New Cryptography Scheme Secured By Quantum Physics

Image Caption: The experiment's Alice and Bob communicated with entangled photons produced in this setup. Such apparatus could be miniaturized using techniques from integrated optics. Credit: IQC, University of Waterloo

Centre for Quantum Technologies

The way we secure digital transactions could soon change. An international team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust a situation encountered often on the internet and in everyday life, for example at a banks ATM.

Having quantum cryptography to hand is a realistic prospect, I think. I expect that quantum technologies will gradually become integrated with existing devices such as smartphones, allowing us to do things like identify ourselves securely or generate encryption keys, says Stephanie Wehner, a Principal Investigator at the Centre for Quantum Technologies (CQT) at the National University of Singapore, and co-author on the paper.

In cryptography, the problem of providing a secure way for two mutually distrustful parties to interact is known as two-party secure computation. The new work, published in Nature Communications, describes the implementation using quantum technology of an important building block for such schemes.

CQT theorists Wehner and Nelly Ng teamed up with researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo, Canada, for the demonstration.

Research partnerships such as this one between IQC and CQT are critical in moving the field forward, says Raymond Laflamme, Executive Director at the Institute for Quantum Computing. The infrastructure that weve built here at IQC is enabling exciting progress on quantum technologies.

CQT and IQC are two of the worlds largest, leading research centres in quantum technologies. Great things can happen when we combine our powers, says Artur Ekert, Director of CQT.

The experiments performed at IQC deployed quantum-entangled photons in such a way that one party, dubbed Alice, could share information with a second party, dubbed Bob, while meeting stringent restrictions. Specifically, Alice has two sets of information. Bob requests access to one or the other, and Alice must be able to send it to him without knowing which set hes asked for. Bob must also learn nothing about the unrequested set. This is a protocol known as 1-2 random oblivious transfer (ROT).

ROT is a starting point for more complicated schemes that have applications, for example, in secure identification. Oblivious transfer is a basic building block that you can stack together, like lego, to make something more fantastic, says Wehner.

Read the original:
New Cryptography Scheme Secured By Quantum Physics

More secure communications thanks to quantum physics

One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren't surprised by this news; such a computer could crack the encryption that is commonly used today in no time and would therefore be highly attractive for the NSA.

Professor Thomas Walther of the Institute of Applied Physics at the Technical University of Darmstadt is convinced that "Sooner or later, the quantum computer will arrive." Yet the quantum physicist is not worried. After all, he knows of an antidote: so-called quantum cryptography. This also uses the bizarre rules of quantum physics, but not to decrypt messages at a record pace. Quite the opposite -- to encrypt it in a way that can not be cracked by a quantum computer. To do this, a "key" that depends on the laws of quantum mechanics has to be exchanged between the communication partners; this then serves to encrypt the message. Physicists throughout the world are perfecting quantum cryptography to make it suitable for particularly security-sensitive applications, such as for banking transactions or tap-proof communications. Walther's Ph.D. student Sabine Euler is one of them.

As early as the 1980s, physicists Charles Bennett and Gilles Brassard thought about how quantum physics could help transfer keys while avoiding eavesdropping. Something similar to Morse code is used, consisting of a sequence of light signals from individual light particles (photons). The information is in the different polarizations of successive photons. Eavesdropping is impossible due to the quantum nature of photons. Any eavesdropper will inevitably be discovered because the eavesdropper needs to do measurements on the photons, and these measurements will always be noticed.

"That's the theory" says Walther. However, there are ways to listen without being noticed in practice. This has been demonstrated by hackers who specialize in quantum cryptography based on systems already available on the market. "Commercial systems have always relinquished a little bit of security in the past," says Walther. In order to make the protocol of Bennett and Brassard reality, you need, for example, light sources that are can be controlled so finely that they emit single photons in succession. Usually, a laser that is weakened so much that it emits single photons serves as the light source. "But sometimes two photons can come out simultaneously, which might help a potential eavesdropper to remain unnoticed" says Walther. The eavesdropper could intercept the second photon and transmit the first one.

Therefore, the team led by Sabine Euler uses a light source that transmits a signal when it sends a single photon; this signal can be used to select only the individually transmitted photons for communication. Nevertheless, there are still vulnerabilities. If the system changes the polarization of the light particles during coding, for example, the power consumption varies or the time interval of the pulses changes slightly. "An eavesdropper could tap this information and read the message without the sender and receiver noticing" explains Walther. Sabine Euler and her colleagues at the Institute of Applied Physics are trying to eliminate these vulnerabilities. "They are demonstrating a lot of creativity here" says Walther approvingly. Thanks to such research, it will be harder and harder for hackers to take advantage of vulnerabilities in quantum cryptography systems.

