Quantum cryptography/encryption
Quantum cryptography is rightfully considered a new round in the evolution of information protection. It is she who allows you to create almost absolute protection of encrypted data from hacking.
Main article: Cryptography
The technology of quantum distribution of cryptographic keys solves one of the main problems of cryptography - the distribution of keys guaranteed at the level of fundamental laws of nature between remote users over open communication channels. A cryptographic key is a numerical sequence of a certain length created to encrypt information. Quantum cryptography allows for constant and automatic key changes when each message is transmitted in a one-time "cipher pad" mode: today it is the only type of encryption with strictly proven cryptographic resistance.
Quantum computers can decrypt regular encryption keys - quantum cryptography is needed
Asymmetric cryptography is based on two keys: one can encrypt data, the other is used to decrypt it. In theory, quantum computers will be able to solve problems much faster than conventional computers and will be able to decrypt private keys. Given the pace of development of quantum computing, this can happen in 5-10 years.
With the advent of quantum computers, the traditional enciphering will cease to be effective. This means that all valuable information that is transmitted in encrypted form will suffer, banking transactions will be at risk, cryptocurrency and attackers will be able to access critical energy facilities from anywhere in the world, etc. This problem will affect not only the intelligence community and experts in the field, cyber security but also social platforms and, messengers such as, WhatsApp using keys to authorize users[1]
How quantum cryptography works
Bennett algorithm
In 1991, Bennett began using the following algorithm to record changes in data transmitted using quantum transformations:
- The sender and receiver negotiate an arbitrary rearrangement of bits in the strings to make the error positions random.
- Lines are divided into blocks of size k (k is chosen so that the probability of error in the block is small).
- For each block, the sender and receiver calculate and openly notify each other of the obtained results. The last bit of each block is deleted.
- For each block where parity is different, the receiver and sender iteratively search and correct for incorrect bits.
- To eliminate multiple errors that may not be noticed, the operations of the preceding claims are repeated for a larger value of k.
- In order to determine whether or not undetected errors remain, the receiver and sender repeat the pseudo-random checks, namely, the receiver and sender openly announce the random mixing of half-bit positions in their lines; the receiver and the sender openly compare the parity (if the rows are different, the parity should not be the same as the probability of 1/2); if there is a difference, the receiver and sender uses binary search and deletion of incorrect bits.
- If there are no differences, after m iterations, the receiver and sender receive identical lines with an error probability of 2-m.
Scheme of implementation of quantum cryptography
The scheme of practical implementation of quantum cryptography is shown in the figure. The transmitting side is on the left and the receiving side is on the right. Pockel cells are necessary for pulse variation of the quantum flux polarization by the transmitter and for analysis of polarization pulses by the receiver. The transmitter may form one of four polarization states. The transmitted data is transmitted as control signals to these cells. Fiber may be used as data transmission channel. A laser can also be used as a primary light source.
On the receiving side after the Pockel cell, a calcite prism is installed, which splits the beam into two photodetectors (PEDs) measuring two orthogonal polarization components. When generating transmitted pulses of quanta, there is a problem of their intensity, which must be solved. If the quanta in pulse 1000, there is a possibility that 100 quanta along the way will be diverted by the attacker to his receiver. Subsequently, by analyzing open negotiations between the transmitting and receiving parties, he can get the information he needs. Therefore, ideally, the number of quanta in a pulse should be about one. In this case, any attempt to remove part of the quanta by an attacker will lead to a significant change in the entire system as a whole and, as a result, an increase in the number of errors from the receiving party. In such a situation, the received data must be discarded and the transmission attempt repeated. But, making the channel more resistant to interception, specialists are faced with the problem of "dark" noise (receiving a signal that was not sent by the transmitting side, the receiving side) of the receiver, the sensitivity of which is increased to the maximum. In order to provide reliable data transmission, certain state sequences capable of correcting single and even multiple errors may correspond to logical zero and one.
