Researchers are wielding the same strange properties that drive quantum computers to create hack-proof forms of data encryption
Recent advances in quantum computers may soon give hackers access to machines powerful enough to crack even the toughest of standard internet security codes. With these codes broken, all of our online data — from medical records to bank transactions — could be vulnerable to attack.
To fight back against the future threat, researchers are wielding the same strange properties that drive quantum computers to create theoretically hack-proof forms of quantum data encryption.
And now, these quantum encryption techniques may be one step closer to wide-scale use thanks to a new system developed by scientists at Duke University, The Ohio State University and Oak Ridge National Laboratory. Their system is capable of creating and distributing encryption codes at megabit-per-second rates, which is five to 10 times faster than existing methods and on par with current internet speeds when running several systems in parallel.
The researchers demonstrate that the technique is secure from common attacks, even in the face of equipment flaws that could open up leaks.
“We are now likely to have a functioning quantum computer that might be able to start breaking the existing cryptographic codes in the near future,” said Daniel Gauthier, a professor of physics at The Ohio State University. “We really need to be thinking hard now of different techniques that we could use for trying to secure the internet.”
The results appear online Nov. 24 in Science Advances.
To a hacker, our online purchases, bank transactions and medical records all look like gibberish due to ciphers called encryption keys. Personal information sent over the web is first scrambled using one of these keys, and then unscrambled by the receiver using the same key.
For this system to work, both parties must have access to the same key, and it must be kept secret. Quantum key distribution (QKD) takes advantage of one of the fundamental properties of quantum mechanics — measuring tiny bits of matter like electrons or photons automatically changes their properties — to exchange keys in a way that immediately alerts both parties to the existence of a security breach.
Though QKD was first theorized in 1984 and implemented shortly thereafter, the technologies to support its wide-scale use are only now coming online. Companies in Europe now sell laser-based systems for QKD, and in a highly-publicized event last summer, China used a satellite to send a quantum key to two land-based stations located 1200 km apart.
The problem with many of these systems, said Nurul Taimur Islam, a graduate student in physics at Duke, is that they can only transmit keys at relatively low rates — between tens to hundreds of kilobits per second — which are too slow for most practical uses on the internet.
“At these rates, quantum-secure encryption systems cannot support some basic daily tasks, such as hosting an encrypted telephone call or video streaming,” Islam said.
Like many QKD systems, Islam’s key transmitter uses a weakened laser to encode information on individual photons of light. But they found a way to pack more information onto each photon, making their technique faster.
By adjusting the time at which the photon is released, and a property of the photon called the phase, their system can encode two bits of information per photon instead of one. This trick, paired with high-speed detectors developed by Clinton Cahall, graduate student in electrical and computer engineering, and Jungsang Kim, professor of electrical and computer engineering at Duke, powers their system to transmit keys five to 10 times faster than other methods.
“It was changing these additional properties of the photon that allowed us to almost double the secure key rate that we were able to obtain if we hadn’t done that,” said Gauthier, who began the work as a professor of physics at Duke before moving to OSU.
In a perfect world, QKD would be perfectly secure. Any attempt to hack a key exchange would leave errors on the transmission that could be easily spotted by the receiver. But real-world implementations of QKD require imperfect equipment, and these imperfections open up leaks that hackers can exploit.
The researchers carefully characterized the limitations of each piece of equipment they used. They then worked with Charles Lim, currently a professor of electrical and computer engineering at the National University of Singapore, to incorporate these experimental flaws into the theory.
“We wanted to identify every experimental flaw in the system, and include these flaws in the theory so that we could ensure our system is secure and there is no potential side-channel attack,” Islam said.
Though their transmitter requires some specialty parts, all of the components are currently available commercially. Encryption keys encoded in photons of light can be sent over existing optical fiber lines that burrow under cities, making it relatively straightforward to integrate their transmitter and receiver into the current internet infrastructure.
“All of this equipment, apart from the single-photon detectors, exist in the telecommunications industry, and with some engineering we could probably fit the entire transmitter and receiver in a box as big as a computer CPU,” Islam said.
The Latest on: Quantum encryption
- Global Post-Quantum Cryptography Market and Technology Forecast Report 2019-2029on November 15, 2019 at 2:53 am
DUBLIN, Nov. 15, 2019 /PRNewswire/ -- The "Post-Quantum Cryptography: A Ten-Year Market and Technology Forecast" report has been added to ResearchAndMarkets.com's offering. The market for post-quantum ...
- How Serious Is the Threat of Quantum Computing to Crypto?on November 14, 2019 at 10:24 pm
Ed is also the former White House Deputy United States Chief Technology Officer. “Over time, cryptocurrencies will need to evolve to use different encryption and hashing methods that are ...
- What Is Homomorphic Encryption? And Why Is It So Transformative?on November 14, 2019 at 10:01 pm
Another bonus of homomorphic encryption is that unlike other encryption models in use today, it is safe from getting broken by quantum computers. Just like other forms of encryption, homomorphic ...
- Here’s How Quantum Supremacy Will Impact Self-Driving Carson November 14, 2019 at 5:51 am
Well, in theory, a quantum computer can be vastly faster at computational efforts than can a classical computer. We’re talking extraordinarily super-duper faster. One area that this faster speed is ...
- Information overload: The promise and risk of quantum computingon November 14, 2019 at 3:22 am
Due to the high processing power of quantum computers, modern encryption methods that would take classic computers a long time to break would be rendered useless. The unique physical properties of ...
- Enterprise Quantum Computing Market reach 2-3 billion by 2023|Revenue, Excessive Growth, and Region-Forecastson November 13, 2019 at 5:02 am
Presently, cryptography is based on public key algorithms such as AES-256, RSA, and ECDSA. These algorithms are secure as per the existing computing needs but are expected to be rendered useless as ...
- South America Quantum Cryptography Market - Competition Forecast & Opportunities, 2013-2023on November 12, 2019 at 4:07 pm
South America Quantum Cryptography Market By Component (Hardware & Service), By Application (Data Base Encryption, Network Layer Encryption & Others), By End-User, By Country, Competition Forecast & ...
- Komodo to lead blockchain revolution with quantum-safe cryptographyon November 12, 2019 at 4:19 am
The emergence of quantum computing is posing a serious threat to cybersecurity as it can crack the most sophisticated encryption algorithms on the horizon. So, sooner or later, quantum computers, ...
- Don’t Rush Quantum-Proof Encryption, Warns NSA Research Directoron November 11, 2019 at 11:04 am
His technique, dubbed Shor’s algorithm, drastically shortened the time it took to find the prime numbers that underlie public-key cryptography, making codes that typically take thousands of years to ...
- Blockchain Must Solve These 3 Issues to Avoid Quantum Threat: Experton November 7, 2019 at 4:47 am
Head of cryptography at IoTeX says the blockchain community should address three issues to prevent being overtaken by quantum computers. Blockchain should immediately address 3 issues to not be ...
via Google News and Bing News