The TU Darmstadt quantum physicists want to make quantum cryptography not only more secure, but more manageable at the same time. "In a network in which many users wish to communicate securely with each other, the technology must be affordable," he says. Therefore, his team develops its systems in such a manner that they are as simple as possible and can be miniaturized.

The research team is part of the Center for Advanced Security Research Darmstadt (CASED), in which the TU Darmstadt, the Fraunhofer Institute for Secure Information Technology and the University of Darmstadt combine their expertise in current and future IT security issues. Over 200 scientists conduct research in CASED, funded by the State Initiative for Economic and Academic Excellence (LOEWE) of the Hessian Ministry for Science and the Arts. "We also exchange information with computer scientists, which is very exciting," says Walther.

After all, the computer science experts deal with many of the same issues as Walther's quantum physicists. For example, Johannes Buchmann of the department of Computer Science at the TU Darmstadt is also working on encryption methods that theoretically can not be cracked by a quantum computer. However, these are not based on quantum physics phenomena, but rather on an unsolvable math problem.

Therefore, it may well be that the answer to the first code-cracking quantum computer comes from Darmstadt.

Bizarre quantum physics and encryption

More:
More secure communications thanks to quantum physics

Malignant computation

Cryptocurrencies, like bitcoin, could revolutionize money to the same degree that the Internet has revolutionized communication. However, like any economic marketplace, human exuberance is the greatest threat to the cryptocurrency phenomenon. Markets fail to the degree that the market can be dominated by those seeking personal gain, and markets succeed to the degree that they resist domination and focus on benefiting society at large.

The cryptocurrency market place is in danger of becoming so focused on profitability, that it loses sight of the potential computational benefits that it could provide to society. I hope that this article will influence designers of cryptocurrencies to attempt to avoid computational malignancy.

Many people regard the success or failure of the market to be the degree that it works for them, rather than for society as a whole. One of the fundamental motivations for cryptocurrency is the general sense that banks, governments and markets have failed to protect the interest of the common man. It is not an accident that the rise of bitcoin began shortly after the sub-prime mortgage crisis.

Cells, typically, prefer to serve the whole organism, but when they get confused and start to multiply without regard for the impact on the organism as a whole, they can morph into a series of diseases that we refer to collectively as cancer. This is why curing cancer is so hard. Cancer is not a disease, but a family of diseases that share a common core problem: cells acting in their own interests that betray the body as a collective.

We have a similar problem with the use of computation in markets. We can call this malignant computation. This is when computation starts to ensure its own survival at the expense of the overall marketplace. The Skynet hypothesis is a boogeyman intended to scare the young and the paranoid. The real threat from AI is that it will become so good at the pointless tasks that we have given it that those pointless tasks will become a black hole of resources.

This has already happened with high-frequency trading on Wall Street. There is an ongoing arms race between computers that trade stocks to see which one can get the edge over the other, and entire series of engineering feats that have no purpose whatsoever other than to overcome previous engineering feats. In several respects, the computational trading platforms are the most advanced computation systems on the planet, and they are engaged in a micro-second game of mutual navel gazing.There is so much money being made by these super computers that the only thing that is absolutely certain is that further funding for bigger super computers will become available.

Capital markets serve a function in society. They ensure that businesses that provide value to society will have access to large amounts of capital to invest in otherwise too expensive projects. I have not been able to think of a single way in which the high-frequency trading platforms have improved the markets capacity to serve that function. No one has been able to provide me with any contrary insight, although several pointed me to more eloquent statements of the underlying problem. High-frequency trading is the first and foremost example of malignant computing, but it is not the last.

Malignant computing is a problem in cryptocurrencies too, but in order to discuss it clearly, one has to understand how the computational arms race in cryptocurrency mining works. This article does a wonderful job of summarizing the issues of the crypto arms race.

Cryptocurrencies in the bitcoin mold rely on a process called mining, which is the process of performing arbitrary calculations that help to ensure that the currency as a whole is functional and secure. Because of the inflated prices of bitcoins, mining has been very profitable, and as a result, we have seen the entire computational infrastructure of bitcoin switch to ASICS, or Application Specific Integrated Circuits. When you see the word ASIC, you should have a mental shortcut to single purpose computing. The bitcoin mining ASICs are so specific that they can only be used for the computations for bitcoin mining; they cannot even perform nearly identical computations for different parts of the bitcoin computation process.

I believe that this is another example of malignant computing. Bitcoin mining will continue until 2033. For bitcoin, ASICs will do the vast majority of this work, and assuming the value of a single bitcoin continues to rise, the amount of money invested in specialized hardware to perform bitcoin mining will almost certainly pass into the tens of billions of dollars. The bitcoin mining algorithms rewards miners relative to the whole amount of computational power devoted to bitcoin mining everywhere. If computational power were equated to lottery tickets, this would be tantamount to massive changes to your chance of winning.