A further increase in the fault tolerance of a quantum cryptosystem can be achieved using the EPR effect that occurs when a spherically symmetric atom emits two photons in opposite directions towards two observers. Photons are emitted with undefined polarization, but due to the symmetry of their polarization, they are always opposite. An important feature of this effect is that photon polarization becomes known only after measurement. Eckert proposed a cryptographic scheme based on the EPR effect, which guarantees the security of key transfer and storage. The sender generates a number of EPR photon pairs. He leaves one photon from each pair for himself, the second sends to his partner. In this case, if the registration efficiency is close to one, when the sender receives the polarization value 1, his partner will register the value 0 and vice versa. Thus, partners can obtain identical pseudo-random code sequences whenever desired. Practically, the implementation of this scheme is problematic due to the low efficiency of detecting and measuring the polarization of a single photon.
History
2024
Creating a protocol to protect communications from quantum attacks
In early November 2024 China , they announced a "quantum-resistant" protocol to protect communications from modern ones. cyber attacks This protocol will help government agencies around the world protect themselves in the event that an attacker tries to use quantum computers to hack traditional methods. enciphering
Although the large-scale introduction of more powerful quantum computers is still a matter for the future, scientists do not exclude the possibility that advanced technologies can be used to hack modern cryptographic systems. Therefore, experts intend to develop a quantum-resistant system that can withstand such cyber attacks. The project, presented at a specialized event in Sweden, was unanimously approved by all participants, and Chinese scientists will lead a global initiative to develop a "quantum-sustainable" protocol.
ChinaThe United States is also working on this problem, and the National Institute of Standards and Cryptography (NIST) has already published three standards for post-quantum cryptography algorithms. It is assumed that these standards can be used to "protect a wide range of electronic information: from confidential e-mail messages to e-commerce transactions." According to a NIST press release, these algorithms, which were the result of eight years of work by researchers, are already ready for use.
Quantum computing technology can help us solve many complex problems, and the new NIST standards should ensure that these innovations do not violate existing security systems, said Deputy Secretary of Commerce for Standards and Technology and NIST Director Lori E. Locasio. - These standards are the cornerstone of NIST's work to protect the privacy of electronic information.[2] |
Presented Russian solution for quantum protection of mobile communications
Micron, a Russian manufacturer of microelectronics (part of the Element, ELMT group of companies), a resident of the Technopolice Moscow SEZ, together with QRate and the Moscow Institute of Physics and Technology (MIPT), with the support of the Center for Research and Development JSC (CRC), developed a prototype of a software and hardware complex (PAC) that allows the use of quantum key distribution (KPC) technology in any user devices. This was announced on September 13, 2024 to the TAdviser portal by representatives of Micron. Read more here.
Asia's first commercial communications network with quantum protection launched
On August 8, 2024, Singapore-based telecommunications company Singtel announced the launch of Southeast Asia's first commercial communications network with quantum protection technology. The National Quantum-Safe Network Plus (NQSN +) system is designed to protect enterprises from quantum threats. Detailed here
In Tomsk, launched the production of software and hardware complexes of quantum key distribution
Tomsk company "ProQuantum" launched the first stage of production of software and hardware complexes of quantum key distribution - information security tools. The opening ceremony took place at the end of May 2024, the press service of the company reports. Read more here.
2023
In St. Petersburg, created a reliable encryption system on new principles
At the end of December 2023, Russian researchers from the St. Petersburg State Electrotechnical University "LETI" announced the development of a specialized random sequence generator for encryption. The domestic cryptographic system is based on the principles of radiophotonics and optics. Read more here.
Russian scientists have established a channel with quantum protection between Russia and China using a satellite
A team of scientists from MISIS University, the Russian Quantum Center (RCC) and KuSpace Technologies conducted a joint experiment on the transmission of messages protected by quantum cryptography between Russia and China. MISIS announced this on December 1, 2023.
To transfer the key for enciphering a distance of more than 3500 km, a unique quantum satellite communications "" Mo-tszy developed by scientists was used. PEOPLE'S REPUBLIC OF CHINA The ground station created by Russian specialists Zvenigorod in made it possible to exchange encoded images measuring 256 x 64 pixels with a ground station in Nanshan. The demonstration satellite of quantum communications technology on an international scale not only strengthens Russia's position in the quantum race, but also opens a practical path to the introduction of technologies. data protection
In the world of digital communications, one of the obvious needs is to protect information so that attackers do not gain access to transmitted data. This is important, for example, when we pass on our credit card details when buying online. When a powerful quantum computer appears, these algorithms will be hacked. If a classic supercomputer would require millions of years of computing to attack, then a quantum one would take twenty hours. If nothing is done, then this will lead to the collapse of the information transmission system: the volume of information transmitted annually grows by about 30%.
