dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Social Links
  • zedreviews.com
  • citi.io
  • aster.cloud
  • liwaiwai.com
  • guzz.co.uk
  • atinatin.com
0 Likes
0 Followers
0 Subscribers
dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
  • Technology

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

  • May 4, 2018
Total
0
Shares
0
0
0

Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can’t understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighbourhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.

Aha! The US Navy Bombe deciphering device. Photo courtesy Brewbooks/US Navy/Flickr

The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information. This is incredibly useful in modern electronic commerce: if you want to send your credit card number safely over the internet to Amazon, for instance, you don’t want to have to drive to their headquarters to have a secret meeting first. Public-key systems rely on the fact that some mathematical processes seem to be easy to do, but difficult to undo. For example, for Alice to take two large whole numbers and multiply them is relatively easy; for Eve to take the result and recover the original numbers seems much harder.

Public-key cryptography was invented by researchers at the Government Communications Headquarters (GCHQ) – the British equivalent (more or less) of the US National Security Agency (NSA) – who wanted to protect communications between a large number of people in a security organisation. Their work was classified, and the British government neither used it nor allowed it to be released to the public. The idea of electronic commerce apparently never occurred to them. A few years later, academic researchers at Stanford and MIT rediscovered public-key systems. This time they were thinking about the benefits that widespread cryptography could bring to everyday people, not least the ability to do business over computers.

Now cryptographers think that a new kind of computer based on quantum physics could make public-key cryptography insecure. Bits in a normal computer are either 0 or 1. Quantum physics allows bits to be in a superposition of 0 and 1, in the same way that Schrödinger’s cat can be in a superposition of alive and dead states. This sometimes lets quantum computers explore possibilities more quickly than normal computers. While no one has yet built a quantum computer capable of solving problems of nontrivial size (unless they kept it secret), over the past 20 years, researchers have started figuring out how to write programs for such computers and predict that, once built, quantum computers will quickly solve ‘hidden subgroup problems’. Since all public-key systems currently rely on variations of these problems, they could, in theory, be broken by a quantum computer.

Cryptographers aren’t just giving up, however. They’re exploring replacements for the current systems, in two principal ways. One deploys quantum-resistant ciphers, which are ways to encrypt messages using current computers but without involving hidden subgroup problems. Thus they seem to be safe against code-breakers using quantum computers. The other idea is to make truly quantum ciphers. These would ‘fight quantum with quantum’, using the same quantum physics that could allow us to build quantum computers to protect against quantum-computational attacks. Progress is being made in both areas, but both require more research, which is currently being done at universities and other institutions around the world.

Yet some government agencies still want to restrict or control research into cryptographic security. They argue that if everyone in the world has strong cryptography, then terrorists, kidnappers and child pornographers will be able to make plans that law enforcement and national security personnel can’t penetrate.

But that’s not really true. What is true is that pretty much anyone can get hold of software that, when used properly, is secure against any publicly known attacks. The key here is ‘when used properly’. In reality, hardly any system is always used properly. And when terrorists or criminals use a system incorrectly even once, that can allow an experienced codebreaker working for the government to read all the messages sent with that system. Law enforcement and national security personnel can put those messages together with information gathered in other ways – surveillance, confidential informants, analysis of metadata and transmission characteristics, etc – and still have a potent tool against wrongdoers.

In his essay ‘A Few Words on Secret Writing’ (1841), Edgar Allan Poe wrote: ‘[I]t may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.’ In theory, he has been proven wrong: when executed properly under the proper conditions, techniques such as quantum cryptography are secure against any possible attack by Eve. In real-life situations, however, Poe was undoubtedly right. Every time an ‘unbreakable’ system has been put into actual use, some sort of unexpected mischance eventually has given Eve an opportunity to break it. Conversely, whenever it has seemed that Eve has irretrievably gained the upper hand, Alice and Bob have found a clever way to get back in the game. I am convinced of one thing: if society does not give ‘human ingenuity’ as much room to flourish as we can manage, we will all be poorer for it.

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption by Joshua Holden is out now through Princeton University Press.

 

This article is written by Joshua Holden & originally appeared in Aeon.

