. Energy News .




TECH SPACE
Just how secure is quantum cryptography
by Staff Writers
San Jose CA (SPX) May 29, 2013


This image illustrates the standard assumption made in quantum cryptography, namely that the devices, such as photon sources and detectors, used by the honest parties, "Alice" and "Bob," are completely trusted (yellow boxes indicate the trusted region), whereas the channel connecting Alice and Bob may be controlled by an adversary. Credit: Credit: Renato Renner.

Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and whose security depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data.

This approach ensures that an eavesdropper with access only to the data could not decipher the key. However, researchers have recently demonstrated that even quantum encryption may be susceptible to hacking.

In a presentation next month at the Conference on Lasers and Electro-Optics (CLEO: 2013) in San Jose, Calif., Renato Renner of the Institute for Theoretical Physics in Zurich will discuss how he and his team of theoretical physicists are working on new ways to calculate the failure probability of certain quantum encryption schemes.

The numbers would allow users to estimate how likely it would be that an adversary could read their secret messages-information that is critical for ensuring the overall security of quantum communications.

Quantum key distribution (QKD) is a kind of quantum encryption in which a secret password is shared between two distant parties (usually named Alice and Bob in thought experiments). The secret password, or key, is distributed as bits of quantum data, so that if an eavesdropper (usually named Eve) tries to intercept the message, the bits will be disturbed and Alice and Bob will know the transmission has been compromised. If the key is not disturbed, it can be used to encode messages that are sent over an insecure channel.

"The security of Quantum Key Distribution systems is never absolute," says Renner. He notes that the security of QKD systems depends on three assumptions: the initial secrecy of the password, the correctness and completeness of quantum theory, and the reliability of the devices in the quantum communication system.

Recent work by other research groups has illustrated how real-world devices that are not 100 percent reliable can leave weaknesses in quantum communication schemes that may be exploited by a clever hacker. For example, the photon detectors used in QKD should click with a certain probability whenever a photon is detected, but in practice the devices can be "blinded" by a strong light pulse and not click. "In fact, an adversary may use strong light pulses to 'remotely control' the detector," says Renner.

Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making assumptions about the reliability of the devices. The quest has generated a lot of interest in a field called device-independent cryptography.

"In device-independent cryptography, the proof of security is based solely on directly observable correlations between sender and receiver, and it does not matter how these correlations have been established," says Renner. "Even if the detectors were blinded, for instance, as long as they produce the right correlations, a secret key can be extracted from them."

This differs from the traditional approach to calculating quantum encryption security, which is only valid in the nearly impossible case of the devices working exactly according to theoretical specifications.

Renner and others are working on theory-based calculations that establish the device-independent security of certain QKD systems. "With modern proof techniques, it is now possible to quantify their security in terms of a 'failure probability,'" says Renner. "Specifically, it is possible to make claims such as 'the probability that this particular QKD system can be broken is at most 10-20,'" a vanishingly small number.

Renner notes that it is important to be able to reliably calculate the order of magnitude of the failure probability of an encryption system, whether it is tiny like 10-20 or significantly larger. "Compare it to an aircraft," he says.

"Once we realize it is not 100 percent safe, we want to be sure that the failure probability is still small enough so that we are ready to carry the risk. If we have a system that may fail, but do not know how likely it is to fail, then we will probably not want to use it."

.


Related Links
The Optical Society
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





TECH SPACE
Professor who once had to work at Subway makes math breakthrough
Durham, N.H. (UPI) May 24, 2013
A virtually unknown U.S. professor has taken a major step in solving a numerical problem that has baffled mathematicians for centuries, experts said. Yitang Zhang, a researcher at the University of New Hampshire who once took a job a Subway because he couldn't secure an academic appointment, has made a significant step towards settling a long-standing question about prime numbers - num ... read more


TECH SPACE
China Successfully Sends First Gaofen Satellite Into Space

NASA Ships Sensors for Seafaring Satellite to France

NASA's Landsat Satellite Looks for a Cloud-Free View

Google team captures Galapagos Island beauty for maps

TECH SPACE
Orbcomm And Cartrack Deliver Telematics Solution For African Market

Narayansami Inaugurates ISRO Navigation Centre

Advanced aircraft detection to prevent 'friendly fire' mishaps

Northrop Grumman to Demonstrate Open Architecture Navigation System for DARPA

TECH SPACE
Study explores 100 year increase in forestry diseases

Drought makes Borneo's trees flower at the same time

Reforestation study shows trade-offs between water, carbon and timber

Amazon River exhales virtually all carbon taken up by rain forest

TECH SPACE
Colorado's new alga may be a source of biofuel production

European and US Cellulase Patents granted to Direvo Industrial Biotechnology

Shanghai sees biofuel gold in recycled cooking oil

Georgia Power adds biomass capacity

TECH SPACE
Canadian Solar Donates PV Modules to Power the OrcaLab Whale Research Centre

Romano Wins Eskom Rooftop Project In Johannesburg

GaAs Nanowires Harvest Solar Power

SolarCity and Goldman Sachs Create Largest US Rooftop Solar Lease Financing Platform

TECH SPACE
Britain to back EU emissions quotas, oppose renewables targets

Cold climate wind energy showing huge potential

SC Electric Awarded to Upgrade 585 MW Wind Farm in Texas

Solar Wind Energy Tower Receives Patent For Atmospheric Energy Extraction Device

TECH SPACE
Glencore Xstrata cancels coal export terminal plans

Proposed U.S. Northwest coal export project scrapped

China mine accident kills 22: state media

Australia in danger of 'carbon bubble'

TECH SPACE
China ruling party urges political education: ministry

China protest city demands ID to buy T-shirts: media

China migrant population growing, pay rises slowing

China baby's toilet fall accidental: police




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement