'Unbreakable' quantum cryptography hacked without detection using lasers
R.A. Hettinga
rah at shipwright.com
Sun Oct 5 12:41:10 PDT 2008
<http://www.tgdaily.com/index2.php?option=com_content&task=view&id=39599&pop=1&page=0&Itemid=108
>
TG Daily
'Unbreakable' quantum cryptography hacked without detection using lasers
Security
By Rick C. Hodgin
Friday, October 03, 2008 22:20
Oslo (Norway) - A Norwegian University of Science student named Vadim
Makarov has discovered a vulnerability in what was previously thought
to be unbreakable quantum encryption. He is using a form of high
intensity laser light to intercept the encrypted data stream covertly.
While quantum encryption is regularly used to secure Swiss bank
transactions, as well as their much publicized 2007 election results,
Makarov claims it's easily hacked. He claims to have developed a black
box device which he says, "turns the equipment into a puppet-box that
an eavesdropper can control."
Quantum encryption is a complex process wherein a stream of paired
photons are created at the source. Each has a specific and unique
quantum signature that can be detected. The sender and receiver both
obtain a secret key used to encrypt the message, without which the
message is lost. This form of encryption can be used to determine if
the message was intercepted en route. It won't tell who intercepted
it, only that it was intercepted. And this form of encryption is often
relied upon to insure privacy and security. And now it appears it may
all be for naught.
According to Makarov, the secret is in the way the sender and receiver
communicate their secret key. And it is exactly here where the exploit
can be found.
His team demonstrated that it is possible to allow the entire
transmission to go from sender to receiver without being altered or an
intrusion being detected. The intruder simply hooks into what the
receiver is receiving (which is actually very complex). Then, by
continuing to monitor the follow-on communications back and forth from
sender to receiver wherein the secret key is obtained, the intruder is
able to decode the transmission without ever having been detected.
Makarov and his colleagues say they have developed systems that can
defeat two out of the three primary forms of quantum encryption used
today. And their research is continuing on the third.
More information about the Testlist
mailing list