Researchers at the University of York have shown that a new quantum-based procedure for distributing secure information along communication lines could be successful in preventing serious security breaches
Securing highly sensitive information, such as hospital records and bank details, is a major challenge faced by companies and organisation throughout the world.
Standard communication systems are vulnerable to hacks, where encrypted information can be intercepted and copied. It is currently possible for hackers to make a copy of transmitted information, but it would not be possible to read it without a method of breaking the encryption that protects it.
This means that information might be secure for a period of time, but there is no guarantee that it would be secure forever, as supercomputers in development could potentially decipher particular encryptions in the future.
Researchers at York investigated a prototype, based on the principles of quantum mechanics, that has the potential to side-step the vulnerabilities of current communications, but also allow information to be secure in the future.
Dr Cosmo Lupo, from the University of York’s Department of Computer Science, said: “Quantum mechanics has come a long way, but we are still faced with significant problems that have to be overcome with further experimentation.
“One such problem is that a hacker can attack the electronic devices used for information transmission by jamming the detectors that are used to collect and measure the photons that carries information.
“Such an attack is powerful because we assume that a given device works according to its technical specifications and will therefore perform its job. If a hacker is able to attack a detector and change the way it works, then the security is unavoidably compromised.”
“The principles of quantum mechanics, however, allows for communication security even without making assumptions on how the electronic devices will work. By removing these assumptions we pay the price of lowering the communication rate, but gain in improving the security standard.”
Instead of relying on possibly compromised electronic components at the point at which information needs to be detected and read, the researchers found that if the untrusted detectors existed at a separate point in the communications – somewhere between the sender and receiver – the communication was far more secure.
The detector would receive a combination of two signals, one from the sender and one from the receiver. The detector would only be able to read the result of this combined signal, but not its component parts.
Dr Lupo said: “In our work, not only have we provided a first rigorous mathematical proof that this ‘detector- independent’ design works, but we have also considered a scheme that is compatible with existing optical fibre communication networks.
“In principle our proposal can allow for the exchange of unbreakable codes across the internet without major changes in the actual infrastructure.
“We are still at prototype stage, but by finding ways to reduce the cost of these systems, we are that much closer to making quantum communications a reality.”
The Latest on: Communication security
via Google News
The Latest on: Communication security
- KDDI America Has Selected Infobip As Its Cloud Communications Platform for The Delivery of Advanced Business Messaging Serviceson June 25, 2020 at 8:24 am
KDDI America, a subsidiary of “KDDI Corporation”, a Fortune Global 500 company with three datacenters in the U.S., announced it has ...
- Near Field Communication Market By Offering, By Technology, By Region - Trends, Analysis, and Forecast Till 2025on June 25, 2020 at 5:53 am
In this report, the Near Field Communication (NFC) market was valued at USD 4.80 Billion in 2015, and is projected to ...
- China Reaches New Milestone in Space-Based Quantum Communicationson June 25, 2020 at 5:05 am
The nation’s Micius satellite successfully established an ultrasecure link between two ground stations separated by more than 1,000 kilometers ...
- Data security risks threaten approval of Chinese undersea cable planon June 25, 2020 at 4:08 am
The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.
- Could Donald Trump claim a national security threat to shut down the internet?on June 25, 2020 at 4:00 am
"An informed and aware public is the first defense against authoritarian abuse" says Tom Wheeler about the president's ability to censor the internet by declaring a national security threat.
- Zoom Video Names Jason Lee as Chief Information Security Officeron June 24, 2020 at 3:41 pm
Get Report shares firmed in a down market after the videoconferencing platform named Jason Lee to be its chief information security officer, effective June 29. He was most recently senior vice ...
- Zoom adds security chief to C-suiteon June 24, 2020 at 3:19 pm
(ZM +1.1%) - of late enduring criticism over its security approach - has named Jason Lee its new chief information security officer. The move is effective June 29. Zoom is c ...
- Q&A: Trust nothing and forget perimeters: It’s all about intrinsic securityon June 24, 2020 at 3:18 pm
A better approach is to design security from the inside — intrinsically, Husak added. Intrinsic security strategies do not automatically trust anything outside perimeters or even communication from ...
- Zoom taps former Salesforce executive as information security headon June 24, 2020 at 3:13 pm
Zoom Video Communications Inc on Wednesday named former Salesforce.com Inc security executive Jason Lee as its chief information security officer.
via Bing News