{"id":717,"date":"2010-08-30T12:38:34","date_gmt":"2010-08-30T16:38:34","guid":{"rendered":"http:\/\/sciencebusiness.technewslit.com\/?p=717"},"modified":"2010-08-30T12:38:34","modified_gmt":"2010-08-30T16:38:34","slug":"collaboration-finds-cryptography-flaw-creates-countermeasure","status":"publish","type":"post","link":"https:\/\/technewslit.com\/sciencebusiness\/?p=717","title":{"rendered":"Collaboration Finds Cryptography Flaw, Creates Countermeasure"},"content":{"rendered":"<p>Two European universities, one research institute, and a computer security company developed a technique to exploit <a href=\"http:\/\/www.idquantique.com\/images\/stories\/PDF\/press-releases\/pr-international-collaboration.pdf\">imperfections in quantum cryptography systems<\/a>, then created a countermeasure for it.<\/p>\n<p>Quantum cryptography allows the distribution of a cryptographic key across an optical network, then applies the laws of quantum physics to guarantee its secrecy. The technique uses the Heisenberg uncertainty principle \u2013 observation causes disturbances \u2013 to reveal eavesdropping on an optical fiber. Based on this principle, detectors measure the relevant quantum property of single photons.<\/p>\n<p>Researchers at the Norwegian University of Science and Technology (NTNU) and the University of Erlangen-N\u00fcrnberg in Germany together with the Max Planck Institute for the Science of Light also in Germany developed and tested a technique exploiting imperfections in quantum cryptography systems to implement an attack. The technique allows hackers to remotely gain control of the photon detector to catch eavesdropping. One of the researchers noted, &#8220;Unlike previously published attempts, this attack is implementable with current off-the-shelf components.&#8221;<\/p>\n<p>The researchers published their findings yesterday in the online version of <a href=\"http:\/\/www.nature.com\/nphoton\/journal\/vaop\/ncurrent\/abs\/nphoton.2010.214.html\"><em>Nature Photonics<\/em><\/a>. Fortunately, the collaboration included Swiss computer security company <a href=\"http:\/\/www.idquantique.com\/\">ID Quantique SA<\/a>, which with NTNU developed a countermeasure for this technique before publication of the article. ID Quantique itself is a spin-off from the University of Geneva.<\/p>\n<figure id=\"attachment_720\" aria-describedby=\"caption-attachment-720\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2010\/08\/QuantHackResearchNTNU_300x200.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-720\" title=\"QuantHackResearchNTNU_300x200\" src=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2010\/08\/QuantHackResearchNTNU_300x200.jpg\" alt=\"Computer security researcher in the lab (NTNU)\" width=\"300\" height=\"200\" srcset=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2010\/08\/QuantHackResearchNTNU_300x200.jpg 300w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2010\/08\/QuantHackResearchNTNU_300x200-150x100.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-720\" class=\"wp-caption-text\">Ph.D. student Lars Lydersen at NTNU tests a commercial quantum cryptography system in the laboratory. (NTNU)<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Two European universities, one research institute, and a computer security company developed a technique to exploit imperfections in quantum cryptography systems, then created a countermeasure for it. Quantum cryptography allows the distribution of a cryptographic key across an optical network, then applies the laws of quantum physics to guarantee its secrecy. The technique uses the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[45,47,26],"class_list":["post-717","post","type-post","status-publish","format-standard","hentry","category-ventures","tag-europe","tag-physics","tag-university"],"_links":{"self":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=717"}],"version-history":[{"count":4,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/717\/revisions"}],"predecessor-version":[{"id":722,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/717\/revisions\/722"}],"wp:attachment":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}