Total
0
Shares
Share
Tweet
Share
Share
Related Topics
  • Cryptography
  • Cybersecurity
  • Encryption
  • Quantum Cryptography
majulah

Previous Article
  • Cities
  • Society

Our Home, Above All – RSAF50

  • April 26, 2018
View Post
Next Article
  • Technology

Mathematical Model Reveals The Patterns Of How Innovations Arise

  • August 4, 2018
View Post
You May Also Like
Red Hat OpenShift
View Post
  • Artificial Intelligence
  • Technology

Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated

  • Dean Marc
  • April 21, 2026
View Post
  • Artificial Intelligence
  • Technology

Here’s how to get the $7 trillion AI hardware buildout right

  • dotlah.com
  • April 18, 2026
totus-technologies-cover
View Post
  • Business
  • Technology
  • World Events

The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative

  • Ackley Wyndam
  • April 16, 2026
View Post
  • Technology

Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026

  • Dean Marc
  • April 9, 2026
View Post
  • Artificial Intelligence
  • Technology

Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads

  • Dean Marc
  • March 17, 2026
View Post
  • Artificial Intelligence
  • Technology

U.S. Ski & Snowboard and Google Announce Collaboration to Build an AI-Based Athlete Performance Tool

  • Dean Marc
  • February 8, 2026
View Post
  • Artificial Intelligence
  • Technology

IBM to Support Missile Defense Agency SHIELD Contract

  • Dean Marc
  • February 5, 2026
Smartphone hero image
View Post
  • Gears
  • Technology

Zed Approves | Smartphones for Every Budget Range

  • Ackley Wyndam
  • January 29, 2026


Trending
  • 1
    • Cities
    • Lah!
    Singaporeans Remain Satisfied With Overall Public Cleanliness But Have A Greater Reliance On cleaning Services To Keep Singapore Clean
    • August 21, 2021
  • 2
    • Lah!
    • Technology
    NUS Researchers Develop AI-Powered Tool To Map Sustainable Roofs Globally
    • September 8, 2021
  • 3
    • Artificial Intelligence
    • People
    AI Meets Climate: MIT Energy And Climate Hack 2023
    • December 18, 2023
  • 4
    • Lah!
    • Technology
    Singtel Launches UNBOXED Lite 5G Experience Zones On Orchard Road
    • January 9, 2021
  • 00 - Holiday Deals 5
    • Gears
    Holiday Gifts! Christmas Gifts in this Merry Season Discounts.
    • December 9, 2024
  • 6
    • Cities
    • Lah!
    • Technology
    Smart Cities: World’s Best Don’t Just Adopt New Technology, They Make It Work For People
    • October 11, 2019
  • 7
    • Technology
    Updates to the Home experience elevate entertainment and bring more convenience 
    • June 10, 2024
  • 8
    • Lah!
    NEA Wins International Engineering Award For Singapore’s Semakau Landfill
    • November 28, 2019
  • 9
    • Lah!
    IMDA Awards 147 Industry Scholarships To Strengthen The Singaporean Core In Tech And Media Jobs
    • September 28, 2021
  • 10
    • Lah!
    Singapore and New Zealand Reaffirm Commitment to Deepen Defence Relations
    • November 14, 2019
  • 11
    • People
    Coronavirus Shopping Survey: 58 Million Americans Are Spending More Money While Social Distancing
    • May 8, 2020
  • mpa-singapore 12
    • Cities
    Joint Release By EDB, ESG, MPA And MOH: Measures Taken To Safeguard Health And Safety of Shore-Based Personnel In Maritime Sector
    • January 5, 2021
Trending
  • Red Hat OpenShift 1
    Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated
    • April 21, 2026
  • Illustration of data storage 2
    The Splinternet Comes for European Supply Chains Why Fragmentation Is Now a Boardroom Problem
    • April 21, 2026
  • 3
    Here’s how to get the $7 trillion AI hardware buildout right
    • April 18, 2026
  • totus-technologies-cover 4
    The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative
    • April 16, 2026
  • 5
    What will it take to get ships going through the Strait of Hormuz again?
    • April 13, 2026
  • 6
    Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026
    • April 9, 2026
  • 7
    3 lessons on the energy transition in an age of crisis
    • April 7, 2026
  • 8
    Samsung Unveils Galaxy A57 5G and Galaxy A37 5G, Packing Pro-Level Features at Awesome Price
    • March 25, 2026
  • 9
    The global price tag of war in the Middle East
    • March 24, 2026
  • 10
    Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads
    • March 17, 2026
Social Links
dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Connecting Dots Across Asia's Tech and Urban Landscape

Input your search keywords and press Enter.