The risk of illegal information access, notably in money transactions, requires more and more advanced cryptographic techniques against criminals and the occasional mischevious teenager.
Quantum cryptography has been regarded as 100-percent protection against attacks on sensitive data traffic but a research team at Linköping University in Sweden has found a hole in even this advanced technology.
When an encrypted message needs to be sent over a computer network, the most difficult problem is how the key should be transmitted. One way is to literally send it by courier (which has its own security risks) or, if it's in your budget, attached to the wrist of James Bond. But the most common way is a "public key," like https:// for online banking and security functions in Web browsers.
A public key is regarded as secure, since enormous calculations are required to break the long strings of data bits - some 2,000 - that make up the key.
Quantum cryptography is considered absolutely secure but very few people use it. It requires special hardware, such as a type of laser that emits polarized light particles (photons) via optic fiber or through the air and some companies and banks in Austria are testing such a system, and trials are even underway with satellite-TV transmission.
In quantum cryptography, security is guaranteed by the laws of quantum mechanics. Quantum-mechanical objects have the peculiar property that they cannot be measured or manipulated without being disturbed. If somebody tries to copy a quantum-cryptographic key in transit, it will make extra 'noise.' An eavesdropper can cause problems, but not extract usable information.
Jan-Åke Larsson, associate professor of applied mathematics at Linköping University, working with his student Jörgen Cederlöf, has shown that not even quantum cryptography is 100-percent secure. There is a theoretical possibility that an unauthorized person can extract the key without being discovered, by simultaneously manipulating both the quantum-mechanical and the regular communication needed in quantum cryptography.
"The concern involves authentication, intended to secure that the message arriving is the same as the one that was sent. We have scrutinized the system as a whole and found that authentication does not work as intended. The security of the current technology is not sufficient," says Jan-Åke Larsson.
In the IEEE Transactions on Information Theory article, the authors propose a change that solves the problem.
"We weren't expecting to find a problem in quantum cryptography, of course, but it is a really complicated system. With our alteration, quantum cryptography will be a secure technology," says Jan-Åke Larsson.
- PHYSICAL SCIENCES
- EARTH SCIENCES
- LIFE SCIENCES
- SOCIAL SCIENCES
Subscribe to the newsletter
Stay in touch with the scientific world!
Know Science And Want To Write?
- Questions a Surface Pro 3 user has about Windows 10.
- Epigenetics Of Being Without Electricity For A Few Days
- Top Mass: CMS Again On Top!
- Multiple Sclerosis Patients Benefit From Exercise
- The Enemy Of Archaeology Is Not People, It's Salt
- Why Japan’s Deadly Ontake Eruption Could Not Be Predicted
- Mutational Robustness: Why Duplicate Genes Remain In The Genome
- "Lol, I don't have any problem with that...."
- "There is only one scientific understanding of the neuron-behavior linkage: Kandel et al spent 30..."
- "No wonder you have a problem comprehending climate change!..."
- "There are many truths of which the full meaning cannot be realized until personal experience has..."
- "Ha ha ha ROFL!..."
- Delayed introduction to gluten appears not to prevent celiac disease in at-risk infants
- Teen pregnancies, abortions plunge with free birth control
- B and T cell-targeting drug ameliorates chronic graft-versus-host disease in mice
- Clinical trial evaluates heterologous prime/boost regimens in preventative HIV vaccination
- Montmorency tart cherry juice lowered blood uric acid levels and a marker for inflammation