Researchers discover new quantum encryption method to foil hackers

Apr 02, 2012

A research team led by University of Toronto Professor Hoi-Kwong Lo has found a new quantum encryption method to foil even the most sophisticated hackers. The discovery is outlined in the latest issue of Physical Review Letters.

Quantum cryptography is, in principle, a foolproof way to prevent hacking. It ensures that any attempt by an eavesdropper to read encoded communication data will lead to disturbances that can be detected by the legitimate users. Therefore, allows the transmission of an unconditionally secure between two users, "Alice" and "Bob," in the presence of a potential hacker, "Eve." The encryption key is communicated using light signals and is received using photon detectors. The challenge is that Eve can intercept and manipulate these signals.

"Photon detectors have turned out to be an Achilles' heel for quantum key distribution (QKD), inadvertently opening the door to subtle side-channel attacks, most famously quantum hacking," wrote Dr. Charles Bennett, a research fellow at IBM and the co-inventor of quantum cryptography.

When quantum hacking occurs, subvert the photon detectors, causing them to only see the photons that Eve wants Bob to see. Indeed, earlier research results by Professor Lo and independent work by Dr. Vadim Makarov of the Norwegian University of Science and Technology have shown how a clever quantum hacker can hack commercial QKD systems.

Now, Professor Lo and his team have come up with a simple solution to the untrusted device problem. Their method is called " Independent QKD." While Eve may operate the and broadcast measurement results, Bob and Alice no longer have to trust those measurement results. Instead, Bob and Alice can simply verify Eve's honesty by measuring and comparing their own data. The aim is to detect subtle changes that occur when quantum data is manipulated by a third party.

Specifically, in Measurement Device Independent QKD, the two users send their signals to an untrusted relay – "Charlie" – who might possibly be controlled by Eve. Charlie performs a joint measurement on the signals, providing another point of comparison.

"A surprising feature is that Charlie's detectors can be arbitrarily flawed without compromising security," says Professor Lo. "This is because, provided that Alice and Bob's signal preparation processes are correct, they can verify whether Charlie or Eve is trustworthy through the correlations in their own data following any interaction with Charlie/Eve."

A proof-of-concept measurement has already been performed. Professor Lo and his team are now developing a prototype measurement device independent QKD system, which they expect will be ready within five years.

As a result of implementing this new method, quantum cryptography's Achilles' heel in the fight against hackers has been resolved. Perhaps, a quantum jump in data security has now been achieved.

Explore further: New research signals big future for quantum radar

More information: link.aps.org/doi/10.1103/PhysRevLett.108.130503

Related Stories

Quantum eavesdropper steals quantum keys

Jun 20, 2011

(PhysOrg.com) -- In quantum cryptography, scientists use quantum mechanical effects to encrypt and then communicate confidential information. Although quantum cryptography codes are unbreakable in principle, even the best ...

Making quantum cryptography truly secure

Jun 14, 2011

Quantum key distribution (QKD) is an advanced tool for secure computer-based interactions, providing confidential communication between two remote parties by enabling them to construct a shared secret key ...

'Dead time' limits quantum cryptography speeds

Sep 28, 2007

Quantum cryptography is potentially the most secure method of sending encrypted information, but does it have a speed limit" According to a new paper by researchers at the National Institute of Standards and Technology and ...

Recommended for you

New filter could advance terahertz data transmission

Feb 27, 2015

University of Utah engineers have discovered a new approach for designing filters capable of separating different frequencies in the terahertz spectrum, the next generation of communications bandwidth that ...

The super-resolution revolution

Feb 27, 2015

Cambridge scientists are part of a resolution revolution. Building powerful instruments that shatter the physical limits of optical microscopy, they are beginning to watch molecular processes as they happen, ...

Precision gas sensor could fit on a chip

Feb 27, 2015

Using their expertise in silicon optics, Cornell engineers have miniaturized a light source in the elusive mid-infrared (mid-IR) spectrum, effectively squeezing the capabilities of a large, tabletop laser onto a 1-millimeter ...

A new X-ray microscope for nanoscale imaging

Feb 27, 2015

Delivering the capability to image nanostructures and chemical reactions down to nanometer resolution requires a new class of x-ray microscope that can perform precision microscopy experiments using ultra-bright ...

New research signals big future for quantum radar

Feb 26, 2015

A prototype quantum radar that has the potential to detect objects which are invisible to conventional systems has been developed by an international research team led by a quantum information scientist at the University ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.