dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Social Links
  • zedreviews.com
  • citi.io
  • aster.cloud
  • liwaiwai.com
  • guzz.co.uk
  • atinatin.com
0 Likes
0 Followers
0 Subscribers
dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
  • Technology

Quantum – A Double-Edged Sword For Cryptography

  • August 28, 2019
Total
0
Shares
0
0
0

Defence, finance, social networking – communications everywhere rely on cryptographic security. Cryptography involves jumbling up messages according to a code, or key, that has too many combinations for even very powerful computers to try out.

Cryptography that would be impossible for a regular computer to crack, would take a quantum computer just seconds. Image credit – Pixabay/ joffi, licensed under pixabay license

But quantum computers have an advantage. Unlike regular computers, which process information in ‘bits’ of definite ones and zeros, quantum computers process information in ‘qubits’, the states of which remain uncertain until the final calculation.

The result is that a quantum computer can effectively try out many different keys in parallel. Cryptography that would be impenetrable to regular computers could take a quantum computer mere seconds to crack.

Practical quantum computers that can be used to break encryption are expected to be years, if not decades, away. But that should not be of any reassurance: even if a hacker cannot decipher confidential information now, they could save it and simply wait until a quantum computer is available.

‘The problem already exists,’ said Professor Valerio Pruneri of the Institute of Photonic Sciences in Barcelona, Spain, and the coordinator of a quantum security project called CiViQ. ‘A hacker can take what is stored now, and break its key at a later date.’

The answer, says Prof. Pruneri, is another quantum technology. Known as quantum key distribution (QKD), it is a set of rules for encrypting information – known as a cryptography protocol – that is almost impossible to crack, even by quantum computers.

Eavesdrop

QKD involves two parties sharing a random quantum key, according to which some separate information is encoded. Because in quantum theory it is impossible to observe something without corrupting it, the two parties will know whether someone else has eavesdropped on the key – and therefore whether it is safe, or not, to share their coded information.

Until now, QKD has usually involved specialist technology, such as single-photon detectors and emitters, which are difficult for people outside labs to implement. In the CiViQ project, however, Prof. Pruneri and his team are developing a variant of QKD that works with conventional telecommunications technology.

They have already created prototypes, and performed some field demonstrations. Now, the researchers are working with industry telecoms clients including Telefónica in Spain, Orange in France and Deutsche Telekom in Germany to create systems that work to their respective requirements, with the hope that the first systems could be online within three years.

Prof. Pruneri’s hope is to create highly secure communication systems up to 100 km in size suitable for governmental, finance, medical and other high-risk sectors within cities. It could even be used by everyday consumers, although Prof. Pruneri says that QKD currently reaches shorter distances and lower speed than regular communication.

Random

Like normal cryptography, QKD needs random keys – strings of numbers – to be generated in the first place. The more random these keys are, the greater the security of the system, as there is less chance of the keys being guessed. But the problem is that the numbers generated with traditional methods often aren’t totally random.

Here, quantum mechanics can again come to the rescue. The behaviour of atoms, photons and electrons is believed to be truly random and this can be used as a way of generating numbers that cannot be predicted.

Professor Hugo Zbinden of the University of Geneva in Switzerland said: ‘Quantum random-number generators profit from the intrinsic randomness of quantum physics, whereas classical true random number generators are based on chaotic systems, which are deterministic and, in theory, to some extent predictable.’

​’Quantum computers threaten classical cryptography.’
Hugo Zbinden, University of Geneva, Switzerland

Quantum random-number generators already exist, but to​ make them more widely applicable Prof. Zbinden and his colleagues working on a project called QRANGE are improving their speed and reliability, as well as reducing their cost. Currently, they are trying to develop prototypes with a ‘high technology readiness level’ – in other words, prototypes that demonstrate that the technology is ripe for use in the real world.

The work is an important step in ensuring that, while being a threat to the security of our current communications, quantum approaches also provide a path to more secure systems.

​‘Quantum computers threaten classical cryptography,’ says Prof. Zbinden. ‘Quantum cryptography can be a solution, (but) it needs high-quality random numbers.’

 

The research in this article was funded by the EU. If you liked this article, please consider sharing it on social media.

This post Quantum – a double-edged sword for cryptography was originally published on Horizon: the EU Research & Innovation magazine | European Commission.

Total
0
Shares
Share
Tweet
Share
Share
Related Topics
  • Cryptography
  • Quantum Computers
  • Quantum Cryptography
majulah

Previous Article
  • Lah!

