{"id":25612,"date":"2014-08-20T14:43:46","date_gmt":"2014-08-20T18:43:46","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25612"},"modified":"2014-08-20T14:43:46","modified_gmt":"2014-08-20T18:43:46","slug":"the-next-battleground-in-the-war-against-quantum-hacking","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/the-next-battleground-in-the-war-against-quantum-hacking.php","title":{"rendered":"The Next Battleground In The War Against Quantum Hacking"},"content":{"rendered":"<p><p>    Ever since the first hack of a commercial quantum cryptography    device, security specialists have been fighting back. Heres an    update on the battle.  <\/p>\n<\/p>\n<p>    Quantum hacking is the latest fear in the world of information    security. Not so long ago, physicists were claiming that they    could send information with perfect security using a technique    known as quantum key distribution.  <\/p>\n<p>    This uses the laws of quantum mechanics to guarantee perfectly    secure communication. And perfectly secure communication is    what you get, at least in theory.  <\/p>\n<p>    The trouble is that in practice the equipment used to carry out    quantum key distribution has a number of weaknesses that an    eavesdropper can exploit to gain information about the messages    being sent. Various groups have demonstrated how quantum    hacking presents a real threat to perfectly secure    communication.  <\/p>\n<p>    So in the cat and mouse game of information security,    physicists have been fighting back by designing equipment that    is more secure. Today, Nitin Jain at the Max Planck Institute    for the Science of Light in Erlangen, Germany, and a few pals    show how the changes still leave the equipment open to attack    but at the same time reveal how the next generation of quantum    cryptography could be made better.  <\/p>\n<p>    In quantum key distribution, Alice sends information to Bob    encoded in the polarisation of single photons. So she might    send a sequence of 0s and 1s as a series of photons polarised    horizontally and vertically. Bob can then use this information    as the key to a one-time pad for sending information with    perfect security. Hence the name quantum key distribution.  <\/p>\n<p>    An eavesdropper, Eve, can only see the information Alice sends    if she knows the directions that correspond to vertical and    horizontal. Physicists call this the base of the system.  <\/p>\n<p>    Without knowing the base, the information the photons carry    will seem random. So a key part of the security of quantum key    distribution comes from keeping Alices base secret.  <\/p>\n<p>    Just over 10 years ago, hackers found a way for Eve to discover    Alices base. All Eve has to do is shine a light into Alices    equipment and measure the polarisation of the reflected    photons. These will have bounced off the optical components    that determine Alices base and so will be polarised in the    same way. That gives Eve the crucial information she needs to    decode the transmissions without Alice being any the wiser.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/view\/530181\/the-next-battleground-in-the-war-against-quantum-hacking\" title=\"The Next Battleground In The War Against Quantum Hacking\">The Next Battleground In The War Against Quantum Hacking<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ever since the first hack of a commercial quantum cryptography device, security specialists have been fighting back. Heres an update on the battle<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25612","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25612"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25612"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25612\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}