Posted in | News | Quantum Computing

Inexpensive, More Convenient System for Quantum-Secure Encryption

It's fairly reasonable to assume that an encrypted email can't be seen by prying eyes. That's because in order to break through most of the encryption systems we use on a day-to-day basis, unless you are the intended recipient, you'd need the answer to a mathematical problem that's nearly impossible for a computer to solve in a reasonable amount of time. 

Nearly impossible for modern-day computers, at least. 

"If quantum computing becomes a reality, however, some of those problems are not hard anymore," said Shantanu Chakrabartty, the Clifford W. Murphy Professor and vice dean for research and graduate education in the Preston M. Green Department of Electrical & Systems Engineering at the McKelvey School of Engineering.

Already these new computing paradigms are becoming a reality and could soon be deployable. Hackers are already preparing by storing encrypted transactions now with the expectation they can decipher the information later.

Chakrabartty's lab at Washington University in St. Louis proposes a security system that is not only resistant to quantum attacks, but is also inexpensive, more convenient, and scalable without the need for fancy new equipment. 

This research will appear in the IEEE Transactions of Information Forensics Science. It is available now on the IEEE Xplore early access portal.

Security is often managed today by key distribution systems in which one person sends information hidden behind a key, maybe a long string of seemingly unassociated numbers. The receiver of that information can access the information if they possess another specific key. The two keys are related in a mathematical way that is nearly impossible to guess, but can be easily solved with the right algorithm or using a quantum computer.

There have been potential solutions for securing data against a "quantum attack." Some technologies have been commercialized already. But they are computationally very expensive or require dedicated optical fibers or satellite links via lasers.

The new protocol for Symmetric Key Distribution, which Chakrabartty and Mustafizur Rahman, a PhD student in Chakrabartty's lab and first author on the research paper, refer to as SPoTKD, doesn't require lasers or satellites or miles of new cable. It relies on tiny microchips embedded with even tinier clocks that run without batteries.

The clocks are really electrons that seem to magically transport themselves between two locations on the chip using quantum tunneling; the "time" refers to the motion of the electrons. When the chips are created, their initial state is also recorded on a computer server.

If someone wants to create a secure channel, they note the time on a subset of the clocks and send that information to the server, which can use its knowledge of the initial state to determine what time the clocks read at the time they were sent. The server lets the person know what the times were and, if correct, a secure channel of communication has been opened.

The quantum nature of the electrons' transport adds some extra layers of security; if they are measured, the clock collapses. It will disappear forever and neither a spy nor the recipient can access the information.

And, as Chakrabartty has shown in the past, these kinds of systems can also power themselves for extended periods of time with the slightest energy input at the outset, thanks to the properties of quantum tunneling. This is another security advantage of his SPoTKD: it doesn't rely on outside energy to power it. 

"A big vulnerability would be if you could tap into the power source," Chakrabartty said. "You would be able to monitor the fluctuations in power consumption to get secret information."

Chakrabartty is working on some additional features for these chips, including the ability to self-destruct after a specified period of time. A provisional US patent for the technology has been filed by the Office of Technology Management.

Ultimately, SPoTKD could be used to make sure medical records are destroyed after being read by a doctor, or to enforce time limits on software licenses. They can secure voting records or validate NFTs or just make sure no one is reading your email.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.