Singapore Grants AI Patent to Alibaba in Record Time, Launches New Initiative to Grow ASEAN’S Industry 4.0

  • August 28, 2019
View Post
Next Article
  • Technology

How Cheap Must Batteries Get For Renewables To Compete With Fossil Fuels?

  • August 28, 2019
View Post
You May Also Like
Red Hat OpenShift
View Post
  • Artificial Intelligence
  • Technology

Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated

  • Dean Marc
  • April 21, 2026
View Post
  • Artificial Intelligence
  • Technology

Here’s how to get the $7 trillion AI hardware buildout right

  • dotlah.com
  • April 18, 2026
totus-technologies-cover
View Post
  • Business
  • Technology
  • World Events

The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative

  • Ackley Wyndam
  • April 16, 2026
View Post
  • Technology

Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026

  • Dean Marc
  • April 9, 2026
View Post
  • Artificial Intelligence
  • Technology

Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads

  • Dean Marc
  • March 17, 2026
View Post
  • Artificial Intelligence
  • Technology

U.S. Ski & Snowboard and Google Announce Collaboration to Build an AI-Based Athlete Performance Tool

  • Dean Marc
  • February 8, 2026
View Post
  • Artificial Intelligence
  • Technology

IBM to Support Missile Defense Agency SHIELD Contract

  • Dean Marc
  • February 5, 2026
Smartphone hero image
View Post
  • Gears
  • Technology

Zed Approves | Smartphones for Every Budget Range

  • Ackley Wyndam
  • January 29, 2026


Trending
  • 1
    • Technology
    Huawei Cloud & AI Innovations Lab Launch In Singapore
    • April 26, 2019
  • 2
    • Society
    False Information Fuels Fear During Disease Outbreaks: There Is An Antidote
    • February 13, 2020
  • 3
    • People
    Widespread Lack Of Holocaust Knowledge In The U.S.
    • September 18, 2020
  • 4
    • Cities
    NParks Completes Phase One Of The Round Island Route With 75km Of Recreational Connection Stretching Across Eastern Half Of Singapore
    • February 23, 2022
  • 5
    • Climate Change
    • People
    How We Can Identify Climate-Vulnerable Neighbourhoods And Protect Inhabitants
    • January 27, 2024
  • 6
    • Science
    • Technology
    NUS Researchers Use “Automated” Microscopy To Identify Predictor Of Chemotherapy Resistance In Ovarian Cancer Patients
    • May 29, 2021
  • mothers-day-ijaz-rafi-xLA0XpFpe0U-unsplash 7
    • Features
    • People
    Celebrating Mother’s Day with Love and Simplicity: Budget-Friendly Ideas to Cherish Mom
    • May 14, 2023
  • 8
    • Gears
    • Technology
    Meet Samsung Galaxy Tab S11 Series: Packing Everything You Expect From a Premium Tablet
    • September 4, 2025
  • 9
    • Cities
    • Society
    Coronavirus: A Pandemic In The Age Of Inequality
    • March 19, 2020
  • 10
    • Cities
    Tips For Moving To An Expensive New City
    • July 10, 2020
  • 11
    • Technology
    Carbon-Neutral Fuel Made From Sunlight And Air
    • July 8, 2019
  • 12
    • Lah!
    Singapore Media Festival 2019 Kicks Off With Local Premiere Of Anthony Chen’s Wet Season
    • November 22, 2019
Trending
  • Red Hat OpenShift 1
    Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated
    • April 21, 2026
  • Illustration of data storage 2
    The Splinternet Comes for European Supply Chains Why Fragmentation Is Now a Boardroom Problem
    • April 21, 2026
  • 3
    Here’s how to get the $7 trillion AI hardware buildout right
    • April 18, 2026
  • totus-technologies-cover 4
    The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative
    • April 16, 2026
  • 5
    What will it take to get ships going through the Strait of Hormuz again?
    • April 13, 2026
  • 6
    Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026
    • April 9, 2026
  • 7
    3 lessons on the energy transition in an age of crisis
    • April 7, 2026
  • 8
    Samsung Unveils Galaxy A57 5G and Galaxy A37 5G, Packing Pro-Level Features at Awesome Price
    • March 25, 2026
  • 9
    The global price tag of war in the Middle East
    • March 24, 2026
  • 10
    Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads
    • March 17, 2026
Social Links
dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Connecting Dots Across Asia's Tech and Urban Landscape

Input your search keywords and press Enter.