Read more here:
Malignant computation

Schapelle Corby conspiracy theorist to stand for WikiLeaks Party in WA Senate byelection

EXCLUSIVE

WikiLeaks founder Julian Assange is ineligible to stand in the WA Senate byelection. Photo: AFP

The WikiLeaks Party has chosen a Schapelle Corby conspiracy theorist as its candidate to replace Julian Assange at the West Australia Senate election.

Gerry Georgatos was endorsed by the WikiLeaks national council on Tuesday night after the party was notified by the Australian Electoral Commission that Mr Assange was not eligible to contest in WA as he had not spent enough time in the state in past six years.

Mr Assange remains in diplomatic asylum inside the Ecuadorian embassy in London.

Mr Georgatos, a university researcher and journalist, wrote a series of articles in January for independent news website, The Stringer, claiming Australian officials ''know without doubt'' that Schapelle Corby is innocent.

Advertisement

The article went on to claim that she was used as a drug mule by corrupt officials and the Australian government considered brokering a ''tit-for-tat'' deal in which Indonesian children in Australian prisons would be ''swapped'' for Ms Corby.

When contacted by Fairfax Media on Wednesday, Mr Georgatos stood by his claims but conceded the story was ''too dramatic'' for the Australian public to take seriously.

Mr Georgatos said he came into contact with Department of Foreign Affairs officials in the course of campaigning for the release of Indonesian boys held in adult prisons. He said they openly claimed Ms Corbys innocence.

Read the original here:
Schapelle Corby conspiracy theorist to stand for WikiLeaks Party in WA Senate byelection

Conspiracy theorist to run in byelection

EXCLUSIVE

WikiLeaks founder Julian Assange is ineligible to stand in the WA Senate byelection. Photo: AFP

The WikiLeaks Party has chosen a Schapelle Corby conspiracy theorist as its candidate to replace Julian Assange at the West Australia Senate election.

Gerry Georgatos was endorsed by the WikiLeaks national council on Tuesday night after the party was notified by the Australian Electoral Commission that Mr Assange was not eligible to contest in WA as he had not spent enough time in the state in past six years.

Mr Assange remains in diplomatic asylum inside the Ecuadorian embassy in London.

Mr Georgatos, a university researcher and journalist, wrote a series of articles in January for independent news website, The Stringer, claiming Australian officials ''know without doubt'' that Schapelle Corby is innocent.

Advertisement

The article went on to claim that she was used as a drug mule by corrupt officials and the Australian government considered brokering a ''tit-for-tat'' deal in which Indonesian children in Australian prisons would be ''swapped'' for Ms Corby.

When contacted by Fairfax Media on Wednesday, Mr Georgatos stood by his claims but conceded the story was ''too dramatic'' for the Australian public to take seriously.

Mr Georgatos said he came into contact with Department of Foreign Affairs officials in the course of campaigning for the release of Indonesian boys held in adult prisons. He said they openly claimed Ms Corbys innocence.

Follow this link:
Conspiracy theorist to run in byelection

Nitschke to run in WA Senate election

Euthanasia advocate Dr Philip Nitschke to stand at the re-run of the Senate election. Picture: Sharon Smith/ WA News

Euthanasia advocate Dr Philip Nitschke will be one of the many micro-party candidates to stand at the re-run of the Senate election in Western Australia - but not Wikileaks founder Julian Assange.

Dr Nitschke and his Voluntary Euthanasia Party announced they would be running on April 5 to "lead the charge in pushing politicians to take a stance on voluntary euthanasia".

"We are so excited that we'll soon have passionate VEP members and community leaders speaking with Western Australians to spread the word of why a vote for the party is so important this election," Dr Nitschke said.

Dr Nitschke, who performed the world's first legally assisted suicides in the Northern Territory in 1996, ran senate candidates in NSW, ACT and South Australia, as well as in the Northern Territory lower house seat of Solomon in last year's federal election. The party did not field a senate candidate in WA in September.

"We're looking to build on our efforts last September and bring together thousands of Australians to run a powerful campaign in our country's biggest state," Dr Nitschke said.

Meanwhile, the Wikileaks Party has confirmed Mr Assange would not run, amid reports he was not eligible to contest in WA as he had not spent enough time in the state in past six years.

The Wikileaks founder remains in diplomatic asylum inside the Ecuadorian embassy in London.

| Bullock 'a good candidate' |

Local candidate Gerry Georgatos, who ran in WA for Wikileaks in September, has been selected by the party to lead their campaign.

More:
Nitschke to run in WA Senate election