A research team led by University of Toronto Professor Hoi-Kwong Lo has found a new quantum encryption method to foil even the most sophisticated hackers. The discovery is outlined in the latest issue of Physical Review Letters.
Quantum cryptography is, in principle, a foolproof way to prevent hacking. It ensures that any attempt by an eavesdropper to read encoded communication data will lead to disturbances that can be detected by the legitimate users. Therefore, quantum cryptography allows the transmission of an unconditionally secure encryption key between two users, "Alice" and "Bob," in the presence of a potential hacker, "Eve." The encryption key is communicated using light signals and is received using photon detectors. The challenge is that Eve can intercept and manipulate these signals.
"Photon detectors have turned out to be an Achilles' heel for quantum key distribution (QKD), inadvertently opening the door to subtle side-channel attacks, most famously quantum hacking," wrote Dr. Charles Bennett, a research fellow at IBM and the co-inventor of quantum cryptography.
When quantum hacking occurs, light signals subvert the photon detectors, causing them to only see the photons that Eve wants Bob to see. Indeed, earlier research results by Professor Lo and independent work by Dr. Vadim Makarov of the Norwegian University of Science and Technology have shown how a clever quantum hacker can hack commercial QKD systems.
Now, Professor Lo and his team have come up with a simple solution to the untrusted device problem. Their method is called "Measurement Device Independent QKD." While Eve may operate the photon detectors and broadcast measurement results, Bob and Alice no longer have to trust those measurement results. Instead, Bob and Alice can simply verify Eve's honesty by measuring and comparing their own data. The aim is to detect subtle changes that occur when quantum data is manipulated by a third party.
Specifically, in Measurement Device Independent QKD, the two users send their signals to an untrusted relay – "Charlie" ¬– who might possibly be controlled by Eve. Charlie performs a joint measurement on the signals, providing another point of comparison.
"A surprising feature is that Charlie's detectors can be arbitrarily flawed without compromising security," says Professor Lo. "This is because, provided that Alice and Bob's signal preparation processes are correct, they can verify whether Charlie or Eve is trustworthy through the correlations in their own data following any interaction with Charlie/Eve."
A proof-of-concept measurement has already been performed. Professor Lo and his team are now developing a prototype measurement device independent QKD system, which they expect will be ready within five years.
As a result of implementing this new method, quantum cryptography's Achilles' heel in the fight against hackers has been resolved. Perhaps, a quantum jump in data security has now been achieved.
University of Toronto Faculty of Applied Science & Engineering: http://www.engineering.utoronto.ca/home.htm
This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.
Camped on a glacier, Lisa Grossman meets a robot that could pierce the ice of Jupiter's moon Europa and check its hidden ocean for signs of life
It may be decades before autonomous vehicles can reliably handle the real world, experts say.
Costly robotic surgery is rising in popularity, but researchers find it doesn't improve the patient's care
New Internet tracking tools are a lot more sophisticated than your typical cookies, researchers say, and much more difficult to remove
Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep automobiles safe from cyber attacks.
Researchers have stumbled on an ingenious idea: Use bubble wrap as a cheap test tube and petri dish. They've even run tests on blood that's sitting inside the poppable packaging. So how does it work?
An augmented reality headset may allow the pilots of business jets and helicopters to take off and land in fog, torrential rain, snow and dust storms
Medical data is a hot spot for venture investing and product innovation. The payoff could be better care.
Whether you find it exhilarating or terrifying (or both), progress in robotics and related fields like AI is raising new ethical quandaries and challenging legal codes that were created for a world in which a sharp line separates man from machine. Last week, roboticists, legal scholars, and other experts met at the University of California, Berkeley law school to talk through some of the social, moral, and legal hazards that are likely to arise as that line starts to blur.
The latest evolution on Honda's iconic white android, Asimo, combines athletic running with a delicate and dextrous touch