Space Industry and Business News  
CYBER WARS
Computing a secret, unbreakable key
by Staff Writers
Waterloo, Canada (SPX) May 24, 2016


In practice, loss and noise in an implementation always leads to some disturbance, but a small amount of disturbance implies a small amount of information about the key is available to Eve.

What once took months by some of the world's leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo's Institute for Quantum Computing, paving the way for fast, secure quantum communication.

Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).

QKD allows two parties, Alice and Bob, to establish a shared secret key by exchanging photons. Photons behave according to the laws of quantum mechanics, and the laws state that you cannot measure a quantum object without disturbing it.

So if an eavesdropper, Eve, intercepts and measures the photons, she will cause a disturbance that is detectable by Alice and Bob. On the other hand, if there is no disturbance, Alice and Bob can guarantee the security of their shared key.

In practice, loss and noise in an implementation always leads to some disturbance, but a small amount of disturbance implies a small amount of information about the key is available to Eve.

Characterizing this amount of information allows Alice and Bob to remove it from Eve at the cost of the length of the resulting final key. The main theoretical problem in QKD is how to calculate the allowed length of this final secret key for any given protocol and the experimentally observed disturbance.

A mathematical approach was still needed to perform this difficult calculation. The researchers opted to take a numerical approach, and for practical reasons they transformed the key rate calculation to the dual optimization problem.

"We wanted to develop a program that would be fast and user-friendly. It also needs to work for any protocol," said Patrick Coles, an IQC postdoctoral fellow. "The dual optimization problem dramatically reduced the number of parameters and the computer does all the work."

The paper, Numerical approach for unstructured quantum key distribution, published in Nature Communications presents three findings. First, the researchers tested the software against previous results for known studied protocols.

Their results were in perfect agreement. They then studied protocols that had never been studied before. Finally, they developed a framework to inform users how to enter the data using a new protocol into the software.

"The exploration of QKD protocols so far concentrated on protocols that allowed tricks to perform the security analysis. The work by our group now frees us to explore protocols that are adapted to the technological capabilities" noted Norbert Lutkenhaus, a professor with IQC and the Department of Physics and Astronomy at the University of Waterloo.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Waterloo
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
China mulls new ways to control video websites
Beijing (AFP) May 23, 2016
Chinese authorities are exploring new ways of imposing controls on the Internet, state-run media cited experts as saying Monday, after reports said state-owned enterprises may be encouraged to take stakes in video streaming websites. The Communist country restricts access to foreign websites including Google, Facebook and Twitter with a vast control network dubbed the Great Firewall of Chin ... read more


CYBER WARS
Debris Alert: A Crack in the Window

A digital Rochester Cloak to fit all sizes

Combining nanotextures with Leidenfrost effect for water repellency

Printing metal in midair

CYBER WARS
Airbus Defence and Space opens a ground station in Australia for its Skynet military satellite

SpeedCast to build ground station for X-band Satcom Services in Asia-Pacific

Navy orders additional Digital Modular Radios

How the Marriage of Third Offset, Better Buying Power Affects Industry

CYBER WARS
Pre-launch processing is underway with Indonesia's BRIsat for the next Arianespace heavy-lift flight

Russia Spent $1.3Bln on Vostochny Cosmodrome So Far

New Antares Rocket Rolls Out at NASA Wallops

First work platforms powered tested in VAB for Space Launch System

CYBER WARS
Lockheed demos future evolution of its flexible GPS 3 satellite design

Payload integration begins for Arianespace's next Soyuz mission with Galileo spacecraft

Russia's Glonass system to get 8 more satellites by end of 2017

Galileo satellites fuelled for flight

CYBER WARS
Northrop Grumman gets KC-10 engine overhaul contract

Lockheed to refresh systems on German P-3C Orion aircraft

Sikorsky gets new order for U.S. Army Black Hawks

Saab rolls out its Gripen E 'Smart Fighter'

CYBER WARS
Ferrous chemistry in aqueous solution unravelled

Cobham announces new GaN-based solid state technology

Primitive quantum computer finds application

First single-enzyme method to produce quantum dots revealed

CYBER WARS
China Launches Yaogan-30 Remote Sensing Satellite

From petabytes to pictures

Astrosat welcomes the Copernicus Masters Challenge

Earth's magnetic heartbeat

CYBER WARS
Residents near Madrid return home as toxic tyre blaze under control

Floods and coastal erosion may expose contents of UK landfills, study finds

Thai villagers hail gold mine closure in rare environmental win

Mexico eyes anti-pollution measures for smoggy capital









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.