For the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a cinch.
But a team of cryptographers which includes QUT‘s Dr Douglas Stebila is already working at future-proofing the privacy of today’s Internet communications from tomorrow’s powerful computers.
Dr Stebila, along with researchers Joppe Bos from chip maker NXP Semiconductors and Craig Costello and Michael Naehrig from Microsoft Research, have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.
“Governments and the computing industry are working with scientists to try to build quantum computers. It’s a very significant scientific challenge, but quantum computers could be reality in a few decades,” Dr Stebila said.
“Quantum computers will be able to solve complex scientific problems, like simulating chemical reactions, much faster than today’s most powerful supercomputers, but they’ll also be able to break much of the public key cryptography that’s used to protect Internet, mobile telephone, and other electronic communication.”
“Though quantum computers don’t exist yet, they could be used to retroactively decrypt past transmissions,” Dr Stebila explained.
“That’s why it’s important that we start updating our communication infrastructure. We’ve tested some new techniques and found some very promising first steps towards future-proofing Internet encryption.”
Dr Stebila said that Internet communication was currently protected by encryption using the Transport Layer Security (TLS) standard, which ensures that web browsers can’t be tricked into sending data to the wrong web server, and that eavesdroppers can’t intercept passwords or other personal information.
“The TLS Internet encryption protocol uses a variety of mathematical techniques to protect information, some of which would need to be updated to be resistant to quantum computers.
“We’ve developed a new quantum-proof version of TLS that incorporates a mathematical technique called the ‘ring learning with errors problem’, a fairly recent technique that mathematicians think has the potential to resist quantum attacks.
“We’ve tested our new protocol to encrypt data moving between two PCs — the new techniques are a little slower than existing ones, but the confidentiality of the data is improved.
“The speed of the new protocol is now something we will work on, but this is a big step forward, demonstrating the practicality of these new techniques. We’re optimistic this will provide a framework for developing effective ways of future-proofing our data in the world of quantum computers.”
Read more: Securing data from tomorrow’s supercomputers
The Latest on: Securing data
via Google News
The Latest on: Securing data
- Data shows upswing in child exploitation caseson November 16, 2019 at 6:30 am
The numbers from Oct. 1, 2018, to this past Sept. 30 are higher overall than for the previous few years, according to the data, even as HSI's parent, the Department of Homeland Security, remains ...
- Notice of Data Security Incidenton November 15, 2019 at 4:02 pm
BIRMINGHAM, Ala., Nov. 15, 2019 /PRNewswire/ -- CAH Holdings Inc. (CAH) recently learned of a data security incident involving some employee email accounts that may have impacted a limited amount of ...
- Reflections on TikTok and Data Privacy as National Securityon November 15, 2019 at 1:02 pm
In this world, privacy concerns often bleed into national security concerns; issues of free speech, data privacy and cybersecurity are inextricably intertwined; and even the most technically ...
- Huge potential for biometric face verification to secure databases and data centers: Colocation Americaon November 15, 2019 at 11:41 am
The fraud and risk prevention power of biometric facial recognition has enormous potential to secure databases and data centers, according to a new blog post from Colocation America. The easy ...
- Survey: Data use, security among top audit risk areason November 15, 2019 at 9:19 am
A formal data governance framework should include how data is collected, used, and managed, including security controls, backup, retention, and data migration plans. Controls over retaining data ...
- Data Security Breaches: Statistics You Need To Knowon November 14, 2019 at 9:42 am
You’ve heard it before: the proof is in the numbers. In the case of data security breaches, this couldn’t be truer. Plenty of industry statistics highlight the prevalence of data breaches as well as ...
- Data Center Security Market: Growth, Share, Driver, Demand and Forecast To 2026on November 14, 2019 at 8:27 am
Nov 14, 2019 (Hitech News Daily via COMTEX) -- The pursuit of practices known to make data centers highly secure from attacks and threats is termed as data center security. Data center is considered ...
- Can Data Security And Employee Privacy Coexist In A BYOD Enterprise?on November 14, 2019 at 5:05 am
In a world where any device, app, network, cloud or even user can be compromised at any given time, business data and personal privacy are more vulnerable than ever. The enterprise security perimeter ...
- Gaping 'hole' in Qualcomm’s Secure World mobile vault leaked sensitive dataon November 14, 2019 at 3:03 am
According to cybersecurity researchers from Check Point, the Secure World safe compartment -- used to house sensitive data in our mobile devices -- could be exploited to leak financial information.
- Data Center Logical Security Market scope, Demands and Projected market Growth till 2022on November 14, 2019 at 2:48 am
Nov 14, 2019 (AmericaNewsHour) -- A logical security solutions or services safeguard customer sensitive data or application data from these malicious attacks. The increase in user traffic over the ...
via Bing News