Revelations of the extent of government surveillance have thrown a spotlight on the security – or lack thereof – of our digital communications.
Even today’s encrypted data is vulnerable to technological progress. What privacy is ultimately possible? In the 27 March issue of Nature, the weekly international journal of science, researchers Artur Ekert and Renato Renner review what physics tells us about keeping our secrets secret.
In the history of secret communication, the most brilliant efforts of code-makers have been matched time and again by the ingenuity of code-breakers. Sometimes we can even see it coming. We already know that one of today’s most widely used encryption systems, RSA, will become insecure once a quantum computer is built.
But that story need not go on forever. “Recent developments in quantum cryptography show that privacy is possible under stunningly weak assumptions about the freedom of action we have and the trustworthiness of the devices we use,” says Ekert, Professor of Quantum Physics at the University of Oxford, UK, and Director of the Centre for Quantum Technologies at the National University of Singapore. He is also the Lee Kong Chian Centennial Professor at the National University of Singapore.
Over 20 years ago, Ekert and others independently proposed a way to use the quantum properties of particles of light to share a secret key for secure communication. The key is a random sequence of 1s and 0s, derived by making random choices about how to measure the particles (and some other steps), that is used to encrypt the message. In the Nature Perspective, he and Renner describe how quantum cryptography has since progressed to commercial prospect and into new theoretical territory.
Even though privacy is about randomness and trust, the most surprising recent finding is that we can communicate secretly even if we have very little trust in our cryptographic devices – imagine that you buy them from your enemy – and in our own abilities to make free choices – imagine that your enemy is also manipulating you. Given access to certain types of correlations, be they of quantum origin or otherwise, and having a little bit of free will, we can protect ourselves. What’s more, we can even protect ourselves against adversaries with superior technology that is unknown to us.
"As long as some of our choices are not completely predictable and therefore beyond the powers that be, we can keep our secrets secret," says Renner, Professor of Theoretical Physics at ETH Zurich, Switzerland. This arises from a mathematical discovery by Renner and his collaborator about 'randomness amplification': they found that a quantum trick can turn some types of slightly-random numbers into completely random numbers. Applied in cryptography, such methods can reinstate our abilities to make perfectly random choices and guarantee security even if we are partially manipulated.
“As well as there being exciting scientific developments in the past few years, the topic of cryptography has very much come out of the shadows. It’s not just spooks talking about this stuff now,” says Ekert, who has worked with and advised several companies and government agencies.
The semi-popular essay cites 68 works, from the writings of Edgar Allen Poe on cryptography in 1841, through the founding papers of quantum cryptography in 1984 and 1991, right up to a slew of results from 2013.
The authors conclude that “The days we stop worrying about untrustworthy or incompetent providers of cryptographic services may not be that far away”.
Senior Manager (Media Relations)
Office of Corporate Relations
National University of Singapore
DID: +65 6516 5399
Carolyn FONG | newswise
Hey robot, shimmy like a centipede
22.07.2016 | Kyoto University
New nanoscale technologies could revolutionize microscopes, study of disease
20.07.2016 | University of Missouri-Columbia
Munich Physicists have developed a novel electron microscope that can visualize electromagnetic fields oscillating at frequencies of billions of cycles per second.
Temporally varying electromagnetic fields are the driving force behind the whole of electronics. Their polarities can change at mind-bogglingly fast rates, and...
Breakup of continents with two speed: Continents initially stretch very slowly along the future splitting zone, but then move apart very quickly before the onset of rupture. The final speed can be up to 20 times faster than in the first, slow extension phase.phases
Present-day continents were shaped hundreds of millions of years ago as the supercontinent Pangaea broke apart. Derived from Pangaea’s main fragments Gondwana...
Scaffolding and specialised workers help with the delivery – Heidelberg biochemists gain new insights into biogenesis
A type of scaffolding on which specialised workers ply their trade helps in the manufacturing process of the two subunits from which the ribosome – the protein...
Scientists at the Helmholtz Zentrum München have developed a new mass spectrometry imaging method which, for the first time, makes it possible to analyze hundreds of metabolites in fixed tissue samples. Their findings, published in the journal Nature Protocols, explain the new access to metabolic information, which will offer previously unexploited potential for tissue-based research and molecular diagnostics.
In biomedical research, working with tissue samples is indispensable because it permits insights into the biological reality of patients, for example, in...
Chemists at the University of Basel have succeeded in using computer simulations to elucidate transient structures in proteins. In the journal Angewandte Chemie, the researchers set out how computer simulations of details at the atomic level can be used to understand proteins’ modes of action.
Using computational chemistry, it is possible to characterize the motion of individual atoms of a molecule. Today, the latest simulation techniques allow...
15.07.2016 | Event News
15.07.2016 | Event News
11.07.2016 | Event News
22.07.2016 | Information Technology
22.07.2016 | Physics and Astronomy
22.07.2016 | Life Sciences