Traditional cryptography uses mathematical algorithms to protect information, quantum is based on physics. If the information is encoded into single quanta, then it cannot be read unnoticed. This makes it possible to transfer cryptographic keys. A serious limitation for such an infrastructure is the need to install intermediate trusted nodes due to the attenuation of the optical signal in the fiber over which the photons are transmitted. Although such systems have already been created between Moscow and St. Petersburg. In China, there is a quantum network with a length of 4600 km, which is used by banks and companies.
To solve the problem of quantum communications between different continents, Chinese scientists began working with the Mo Tzu satellite in 2016. For example, they have already shown quantum video conferencing protection between Beijing and Vienna. A team of Russian scientists from NUST MISIS, the Russian Quantum Center (RCC), KuSpace Technologies and, together with colleagues, began working with the Mo-Tzu satellite in 2019. Over the years, a number of experiments have been carried out that have realized the quantum distribution of keys between two points at a distance of 3800 km: between ground stations in Zvenigorod and Nanshan. The Russian side encoded the dictum of the philosopher Mo-Tzu "Reason is an understanding of the essence of things," in response, Chinese colleagues sent the definition of the density operator of the mixed quantum state, first introduced by Lev Landau.
The method of distributing quantum keys over fiber has limitations: the flow of light particles loses its energy by being absorbed into the fiber, and after a couple of hundred kilometers, the signal becomes so weak that it cannot be distinguished from noise. It is worth noting that such a quantum signal cannot be silently amplified during the distribution process. In this context, the transmission of keys via satellite in open outer space, where there is nothing that can substantially absorb or scatter light, represents a significant advantage and allows keys to be transmitted anywhere in the earth more efficiently than via fiber, "said co-author of the study, RCC Associate Researcher Alexander Khmelev. |
The receiving ground station in Zvenigorod - the only one in Russia for December 2023 - was created by Russian scientists on the basis of a telescope located on the territory of the Zvenigorod Observatory of the Institute of Astronomy of the Russian Academy of Sciences.
Through the efforts of a large collaboration of scientists and engineers, a receiving station was created that allows stable communication sessions with the satellite, as well as decoding the polarization states of single photons sent by the spacecraft. Satellite quantum cryptography opens up fundamentally new opportunities for protecting data of objects located at a great distance, for example, between remote mineral deposits or for communication of icebreakers, - said Alexey Fedorov, director of the Institute of Physics and Quantum Engineering NUST MISIS, head of the scientific group "Quantum Information Technologies" RCC. |
In their study, the scientists further examined possible vulnerabilities arising in quantum communications at a practical level. In theory, quantum cryptography allows you to achieve the resistance of protection that is guaranteed by the laws of physics. In practice, certain difficulties arise, in particular, devices for receiving single photons can work in different ways, which opens up opportunities for attack. In the experiment conducted, this loophole was eliminated. The study was supported by the strategic project of NUST MISIS "Quantum Internet" under the program of the Ministry of Education and Science of Russia "Priority 2030." The results obtained will allow in the future to become closer to the creation of high-speed quantum-protected satellite communication systems in Russia.
MISIS scientists have proposed a noise assessment method that will increase the security of quantum cryptography systems
Scientists at the NTI Center for Competence "Quantum Communications" NUST MISIS have proposed an approach to assessing the levels of classical and quantum noise in a quantum random number generator, which should increase the level of security of quantum cryptography devices. The theoretical and experimental methods described in the study make it possible to filter out classical and quantum noise, eliminating the possibility of external interference in the process of generating random sequences, thereby increasing the reliability of the quantum random number generator. This was announced on September 20, 2023 by representatives of NUST MISIS.
Cryptography is the science of methods of encrypting confidential information for subsequent transmission over open communication channels. Message encryption is carried out using so-called cryptographic keys. In the case of symmetric encryption, one key is used, which must first be distributed among the "subscribers." But the most famous are asymmetric encryption methods, which use two keys: public and private. The private key is stored by the recipient, and the public key is sent via a regular information channel. Decrypting messages requires knowledge of both keys.
