Feeds

Uncrackable quantum crypto undermined by new attack

Bell test blinded by lasers

Remote control for virtualized desktops

Hopes of building an uncrackable cryptographic system using quantum mechanics have been called into question, after scientists devised a way to cheat a test used to detect secret keys that have been intercepted.

By blinding detectors with laser beams, the scientists were able to defeat what's known as the Bell test. In theory, the test is supposed to show when a quantum encryption key shared between two parties has been intercepted by an eavesdropper. In principle, it's impossible for a third party to tamper with it without disturbing its entanglement, a property that's measured by the Bell test.

“There have been some strong statements about quantum cryptography being robust against any attack,” an article in Nature quotes Christian Kurtsiefer, an expert of quantum optics at the Center for Quantum Technologies of the National University of Singapore, as saying. “But it isn't that simple.”

The attack works by shining a laser beam at a detector used by one of the parties sharing the key and intercepting some of its photons. The laser temporarily blinds the detector, allowing the attacker to register faked correlations. In theory, the Bell test should be able to recognize the counterfeit readings, but the difficulty of getting the test to work in practical settings requires scientists to discount a certain number of mismatches in the test results.

The findings appear in Physical Review Letters. ®

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?