. 24/7 Space News .
CYBER WARS
Swedish researchers reveal security hole
by Staff Writers
Linkoping, Sweden (SPX) Dec 21, 2015


File image.

Quantum cryptography is considered a fully secure encryption method, but researchers from Linkoping University and Stockholm University have discovered that this is not always the case. They found that energy-time entanglement - the method that today forms the basis for many systems of quantum cryptography - is vulnerable to attack. The results of their research have been published in Science Advances.

"With this security hole, it's possible to eavesdrop on traffic without being detected. We discovered this in our theoretical calculations, and our colleagues in Stockholm were subsequently able to demonstrate it experimentally," says Jan-Ake Larsson, professor at Linkoping University's Division of Information Coding.

Quantum cryptography is considered a completely safe method for information transfer, and theoretically it should be impossible to crack.

Many research groups around the world are working to make quantum cryptography resistant to various types of disturbance, and so far it has been possible to handle the disturbance that has been detected. Quantum cryptography technology is commercially available, but there is much doubt as to whether it is actually used.

"It's mostly rumours, I haven't seen any system in use. But I know that some universities have test networks for secure data transfer," says Prof Larsson.

The energy-time entanglement technology for quantum encryption studied here is based on testing the connection at the same time as the encryption key is created. Two photons are sent out at exactly the same time in different directions.

At both ends of the connection is an interferometer where a small phase shift is added. This provides the interference that is used to compare similarities in the data from the two stations. If the photon stream is being eavesdropped there will be noise, and this can be revealed using a theorem from quantum mechanics - Bell's inequality.

On the other hand if the connection is secure and free from noise, you can use the remaining data, or photons, as an encryption key to protect your message.

What the LiU researchers Jan-Ake Larsson and his doctoral student Jonathan Jogenfors have revealed about energy-time entanglement is that if the photon source is replaced with a traditional light source, an eavesdropper can identify the key, the code string.

Consequently they can also read the message without detection. The security test, which is based on Bell's inequality, does not react - even though an attack is underway.

Physicists at Stockholm University have subsequently been able to demonstrate in practical experiments that it is perfectly possible to replace the light source and thus also eavesdrop on the message.

But this problem can also be solved.

"In the article we propose a number of countermeasures, from simple technical solutions to rebuilding the entire machine," said Jonathan Jogenfors.

The article has been published in Science Advances


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Linkoping University
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Congress passes long-stalled cybersecurity bill
Washington (AFP) Dec 18, 2015
Congress on Friday passed legislation to fight cyber threats, pushing the measure through by tucking it into a sprawling government funding bill, after earlier failed attempts. The measure was inserted into the massive $1.1 trillion spending package that funds the government through next September, tightens visa requirements, and ends a longstanding oil export ban, among other moves. Th ... read more


CYBER WARS
XPRIZE verifies moon express launch contract, kicking off new space race

Gaia's sensors scan a lunar transit

SwRI scientists explain why moon rocks contain fewer volatiles than Earth's

All-female Russian crew starts Moon mission test

CYBER WARS
Opportunity on west rim of Endeavour Crater within Marathon Valley

Curiosity reaches sand dunes

NASA's Curiosity rover reaches Martian sand dunes

Mars Mission Team Addressing Vacuum Leak on Key Science Instrument

CYBER WARS
China drives global patent applications to new high

Australia seeks 'ideas boom' with tax breaks, visa boosts

A Year After Maiden Voyage, Orion Progress Continues

NASA's Work to Understand Climate: A Global Perspective

CYBER WARS
Agreement with Chinese Space Tech Lab Will Advance Exploration Goals

China launches new communication satellite

China's indigenous SatNav performing well after tests

China launches Yaogan-29 remote sensing satellite

CYBER WARS
First Briton to travel to ISS blasts off into space

Tim Peake begins six-month stay on Space Station

British astronaut swaps family Christmas for space mission

Three astronauts land back on Earth from space station

CYBER WARS
Soyuz receives the Galileo payload for its December 17 liftoff

Moscow Confirms Suspension of Russian-Ukrainian 'Dnepr' Rocket Launches

Japan to launch X-ray astronomy satellite after 2 months

Russia Puts Military Satellite Into Orbit on December 13

CYBER WARS
Hubble reveals diversity of exoplanet atmosphere

Mystery of missing exoplanet water solved

Student helps discover new planet, calculates frequency of Jupiter-like planets

What kinds of stars form rocky planets

CYBER WARS
Satellite's Last Days Improve Orbital Decay Predictions

Israel's Amos-5 Satellite Failure Caused by Power Supply Malfunction

Scientists create atomically thin boron

Turning rice farming waste into useful silica compounds









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.