A quantum computer can crack most cryptographic systems that use asymmetric encryption, so scientists are actively developing and implementing quantum cryptography techniques that use the principles of quantum mechanics. These systems provide secure distribution of the private key between subscribers.
Typically, a quantum key is distributed over an optical channel using single photons or attenuated laser pulses. According to the laws of quantum mechanics, it is impossible to discreetly intercept single quanta of light, so any attempt to find out the secret key will be detected. After the key is distributed among the participants in the cryptographic system, they can use traditional symmetric encryption methods that are resistant to hacking by a quantum computer.
An important element of the quantum key distribution system is the quantum random number generator. When trying to find out the quantum key, an attacker can attack this element of the system. To increase the protection of the device, scientists from the NTI "Quantum Communications" Competence Center NUST MISIS presented theoretical and experimental methods for assessing random phase changes in a semiconductor laser, which is one of the most common sources of quantum randomness in random number generators.
We have developed a method that allows us to evaluate the contributions of classical and quantum noise to the interference of laser pulses in the presence of phase correlations. We also proposed a simple experimental method based on the analysis of the so-called "statistical interference bands," which allows you to obtain detailed information about the probabilistic properties of laser radiation, told the head of the laboratory of the element base of quantum communications NITU MISIS Roman Shakhova.
|
It turned out that even with random phase changes (phase drift) in the optical circuit, laser pulse interference (a phenomenon that occurs when two or more waves meet each other) still retained its quantum properties. This approach allows us to obtain more detailed information about the probabilistic properties of laser pulses and thereby increase the reliability of quantum random number generators and, as a result, quantum key distribution systems. At the moment, scientists are investigating the effect of external illumination on the randomness of interference in order to increase the security of quantum cryptography devices.
New synchronization algorithms for optical communication systems with quantum key distribution tested in Russia
Scientists and engineers of JSC Mostkom"," MTUSI KuRaith and joined forces to develop the optimal concept of a quantum communication system in the atmosphere and, space which is based on a modular approach, which allows with minimal costs to offer a competitive solution to the market for the implementation of high-speed protected communications in the atmosphere. MTUSI announced this on August 1, 2023. Read more here.
Rostelecom and Atlas tested quantum key distribution technology on the TEA NEXT backbone
Rostelecom, together with Atlas, has completed tests of quantum key distribution (KRK) technology and associated encryptors on the infrastructure of the first stage of the Novaya TransEurAsian Communication Line (TEA NEXT) trunk fiber-optic communication line (FOCL). Rostelecom announced this on July 11, 2023. Read more here.
MTUSI examines the effect of strong electromagnetic fields on quantum communication
MTUSI examines the effect of strong electromagnetic fields on quantum coupling. The university announced this on May 29, 2023.
Quantum communication is known to be one of the most promising ways to protect information. Quantum key distribution (KPC) allows you to ensure absolute reliability and security of information transmission, regardless of the technical capabilities of attackers.
It has been proven that the discrete variable CRC allows the physical layer to guarantee the confidentiality of the transmitted message, since the attacker's attempt to intercept information can be detected, in which case the secret key is not transmitted. However, as early as May 2023, there are quantum hackers who, due to the use of imperfections in the implementation of hardware systems, CRK can imperceptibly intercept messages transmitted over a quantum channel. To eliminate this possibility, there is a constant search for weak points in quantum communication equipment, and the manufacturer eliminates these defects.
Earlier, researchers from MTUSI noted that atmospheric discharges lead to distortion of information signals transmitted via optical cable, so there are additional losses in optical communication lines, which can be used by attackers (quantum hackers).
For example, the strong magnetic and electric fields generated by lightning discharge change the polarization of the pulse of radiation propagating through the optical fiber (Faraday effect and Kerr effect). The impact of these effects is being comprehensively investigated by MTUSI and MPEI scientists on an artificial lightning plant.
MTUSI scientists recorded the parameters of electromagnetic fields, in which in experiments with artificial lightning there are noticeable distortions of signals transmitted via an optical fiber, and modeled them in the laboratory of the Department of Metrology, Standardization and Measurements in Telecommunications MTUSI. After that, employees of the Department "Guiding Telecommunication Environments" and the National Research Institute "Quantum Center" investigated the influence of these electromagnetic fields on the equipment for quantum distribution of fiber, or rather on the optical cable connecting the Alice and Bob blocks developed by the Russian company.
