dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Social Links
  • zedreviews.com
  • citi.io
  • aster.cloud
  • liwaiwai.com
  • guzz.co.uk
  • atinatin.com
0 Likes
0 Followers
0 Subscribers
dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
  • Lah!
  • Technology

NUS Researchers Bring Attack-Proof Quantum Communication Two Steps Forward

  • July 9, 2021
Total
0
Shares
0
0
0

Assistant Professor Charles Lim (back) and Dr Zhang Gong (front) with their team’s first-of-its-kind quantum power limiter device.

Quantum key distribution (QKD) is a method for secure communication that uses quantum mechanics to encrypt information. While the security of QKD is unbreakable in principle, if it is incorrectly implemented, vital information could still be stolen by attackers. These are known as side-channel attacks, where the attackers exploit weaknesses in the setup of the information system to eavesdrop on the exchange of secret keys.

Researchers from the National University of Singapore (NUS) have developed two methods, one theoretical and one experimental, to ensure that QKD communications cannot be attacked in this way. The first is an ultra-secure cryptography protocol that can be deployed in any communication network that needs long-term security. The second is a first-of-its-kind device that defends QKD systems against bright light pulse attacks by creating a power threshold.

“Rapid advances in quantum computing and algorithmic research mean we can no longer take today’s toughest security software for granted. Our two new approaches hold promise to ensuring that the information systems which we use for banking, health and other critical infrastructure and data storage can hold up any potential future attacks,” said Assistant Professor Charles Lim, from the NUS Department of Electrical and Computer Engineering and Centre for Quantum Technologies, who led the two research projects.

Future-proof quantum communication protocol

Typically, in QKD, two measurement settings are used – one to generate the key and the other to test the integrity of the channel. In a paper published in the journal Nature Communications on 17 May 2021, the NUS team showed that with their new protocol, users can independently test the other party’s encryption device by generating a secret key from two randomly chosen key generation settings instead of one. The researchers demonstrated that introducing an extra set of key-generating measurements for the users makes it harder for the eavesdropper to steal information.

“It’s a simple variation of the original protocol that started this field, but it can only be tackled now thanks to significant developments in mathematical tools,” said Professor Valerio Scarani, who was one of the inventors of this type of method and is a co-author of the paper. He is from the NUS Department of Physics and Centre for Quantum Technologies.

Compared to the original ‘device-independent’ QKD protocol, the new protocol is easier to set up, and is more tolerant to noise and loss. It also gives users the highest level of security allowable by quantum communications and empowers them to independently verify their own key generation devices.

With the team’s setup, all information systems built with ‘device-independent’ QKD would be free from misconfiguration and mis-implementation. “Our method allows data to be safe against attackers even if they have unlimited quantum computing power. This approach could lead to a truly secure information system, eliminating all side-channel attacks and allowing end-users to monitor its implementation security easily and with confidence,” explained Asst Prof Lim.

A first-of-its-kind quantum power limiter device

Quantum cryptography, in practice, uses optical pulses with very low light intensity to exchange data over untrusted networks. Leveraging quantum effects can securely distribute secret keys, generate truly random numbers, and even create banknotes that are mathematically unforgeable.

However, experiments have shown that it is possible to inject bright light pulses into the quantum cryptosystem to break its security. This side-channel attack strategy exploits the way injected bright light is reflected to the outside environment, to reveal the secrets being kept in the quantum cryptosystem.

In a new paper published in PRX Quantum on 7 July 2021, the NUS researchers reported their development of the first optical device to address the issue. It is based on thermo-optical defocusing effects to limit the energy of the incoming light. The researchers use the fact that the energy of the bright light changes the refractive index of the transparent plastic material embedded in the device, thus it sends a fraction of the light out of the quantum channel. This enforces a power limiting threshold.

The NUS team’s power limiter can be seen as an optical equivalent of an electric fuse, except that it is reversible and does not burn when the energy threshold is breached. It is highly cost-effective, and can be easily manufactured with off-the-shelf components. It also does not require any power, so it can be easily added to any quantum cryptography system to strengthen its implementation security.

Asst Prof Lim added, “It is imperative to close the gap between the theory and practice of quantum secure communications if we are to use it for the future Quantum Internet. We do this holistically – on one hand, we design more practical quantum protocols, and on the other hand, we engineer quantum devices that conform closely with the mathematical models assumed by the protocols. In doing so, we can significantly narrow the gap.”

 

Total
0
Shares
Share
Tweet
Share
Share
Related Topics
  • National University of Singapore
  • NUS
  • NUS Department of Physics
  • QKD
  • Quantum Key Distribution
dotlah.com

Previous Article
  • Technology

Ransomware incidents, online scams, and COVID-19-related phishing activities dominated cyber landscape in 2020

  • July 9, 2021
View Post
Next Article
  • Cities
  • Lah!

