. Military Space News .
CYBER WARS
Swedish researchers reveal security hole
by Staff Writers
Linkoping, Sweden (SPX) Dec 21, 2015


File image.

Quantum cryptography is considered a fully secure encryption method, but researchers from Linkoping University and Stockholm University have discovered that this is not always the case. They found that energy-time entanglement - the method that today forms the basis for many systems of quantum cryptography - is vulnerable to attack. The results of their research have been published in Science Advances.

"With this security hole, it's possible to eavesdrop on traffic without being detected. We discovered this in our theoretical calculations, and our colleagues in Stockholm were subsequently able to demonstrate it experimentally," says Jan-Ake Larsson, professor at Linkoping University's Division of Information Coding.

Quantum cryptography is considered a completely safe method for information transfer, and theoretically it should be impossible to crack.

Many research groups around the world are working to make quantum cryptography resistant to various types of disturbance, and so far it has been possible to handle the disturbance that has been detected. Quantum cryptography technology is commercially available, but there is much doubt as to whether it is actually used.

"It's mostly rumours, I haven't seen any system in use. But I know that some universities have test networks for secure data transfer," says Prof Larsson.

The energy-time entanglement technology for quantum encryption studied here is based on testing the connection at the same time as the encryption key is created. Two photons are sent out at exactly the same time in different directions.

At both ends of the connection is an interferometer where a small phase shift is added. This provides the interference that is used to compare similarities in the data from the two stations. If the photon stream is being eavesdropped there will be noise, and this can be revealed using a theorem from quantum mechanics - Bell's inequality.

On the other hand if the connection is secure and free from noise, you can use the remaining data, or photons, as an encryption key to protect your message.

What the LiU researchers Jan-Ake Larsson and his doctoral student Jonathan Jogenfors have revealed about energy-time entanglement is that if the photon source is replaced with a traditional light source, an eavesdropper can identify the key, the code string.

Consequently they can also read the message without detection. The security test, which is based on Bell's inequality, does not react - even though an attack is underway.

Physicists at Stockholm University have subsequently been able to demonstrate in practical experiments that it is perfectly possible to replace the light source and thus also eavesdrop on the message.

But this problem can also be solved.

"In the article we propose a number of countermeasures, from simple technical solutions to rebuilding the entire machine," said Jonathan Jogenfors.

The article has been published in Science Advances


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Linkoping University
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Congress passes long-stalled cybersecurity bill
Washington (AFP) Dec 18, 2015
Congress on Friday passed legislation to fight cyber threats, pushing the measure through by tucking it into a sprawling government funding bill, after earlier failed attempts. The measure was inserted into the massive $1.1 trillion spending package that funds the government through next September, tightens visa requirements, and ends a longstanding oil export ban, among other moves. Th ... read more


CYBER WARS
Aegis Ashore missile defense system goes online in Romania

Lockheed Martin receives $1.1 billion contract for PAC-3 missiles

Flight test proves ballistic missiles no match for latest Patriot upgrade

Israel successfully tests ballistic missile interceptor

CYBER WARS
Russian cruise missile crashes on building, no one hurt

Iran missile launch violated UN resolution: UN experts

Pakistan test-fires second missile in three days

U.S. Navy, Lockheed Martin conduct LRASM captive-carry flights

CYBER WARS
Soaring aspirations of Myanmar's drone enthusiasts

Using drones to study high-altitude glaciers

France places order for third Reaper UAV system

Drone laws tightened in Japan as police deploy air-to-air take down unit

CYBER WARS
General Dynamics to provide communications for USAFCENT in Asia

Pentagon to move forward with JSTARS recapitalization

U.S. Air Force awards Raytheon C-130 radio upgrade contract

L-3 Communications to sell National Security Solutions business to CACI

CYBER WARS
Lockheed Martin suing over lost combat vehicle contract

Oshkosh resumes JLTV work after Lockheed protest dismissed

U.S. Marine Corps to purchase Raytheon PERM munitions

Squad X takes steps toward assisting dismounted soldiers and marines

CYBER WARS
U.S. Army awards $1.05 billion D3I contract

Japan, Indonesia agree on defence technology transfer talks

Western arms makers see sales fall, Russia rises: SIPRI

Western arms makers see sales fall, Russia rises: SIPRI

CYBER WARS
Putin rules out reconciliation with Turkey

NATO, Ukraine officials sign defense cooperation agreement

Beijing slams 'provocative' US South China Sea flypast

Sri Lanka revives stalled Chinese-funded projects

CYBER WARS
Scientists blueprint tiny cellular 'nanomachine'

Nanoscale one-way-street for light

Microscope creates near-real-time videos of nanoscale processes

New industrial possibilities for nanoporous thin films









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.