As a result of the tests, it was found that the specific implementation of the RCC used in the tested domestic equipment was resistant to the effects of a strong electromagnetic field, despite the fact that noticeable distortions of transmitted signals were recorded on other telecommunication equipment.
At the end of May 2023, MTUSI scientists are finalizing experimental stands in order to conduct more comprehensive studies of the possibility of manipulating transmitted information when electromagnetic fields affect an optical fiber in order to identify any such attempts and reduce their effect on the quality and safety of quantum communications.
The development of experimental benches and methods, which are carried out at MTUSI within the framework of the research and development project "The Influence of Atmospheric Discharges on Optical and Quantum Telecommunication Systems," will further check the stability of the operation of telecommunication equipment of quantum communications under the influence of atmospheric discharges on the optical cable and the possibility of detecting manipulations of intruders that will mask interference caused by lightning discharges near the optical route.
The government asked for the introduction of Russian encryption standards
At the end of May 2023, it became known that the information security working group proposed the government commission on digital development, which oversees the preparation of the "Strategy for the Development of the Communications Industry in the Russian Federation for 2024-2035," to include in the document a requirement to introduce Russian cryptographic protection standards into the architecture of subscriber devices by 2030.
As Kommersant writes in the issue of May 29, 2023, domestic cryptography standards are used mainly in state information systems, and their widespread implementation is not available, because Russian developments are not presented in international standards of telecommunication protocols. The preliminary text of the strategy fixes the idea of introducing "digital SIM cards" into consumer devices and industrial equipment using Russian encryption standards.
The source of the publication in the mobile device development market notes that the proposal of the working group is not formulated specifically enough, because only after the answer to the question "what exactly is planned to be protected," it will be clear whether support for Russian cryptography is needed at the hardware level or if there is enough software crypto provider.
The widespread use of cryptography in Russia is hindered by the fact that domestic developments in the communications industry in this direction are not in international standards of telecommunication protocols, explains the source of Kommersant. According to him, a high degree of power of attorney of communication networks cannot be achieved even if a foreign "hardware" is replaced with a domestic one. He explains this by the fact that "only the software component is localized, and not the logic of work embedded in the hardware." At the same time, import substitution in the field of telecom equipment cannot be fully implemented due to personnel hunger in the areas of development, research and its implementation, he concludes.[3]
2022
The National Technological Center for Digital Cryptography is being created in Russia
At the end of October 2022, it became known that the National Technological Center for Digital Cryptography was being created in Russia. The new company will ensure public-private interaction and the development of cryptography technology. Read more here.
The idea of using quantum objects to protect information from fake and unauthorized access was first expressed by Stefan Weisner in 1970. After 10 years, scientists Bennett and Brassard, who were familiar with Weisner's work, proposed using quantum objects to transmit a secret key. In 1984, they published an article describing the VV84 key quantum propagation protocol.
The carriers of information in the VV84 protocol are photons polarized at angles of 0, 45, 90, 135 degrees.
The idea was later developed by Eckert in 1991. The method of quantum cryptography is based on the observation of quantum states of photons. The sender sets these states and the receiver registers them. This uses Heisenberg's quantum uncertainty principle when two quantum quantities cannot be measured simultaneously with the required accuracy. Thus, if the sender and the recipient have not agreed among themselves what kind of quantum polarization to take as a basis, the recipient can destroy the signal sent by the sender without receiving any useful information. These behavior features of quantum objects formed the basis of the quantum key propagation protocol.
Scientists from Russia, China and Thailand have protected quantum cryptography installations from attacks with throwing in bright light
A group of scientists from the NTI Competence Center "Quantum Communications," created on the basis of NUST MISIS, in partnership with the Russian Quantum Center, as well as researchers from ITMO University, National University of Defense Technologies (NUDT) in China and the Quantum Technology Foundation of Thailand (QTFT) defended quantum cryptography installations from light-throwing attacks. NUST MISIS was informed about this by TAdviser on October 10, 2022.
Quantum cryptography or quantum key distribution (KPC) is a method of protecting information built on the use of fundamental laws of physics. Before sending an encrypted message, the user shares a key with the recipient of the information - a random sequence of bits necessary for further decryption of the message. If the key is transmitted in the form of single particles of light - photons, it cannot be hacked or copied. However, attacks could not be affected by the key, but by another installation element - the source of single photons.
