{"id":25790,"date":"2014-09-02T17:44:10","date_gmt":"2014-09-02T21:44:10","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25790"},"modified":"2014-09-02T17:44:10","modified_gmt":"2014-09-02T21:44:10","slug":"the-future-of-security-zeroing-in-on-un-hackable-data-with-quantum-key-distribution","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/the-future-of-security-zeroing-in-on-un-hackable-data-with-quantum-key-distribution.php","title":{"rendered":"The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key Distribution"},"content":{"rendered":"<p><p>    Thieves steal data constantly, so    protecting it is an ongoing challenge. There are more than    6,000 banks with 80,000 branches in the United States, nearly    6,000 hospitals and thousands of insurance companies, all with    data that we want to be kept private. Traditionally, their    valued data is protected by keys, which are transmitted    between sender and receiver. These secret keys are protected by    unproven mathematical assumptions and can be intercepted,    corrupted and exposed if a hacker eavesdrops on these keys    during transmission. Specific problems with current encryption    technology include:  <\/p>\n<p>    Standard methods for exchanging    cryptographic keys are in jeopardy. RSA-1024, once commonly    used to exchange keys between browsers and web servers, has    probably been broken; its no longer regarded as safe by NIST, though    RSA-2048 is still approved. This and other public-key    infrastructure technologies perhaps havent been broken yet but    soon will be by bigger, faster computers. And once quantum    computers are mainstream, data encrypted using existing key    exchange technologies will become even more vulnerable.  <\/p>\n<p>    Researchers are working on methods    to improve the security of software-based key exchange methods    using what is known aspost-quantum cryptography  methods that    will continue to be effective after quantum computers are    powerful enough to break existing key exchange methods.    These are all based on the unprovable assertion that certain    numerical algorithms are difficult to reverse. But the question    that remains is  difficult for whom? How do we know that    an unpublished solution to these exact problems hasnt been    discovered? The answer is  we dont.  <\/p>\n<p>    Quantum cryptography is the only    known method for transmitting a secret key over long distances    that is provably secure in accordance with the well-accepted    and many-times-verified laws that govern quantum physics. It    works by using photons of light to physically transfer a shared    secret between two entities. While these photons might be    intercepted by an eavesdropper, they cant be copied, or at    least, cant be perfectly copied (cloned). By comparing    measurements of the properties of a fraction of these photons,    its possible to show that no eavesdropper is listening in and    that the keys are thus safe to use; this is what we mean by    provably secure. Though called quantum cryptography, we    are actually only exchanging encryption keys, so researchers    prefer the term quantum key distribution, or QKD, to    describe this process.The no-cloning theorem is one of the    fundamental principles behind QKD, and why we think that this    technology will become a cornerstone of network security for    high value data.  <\/p>\n<p>    While products based on QKD    already are being used by banks and governments in Europe     especially Switzerland  they have not been deployed    commercially in the United States to any great extent. Current    technological breakthroughs are pushing the distance over which    quantum signals can be sent.Trials    using laboratory-grade hardware and dark fibers    optical fibers laid down by telecommunications companies but    lying unused  have sent quantum signals three hundred    kilometers, but practical systems are currently limited to    distances of about 100 kilometers. A scalable    architecture that includes a Trusted Node to bridge the gap    between successive QKD systems can both extend the practical    range of this technology and allow keys to be securely shared    over a wide ranging network, making large scale implementation    possible and practical. Cybersecurity is making progress toward    the future reality of sending data securely over long distances    using quantum physics.  <\/p>\n<p>    As an example, my team at    Battelle, together with ID Quantique, has started to design and    build the hardware required to complete a 650-kilometre link    between Battelles headquarters and our offices in Washington    DC. We are also planning a network linking major U.S. cities,    which could exceed 10,000 kilometers and are currently    evaluating partners to work with us on this effort. For the    past year, we have used QKD to protect the networks at our    Columbus, Ohio headquarters. But were not alone when it comes    to quantum-communication efforts. Last month, China started    installing the worlds longest quantum-communications network,    which includes a 2,000-kilometre link between Beijing and    Shanghai.  <\/p>\n<p>    Many nations acknowledge that    zeroing in on un-hackable data security is a must, knowing that    even the best standard encryption thats considered unbreakable    today will be vulnerable at some point in the future  likely    the near future. QKD is the best technically feasible means of    generating secure encryption. Yes, it has its challenges, but    continued innovation is tackling these issues and bringing us    closer to the reality of long-distance quantum rollouts and    truly secure and future-proofed network technology.  <\/p>\n<p>    Does this mean that software-based    methods wont have any value for network security    applications? Of course not. One must always    evaluate the cost of the protection against the cost associated    with the loss of your data. But part of that evaluation    must include the certainty of the security solution. So,    while post-quantum cryptography and QKD may both be secure    enough for a particular application, we use QKD when we want to    know that our data is secure, without having to rely on    unproven assumptions that it is.  <\/p>\n<p>    In the long run, we envision an    integrated network that includes software-based methods, which    we call Tier III (cost conscious), alongside higher-security    and commercially viable QKD (Tier II) solutions that use    quantum methods with Trusted Nodes to distribute keys, but    conventional encryption (AES, for example) to protect actual    data. In this vision, there is also one higher level     Tier I (very secure, very expensive)  that uses quantum    repeaters to transmit long, quantum-based keys and one-time-pad    encryption to protect our highest value data, mostly government    and military information.  <\/p>\n<p>    QKD is an attractive solution for    companies and organizations that have very high-value data. If    you have data that you want to protect for years, QKD makes a    lot sense. I think youll see this distributed across the    country to protect that high-value, long-duration data. This is    the future.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/3e149536\/sc\/24\/l\/0L0Swired0N0C20A140C0A90Cquantum0Ekey0Edistribution0C\/story01.htm\/RK=0\/RS=2XF8H2TzBRgX4b_skS3ilc6sTe0-\" title=\"The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key Distribution\">The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key Distribution<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Thieves steal data constantly, so protecting it is an ongoing challenge. There are more than 6,000 banks with 80,000 branches in the United States, nearly 6,000 hospitals and thousands of insurance companies, all with data that we want to be kept private. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25790","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25790"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25790"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25790\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}