{"id":32479,"date":"2017-07-09T15:44:29","date_gmt":"2017-07-09T19:44:29","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/who-needs-quantum-key-distribution-oupblog-blog.php"},"modified":"2017-07-09T15:44:29","modified_gmt":"2017-07-09T19:44:29","slug":"who-needs-quantum-key-distribution-oupblog-blog","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/who-needs-quantum-key-distribution-oupblog-blog.php","title":{"rendered":"Who needs quantum key distribution? &#8211; OUPblog (blog)"},"content":{"rendered":"<p><p>    Chinese scientists have recently announced the use of a satellite to    transfer quantum entangled light particles between two ground    stations over 1,000 kilometres apart. This has been    heralded as the dawn of a new secure    internet.  <\/p>\n<p>    Should we be impressed? Yes  scientific breakthroughs are    great things.  <\/p>\n<p>    Does this revolutionise the future of cyber security? No     sadly, almost certainly not.  <\/p>\n<p>    At the heart of modern cyber security is cryptography, which    provides a kit of mathematically-based tools for providing core    security services such as confidentiality (restricting who can    access data), data integrity (making sure that any unauthorised    changes to data are detected), and authentication (identifying    the correct source of data). We rely on cryptography every day    for securing everything we do in cyberspace, such as banking,    mobile phone calls, online shopping, messaging, social media,    etc. Since everything is in cyberspace these days, cryptography    also underpins the security of the likes of governments, power    stations, homes, and cars.  <\/p>\n<p>    Cryptography relies on secrets, known as keys, which act in a    similar role to keys in the physical world.    Encryption, for example, is the digital equivalent of    locking information inside a box. Only those who have access to    the key can open the box to retrieve the contents. Anyone else    can shake the box all they like  the contents remain    inaccessible without access to the key.  <\/p>\n<p>    A challenge in cryptography is key distribution, which    means getting the right cryptographic key to those (and only    those) who need it. There are many different techniques for key    distribution. For many of our everyday applications key    distribution is effortless, since keys come preinstalled on    devices that we acquire (for example, mobile SIM cards, bank    cards, car key fobs, etc.) In other cases it is straightforward    because devices that need to share keys are physically close to    one another (for example, you read the key on the label of your    Wi-Fi router and type it into devices you permit to connect).  <\/p>\n<p>    Key distribution is more challenging when the communicating    parties are far from one another and do not have any business    relationship during which keys could have been distributed.    This is typically the case when you buy something from an    online store or engage in a WhatsApp message exchange. Key    distribution in these situations is tricky, but very solvable,    using techniques based on a special set of cryptographic tools    known as public-key cryptography. Your devices use    such techniques every day to distribute keys, without you even    being aware it is happening.  <\/p>\n<p>    There is yet another way of distributing keys, known as    quantum key distribution. This uses a quantum channel    such as line of sight or fibre-optic cable to exchange light    particles, from which a cryptographic key can eventually be    extracted. Distance limitations, poor data rates, and the    reliance on specialist equipment have previously made quantum    key distribution more of a scientific curiosity than a    practical technology. What the Chinese scientists have done is    blow the current distance record for quantum key distribution    from around 100kms to 1000kms, through the use of a satellite.    Thats impressive.  <\/p>\n<p>    However, the Chinese scientists have not significantly improved    the case for using quantum key distribution in the first place.    We can happily distribute cryptographic keys today without    lasers and satellites, so why would we ever need to? Just    because we can?  <\/p>\n<p>    Well, theres a glimmer of a case. For the likes of banking and    mobile phones, it seems unlikely we will ever need quantum key    distribution. However, for applications which currently rely on    public-key cryptography, there is a problem brewing. If anyone    gets around to building a practical quantum computer (and were    not talking tomorrow), then current public-key cryptographic    techniques will become insecure. This is because a quantum    computer will efficiently solve the hard mathematical problems    on which todays public-key cryptography relies. Cryptographers    today are thus developing new types of public-key cryptography    that will resist quantum computers. I am confident they will    succeed. When they do, we will be able to continue distributing    keys in similar ways to today.in other words, without quantum    key distribution.  <\/p>\n<p>    Who needs quantum key distribution then? Frankly, its hard to    make a case, but lets try. One possible advantage of quantum    key distribution is that it enables the use of a highly secure    form of encryption known as the one-time pad. One    reason almost nobody uses the one-time pad is that its a    complete hassle to distribute its keys. Quantum key    distribution would solve this. More importantly, however,    nobody uses the one-time pad today because modern encryption    techniques are so strong. If you dont believe me, look    how frustrated some    government agencies are that we are using them. We dont    use the one-time pad because we dont need to. The same    argument applies to quantum key distribution itself.  <\/p>\n<p>    Finally, lets just suppose that there is an application which    somehow merits the use of the one-time pad. Do the one-time pad    and quantum key distribution provide the ultimate security that    physicists often claim? Heres the really bad news. We have    just been discussing all the wrong things. Cyber security    rarely fails due to problems with encryption algorithms or the    ways that cryptographic keys are distributed. Much more common    are failures in the    systems and processes surrounding cryptography. These    include poor implementations and misuse. For example, one-time    pads and quantum key distribution dont protect data after it    is decrypted, or if a key is accidentally used twice, or if    someone forgets to turn encryption on, etc. We already have    good encryption and key distribution techniques. We need to get    much better at building secure systems.  <\/p>\n<p>    So, Im very impressed that a cryptographic key can be    distributed via satellite. Thats great  but I dont think    this will revolutionise cryptography. And I certainly dont    feel any more secure as a result.  <\/p>\n<p>    Featured image credit: Virus by geralt. CC0 public domain    via Pixabay.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/blog.oup.com\/2017\/07\/who-needs-quantum-key-distribution\/\" title=\"Who needs quantum key distribution? - OUPblog (blog)\">Who needs quantum key distribution? - OUPblog (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Chinese scientists have recently announced the use of a satellite to transfer quantum entangled light particles between two ground stations over 1,000 kilometres apart. This has been heralded as the dawn of a new secure internet. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32479","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32479"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32479"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32479\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}