Please enable Javascript to use Top Secret Writers to it's fullest. Without it, you will find much of the modern internet doesn't work. I would add a little button hide this message, but that kind of functionality requires Javascript ;)

Project Bellwether II - Using Insects to Deliver Biological WeaponsPrevious Article
Mainland Chinese Presence in Hong KongNext Article

Researchers Fix Quantum Encryption to Foil Hackers

Line Spacing+- AFont Size+- Print This Article

quantum encryption

Can quantum encryption offer the solution to the ultimate, foolproof way to block hackers? According to a research team at the University of Toronto, quantum cryptography is the single solution that now has the capability of tripping up even the most sophisticated hackers.

The basic theory with quantum cryptography is that any attempts to hack into encoded communications will immediately alert legitimate users to those hacking attempts.

The encryption key in quantum cryptography isn’t some super-secret text or numerical password, it actually uses light signals and photo detectors. Unfortunately, in previous versions of the quantum key distribution (QKD) method, hackers could hack commercial QKD systems by “subverting” the photon detectors and manipulating what the recipient of the communications ultimately sees.

However, Professor Hoi Kwong Lo and the University of Toronto team developed a fool-proof system to ensure that QKD communications are in fact authentic and from the original sender.




Looking for “Hacking” Attempts in Every Transmission

The way the improved QKD system works is that the sender and the recipient do not trust any incoming communications until the incoming data is compared to the data from the recipients own system. This works because when quantum hackers attempt to manipulate the photons that transmit quantum data, they also inevitably introduce subtle changes in the data steam.

By analyzing all incoming data and determining whether or not it is trustworthy by comparing it to the recipients own data, the communications can pass through untrusted third-party relays and still detect whether or not the signals are being intercepted or manipulated.

In a press release from the University of Toronto, Professor Lo explains:

“A surprising feature is that Charlie’s [the recipients] detectors can be arbitrarily flawed without compromising security. This is because, provided that Alice and Bob’s [senders] signal preparation processes are correct, they can verify whether Charlie or Eve [recipient] is trustworthy through correlations in their own data following any interaction with Charlie/Eve.”

Professor Lo and his team have already developed and tested a proof of concept, and are now actively developing a prototype device that may prove to be the ultimate in quantum cryptography, solving the “Achilles’ heel” that quantum cryptography has always suffered from – that is, the side-channel attacks on photon detectors.

The team expects to have the first prototype ready in five years.


References & Image Credits:
(1) PR Newswire
(2) Scientific American

Originally published on TopSecretWriters.com

“The thing about the truth is, not a lot of people can handle it.” -Conor McGregor

Top Secret Editors

Ryan is the founder of Top Secret Writers. He is an IT analyst, blogger, journalist, and a researcher for the truth behind strange stories.
 
Lori is TSW's editor. Freelance writer and editor for over 17 years, she loves to read and loves fringe science and conspiracy theory.

Top Secret Writers

Gabrielle is a journalist who finds strange stories the media misses, and enlightens readers about news they never knew existed.
 
Sally is TSW’s health/environmental expert. As a blogger/organic gardener, she’s investigates critical environmental issues.
 
Mark Dorr grew up the son of a treasure hunter. His experiences led to working internationally in some surprising situations!
 
Mark R. Whittington, from Houston, Texas, frequently writes on space, science, political commentary and political culture.

Join Other Conspiracy Theory Researchers on Facebook!

Get a Top Secret Bumper Sticker!

Look like a spy with cool new shades

Comment on Breaking Stories

Powered by Disqus