Ascott Launches Discoverasr.com To Unify 14 Lodging Brands On One Global Online Travel Booking Platform

  • July 9, 2021
View Post
You May Also Like
Red Hat OpenShift
View Post
  • Artificial Intelligence
  • Technology

Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated

  • Dean Marc
  • April 21, 2026
View Post
  • Artificial Intelligence
  • Technology

Here’s how to get the $7 trillion AI hardware buildout right

  • dotlah.com
  • April 18, 2026
totus-technologies-cover
View Post
  • Business
  • Technology
  • World Events

The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative

  • Ackley Wyndam
  • April 16, 2026
View Post
  • Technology

Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026

  • Dean Marc
  • April 9, 2026
View Post
  • Artificial Intelligence
  • Technology

Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads

  • Dean Marc
  • March 17, 2026
View Post
  • Artificial Intelligence
  • Technology

U.S. Ski & Snowboard and Google Announce Collaboration to Build an AI-Based Athlete Performance Tool

  • Dean Marc
  • February 8, 2026
View Post
  • Artificial Intelligence
  • Technology

IBM to Support Missile Defense Agency SHIELD Contract

  • Dean Marc
  • February 5, 2026
Smartphone hero image
View Post
  • Gears
  • Technology

Zed Approves | Smartphones for Every Budget Range

  • Ackley Wyndam
  • January 29, 2026


Trending
  • 1
    • Cities
    • Technology
    Modern Security Solutions For Rapidly Growing Cities
    • January 21, 2020
  • 2
    • Lah!
    Asians Most Likely to Believe in Man-Made Climate Change
    • December 11, 2019
  • 3
    • Lah!
    UOB Asset Management Launches First Sustainable Bond Fund Focused On Impact Investing And Stable Income For Retail Investors
    • March 29, 2020
  • driving-jan-kronies-mpSeLIXMnpc-unsplash 4
    • Cities
    How To Drive Safely And Reduce Your Risk Of Accidents
    • March 19, 2021
  • 5
    • Science
    • Society
    An Indian Company Is Gearing Up To Make Millions Of Doses Of A $3 Covid-19 Vaccine
    • August 13, 2020
  • 6
    • Cities
    • People
    The Countries With The Highest Social Mobility
    • February 4, 2020
  • 7
    • Cities
    DBS Donates SGD 10.5 Million To Help Communities Hard Hit By Covid-19
    • April 19, 2020
  • 8
    • Technology
    Made By Google 2019: Here Are Google’s Biggest Product Announcements
    • October 16, 2019
  • 9
    • Lah!
    New Facility At Interest Rate Of 0.1% To Help Banks And Finance Companies Lower Cost Of Loans To SMEs
    • April 22, 2020
  • 10
    • Lah!
    • Technology
    ABB To Electrify Autonomous Vehicles For New Port In Singapore
    • October 15, 2019
  • 11
    • Science
    Physicists Design An Experiment To Pin Down The Origin Of The Elements
    • August 30, 2019
  • 12
    • Cities
    How Has The Pandemic Changed The Movement Of People Around The World?
    • June 17, 2020
Trending
  • Red Hat OpenShift 1
    Red Hat Further Drives Digital Sovereignty for the AI Era with Red Hat OpenShift on Google Cloud Dedicated
    • April 21, 2026
  • Illustration of data storage 2
    The Splinternet Comes for European Supply Chains Why Fragmentation Is Now a Boardroom Problem
    • April 21, 2026
  • 3
    Here’s how to get the $7 trillion AI hardware buildout right
    • April 18, 2026
  • totus-technologies-cover 4
    The Transatlantic Tech Rift and Why Data Sovereignty Is the New Industrial Imperative
    • April 16, 2026
  • 5
    What will it take to get ships going through the Strait of Hormuz again?
    • April 13, 2026
  • 6
    Hon Hai Technology Group (Foxconn) Recognized As Top 100 Global Innovators 2026
    • April 9, 2026
  • 7
    3 lessons on the energy transition in an age of crisis
    • April 7, 2026
  • 8
    Samsung Unveils Galaxy A57 5G and Galaxy A37 5G, Packing Pro-Level Features at Awesome Price
    • March 25, 2026
  • 9
    The global price tag of war in the Middle East
    • March 24, 2026
  • 10
    Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads
    • March 17, 2026
Social Links
dotlah! dotlah!
  • Cities
  • Technology
  • Business
  • Politics
  • Society
  • Science
  • About
Connecting Dots Across Asia's Tech and Urban Landscape

Input your search keywords and press Enter.