
The Internet is teeming with highly sensitive information. Sophisticated encryption techniques generally ensure that such content cannot be intercepted and read. But in the future high-performance quantum computers could crack these keys in a matter of seconds.
Quantum key distribution (QKD) – as the jargon has it – is secure against attacks on the communication channel. This renders QKD immune against outside attacks from quantum computers, but not against attacks from or manipulations of the devices themselves. The devices could output a key which the manufacturer had previously saved and might conceivably have forwarded to a hacker. But device-independent QKD (abbreviated to DIQKD) is capable of testing the security of the devices. Theoretically known since the 1990s, this method has now been experimentally realized for the first time, by an international research group led by LMU physicist Harald Weinfurter and Charles Lim from the National University of Singapore (NUS).
In the present experiment, the physicists used two entangled rubidium atoms, situated in two laboratories located 400 meters from each other on the LMU campus, for the key distribution. The two locations are connected via a fiber optic cable 700 meters in length, which runs beneath Geschwister Scholl Square in front of the main building.
To exchange a key, the two parties measure the quantum states of their atoms. In each case, this is done randomly in two or four directions. If the directions correspond, the measurement results are identical on account of entanglement and can be used to generate a secret key. With the other measurement results, a so-called Bell inequality can be evaluated. John Bell originally developed these inequalities to test whether nature can be described with hidden variables. In DIQKD, the test is now being used “to ensure that there are no manipulations at the devices – that is to say, that hidden measurement results have not been saved in the devices beforehand,” explains Weinfurter.
The NUS protocol now uses two measurement settings. “This makes it much more difficult to intercept information. And so more noise can be tolerated and secret keys can be generated even when there is more noise,” says Charles Lim.
“With our method, we can securely generate secret keys even with uncharacterized and potentially untrustworthy devices,” explains Weinfurter. “Our work lays the foundation for future quantum networks, in which absolutely secure communication is possible between far distant locations,” says Charles Lim.
Original Article: Quantum cryptography: Hacking futile
More from: Ludwig Maximilian University of Munich | National University of Singapore
The Latest on: Quantum cryptography
- India's first quantum computing-based telecom network link now operational: Ashwini Vaishnawon March 27, 2023 at 12:22 pm
State-owned research organisation C-DoT has developed solutions for Quantum Key Distribution (QKD) or quantum cryptography and Post Quantum Cryptography (PQC) - a segment which deals in developing ...
- Ashwini Vaishnaw invites ethical hackers to break India’s first quantum communication networkon March 27, 2023 at 9:27 am
According to a presentation made by a senior DRDO official at the conclave, more than $30 billion has already been invested globally in the novel technology and that wars of the future will be fought ...
- Govt launches ‘quantum communication’ network with a dare: Rs 10L for ethical hackers who can break encryptionon March 27, 2023 at 8:18 am
Quantum communication refers to communication channels that take advantage of laws of quantum physics to protect data & in theory, is much more secure than traditional systems.
- Post-Quantum Cryptography Market 2023 Size and Forecast to 2030on March 26, 2023 at 6:37 pm
Pre and Post Covid Report Is Covered | Final Report Will Add the Analysis of the Impact of Russia-Ukraine War and ...
- Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Futureon March 22, 2023 at 2:36 am
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. The U.S. Na ...
- How financial institutions can chart a roadmap to post-quantum securityon March 21, 2023 at 12:19 pm
By Ben Packman, Senior Vice President of Strategy at post-quantum cryptography company, PQShield Quantum computing is expected to be revolutionary for financial institutions. During 2022, we saw a ...
- Post-Quantum Cryptography Market forecast to 2028on March 20, 2023 at 5:45 pm
Mar 21, 2023 (The Expresswire) -- Global “Post-Quantum Cryptography Market” Size 2023 Key players Profiled in the Report are [IBM Research,Infineon,evolutionQ,Microsoft Research,Thales/Gemalto ...
- Cloudflare offers free post-quantum cryptography protection to customerson March 17, 2023 at 11:52 am
Content delivery network provider Cloudflare Inc. today announced it will provide post-quantum cryptography for free by default to all customers to help secure their websites, application programming ...
- Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Defaulton March 16, 2023 at 12:13 pm
Today's CISOs and CIOs know they need to prepare today to migrate to post-quantum cryptography before this happens. Unfortunately, emerging vendors want to capitalize on this to charge unnecessarily ...
- Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Defaulton March 16, 2023 at 10:45 am
Already powering more than 99% of all websites that support NIST standard track post-quantum cryptography today, Cloudflare aims to help defend online users against threats of advanced computing ...
via Bing News
The Latest on: Quantum cryptography
[google_news title=”” keyword=”quantum cryptography” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
Add Comment