Feeds

Quantum crypto targeted in attack of the clones

Holy Grail of security further tarnished

Remote control for virtualized desktops

Japanese researchers have put another dent in Quantum cryptograpy's reputation as the final word in secure communications.

Transmissions sent using the technique are protected from eavesdroppers by the fundamental rules of quantum physics, at least in theory.

In practice, implementation weaknesses can leave a narrow door for attackers, and Japanese boffins have developed an idea for a quantum eavesdropping device that can exploit one such weakness.

Quantum cryptography is designed to allow users to exchange secret keys. The polarisation of individual light photons determines one bit of a key. The rules of quantum mechanics mean that any attempt to intercept this data irreversibly alters it.

Because of this effect, any attempt to eavesdrop a key would be detected as a unacceptably noisy communications path.

The loophole exploited by Japanese boffins is that it might be possible to make a partial copy of a quantum key without tripping an alert that a communications path has been compromised. This partial copy might be used in subsequent cryptoanalysis. The technique relies on constructing an optical cloning circuit and a measuring device, as explained in a paper by the researchers here (pdf).

Boffins led by Yuta Okubo at the University of Tskuba in Japan have not yet built a device that implements the approach. Nonetheless the research is a concern for banks and government agencies that bought quantum cryptography systems in the belief they were inherently secure.

The Japanese research follows an earlier study by boffins in Sweden examining another practical shortcoming with quantum cryptography systems. As previously reported, the weakness identified by the Swedish team involved shortcomings in how systems verify that the content of a message has not been altered in transit. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?