Mobile phones, meet uncrackable quantum cryptography

Researchers claim to have developed a way to bring photon-bending quantum cryptography to mobile phones
  • Ian Paul (TechHive (US))
  • — 29 August, 2013 16:58

There may soon come a time when nearly uncrackable secret information can be beamed straight to your smartphone. No, we're not talking about handsets loaded with GPG keys or two-factor authentication apps, but the waaaaaay far out ideas behind quantum cryptography, the incredibly secure communication technology capable of locking down messages far more tightly than Lavabit ever could.

After years of being relegated to optics labs alone, researchers at the University of Bristol say they have developed a way to send quantum cryptographic information to handheld devices from a central server.

Currently, quantum cryptography is a major pain. To use it, two people needed perfectly aligned computers capable of controlling and modifying individual light particles (photons), according to MIT Technology Review. Similar to the way conventional crypto works now, the light particles transmit a key that the other side has to decrypt. If the two machines are poorly aligned or the light particles are significantly changed as they are sent between each party, the cryptography won't work.

The team at the University of Bristol, however, says quantum cryptography doesn't have to be that difficult. Instead of trading perfectly honed light particles with some serious high-tech gear, only one side needs to do all the heavy lifting to exchange encryption keys.

From Technology Review:

In the new technique, only one of the parties, Alice say, needs to have the quantum optics gear such as a source of photons and so on. Alice creates the photons and then sends them down an ordinary optical fibre to Bob, the other party.

Bob, merely modifies the photons to encode them with information before sending them back to Alice. This dramatically simplifies the equipment Bob requires, allowing it to fit in a handheld device .

Mind-bending tech

Unlike conventional cryptography, where key pairs are created through complex mathematical problems, quantum crypto relies on Heisenberg's Uncertainty Principle, the foundation of quantum mechanics. The uncertainty principle holds that the mere act of observing a particle changes it.

"Quantum encryption works because if anyone tries to intercept the encrypted secret, the mere act of viewing the secret will change the secret," InfoWorld's Roger Grimes recently reported. "Not only does the invader fail to obtain the secret, but authorized people will know that someone tried to tamper with their secret."

That sounds like a pretty awesome way to keep data secret that could even keep the NSA from snooping on you, but quantum cryptography in everyday life is likely still years away. Until this mind-bending tech goes mainstream, anyone wanting to keep their data or hard drive secure is better off learning how to use the best encryption tools currently available, such as GPG and TrueCrypt.

Tags: popular science, science, consumer electronics, security, Lavabit, smartphones

Near field communication – the security risks

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Security for Endpoints

Think your endpoints are secure? Think again. Learn why Trend Micro can help.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.