Two steps closer to attack-proof quantum communication
Quantum key distribution (QKD) is a method for secure communication that uses quantum mechanics to encrypt information — but while the security of QKD is unbreakable in principle, vital information could still be stolen by attackers if it is incorrectly implemented. Researchers from the National University of Singapore (NUS), led by Assistant Professor Charles Lim, have now developed two methods to ensure that QKD communications cannot be attacked in this way.
A futureproof quantum communication protocol
Typically, in QKD, two measurement settings are used — one to generate the key and the other to test the integrity of the channel. The NUS team developed an ultrasecure cryptography protocol in which users can independently test the other party’s encryption device by generating a secret key from two randomly chosen key generation settings instead of one. In a paper published in the journal Nature Communications, the researchers demonstrated that introducing an extra set of key-generating measurements for the users makes it harder for attackers to eavesdrop on the exchange of keys, known as a ‘side-channel attack’.
“It’s a simple variation of the original protocol that started this field, but it can only be tackled now thanks to significant developments in mathematical tools,” said Professor Valerio Scarani, a co-author on the study and one of the inventors of this type of method.
Compared to the original ‘device-independent’ QKD protocol, the new protocol is said to be easier to set up, as well as more tolerant to noise and loss. It is claimed to give users the highest level of security allowable by quantum communications, empowering them to independently verify their own key generation devices. With the team’s set-up, all information systems built with ‘device-independent’ QKD would be free from misconfiguration and mis-implementation.
“Our method allows data to be safe against attackers even if they have unlimited quantum computing power,” Asst Prof Lim said. “This approach could lead to a truly secure information system, eliminating all side-channel attacks and allowing end users to monitor its implementation security easily and with confidence.”
A quantum power limiter device
Quantum cryptography, in practice, uses optical pulses with very low light intensity to exchange data over untrusted networks. Leveraging quantum effects can securely distribute secret keys, generate truly random numbers and even create banknotes that are mathematically unforgeable.
However, experiments have shown that it is possible to inject bright light pulses into the quantum cryptosystem to break its security. This side-channel attack strategy exploits the way injected bright light is reflected to the outside environment, to reveal the secrets being kept in the quantum cryptosystem.
In a new paper published in the journal PRX Quantum, the NUS researchers reported their development of an optical device to address this issue. It is based on thermo-optical defocusing effects to limit the energy of the incoming light. The researchers use the fact that the energy of the bright light changes the refractive index of the transparent plastic material embedded in the device, thus it sends a fraction of the light out of the quantum channel. This enforces a power-limiting threshold.
The power limiter can be seen as an optical equivalent of an electric fuse, except that it is reversible and does not burn when the energy threshold is breached. It is highly cost-effective and can be easily manufactured with off-the-shelf components. It also does not require any power, so it can be easily added to any quantum cryptography system to strengthen its implementation security.
“It is imperative to close the gap between the theory and practice of quantum secure communications if we are to use it for the future quantum internet,” Asst Prof Lim said. “We do this holistically — on one hand, we design more practical quantum protocols, and on the other hand, we engineer quantum devices that conform closely with the mathematical models assumed by the protocols. In doing so, we can significantly narrow the gap.
“Rapid advances in quantum computing and algorithmic research mean we can no longer take today’s toughest security software for granted. Our two new approaches hold promise to ensuring that the information systems which we use for banking, health and other critical infrastructure and data storage can hold up any potential future attacks.”
Every electronic device needs some kind of protection, depending on where and how it will be used.
Every developer of an electrical or electronic device is faced with the same problem: the device...
US and Chinese scientists have found a way to improve the longevity of silver nanowires to...