IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Boffins find quantum cryptography loophole

Quantum cryptography, thought to be an almost impenetrable system for protection, is not completely secure, researchers have claimed.

Magnifying glass inspecting computer code

Vulnerabilities can be exploited in quantum cryptography, a method believed to have been close to flawless in terms of security, researchers have claimed.

Quantum cryptography uses the Heisenberg uncertainty principle that rules observation causes perturbation, meaning anyone who is trying to spy on a quantum key distribution system should be caught with ease.

However, the technology also requires no vulnerabilities to be present during implementation, just like with standard security products, and this is where systems could be exploited.

The loophole found by researchers, who sent their preliminary findings in a letter to Nature Photonics, involved using specially tailored bright illumination to effectively blind detectors in quantum key distribution systems.

This flaw could allow attackers to gain control over the detectors and get a perfect copy of the encryption key, without leaving any sign of a hack.

The team consisted of academics from the Norwegian University of Science and Technology (NTNU), the University of Erlangen-Nrnberg and the Max Planck Institute for the Science of Light.

They said the eavesdropping method was effective against both MagiQ Technology's QPN 5505 and ID Quantique Clavis2 quantum cryptography systems, both of which are commercially available.

ID Quantique has been working with NTNU on securing products and they will continue to collaborate on testing security aspects of the company's quantum cryptography solutions.

"Testing is a necessary step to validate a new security technology and the fact that this process is applied today to quantum cryptography is a sign of maturity for this technology," said Gregoire Ribordy, chief executive (CEO) of ID Quantique.

The researchers are working with other manufacturers to create countermeasures for identifying security holes.

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Most Popular

Why convenience is the biggest threat to your security

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Cyber attack on software supplier causes "major outage" across the NHS
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

8 Aug 2022