So, if the quantum key distribution installation was built with engineering errors, it became vulnerable to attacks using light. The hacker could intercept the bits of the secret key due to super-bright light, imperceptibly launched into the fiber in the direction of the source. Such attacks could not only make the unit of the source of single photons work incorrectly, but also lead to the leakage of the secret key from it due to the emergence of side channels in the encoding of information or reflections of light.
During the experiment, scientists demonstrated the ability to protect against such attacks by including an additional inexpensive component in the installation - a fiber-optic circulator or insulator. In this case, the attacker's light beam primarily affects the additional component, which can disable it like a fuse, but this reduces the laser power, which is subsequently not enough to destroy the main device. The developed technology will allow physicists and security specialists to protect quantum encryption from unauthorized interference.
The result of the work was the creation of reliable protection against this class of attacks, and not just the detection of a security hole, which is not very clear how to close. We hope that the countermeasure we tested will be immediately applied to all industrial quantum cryptography systems, emphasized Vadim Makarov, head of the laboratory for the study of vulnerabilities in quantum cryptography systems and the development of methods for their certification by the Russian Quantum Center and the Competence Center of the NTI "Quantum Communications" NUST MISIS.
|
The attacker from whom we defend ourselves is not limited in means and will use all the available advances in technology. The defense testing experiment required careful work, since our high-power laser was able to damage surrounding objects, added Anastasia Ponosova , a researcher at the Russian Quantum Center who performed experiments in the laboratory.
|
Russian researchers have proposed a way to measure post-pulses
On August 25, 2022, it became known that a team of researchers from a company developing electronic devices based on quantum technologies QRate, the Moscow Institute of Electronic Technology and Tomsk State University proposed a way to measure post-pulses. Post-pulse is a noise parameter, the measurement accuracy of which is critical for the effective operation of the single photon detector, one of the main elements in quantum cryptography installations. Read more here.
Indian military begins using quantum encryption key distribution technology
In mid-August 2022, the Indian military announced the adoption of the quantum key distribution (QKD) technology developed by local specialists, which can operate at a distance of 150 km. It makes it much more difficult to intercept encryption keys by transmitting each bit of the key using a single photon. Because photons are quantum particles, observing them changes their state. And this change can be detected, and the signal itself indicates that the key may have been compromised and therefore should not be used. Thus, the technology can improve the security of military communications in peacetime or during conflicts in India. Read more here.
Russian atomic clocks protected using quantum cryptography
On July 6, 2022, it became known that a group of scientists from the companies QRate and "" Security Code together with specialists from All-Russian Research Institute of Physical, Technical and Radio Engineering Measurements (VNIIFTRI) conducted an experiment on the information protection State primary standard of time units, frequency and national time scale (GET-1). They managed to apply quantum cryptography to enhance information security the atomic time standard. More. here
Baikal processors are now compatible with post-quantum cryptography. This will strengthen protection against cyber attacks
As it became known on June 17, 2022, Baikal processors are compatible with post-quantum cryptography. This should strengthen the protection of computer systems from cyber attacks. Read more here.
A smartphone with quantum encryption is presented, which cannot be hacked
On May 16, 2022, the Chinese company China Telecom released its first smartphone with a quantum encryption module - Tianyi No. 1 2022. The device was developed in conjunction with the startup QuantumCTek. Read more here.
NATO begins to use a system of protection against cyber attacks using quantum computing
On March 2, 2022, it became known that the Center cyber security NATO (NCSC) announced the completion of testing of secure communication streams that can withstand attackers using, and now quantum computing begins full-scale operation of the technology. More. here
2021
Russian scientists have tested wireless quantum cryptography
On February 22, 2022, QRate (KuWright) announced that, together with a group of researchers from MTUSI and Mostkom, it had conducted an experiment to wirelessly transmit a quantum key in open space 180 and 3100 meters. Scientists were able to combine quantum information protection equipment with laser data transmission technology and assess the impact of weather conditions on the quality of their synchronization. Read more here.
InfoTeCS will build a complex for the production of quantum cryptographic systems in Tomsk
On November 25, 2021, InfoTeCS JSC TAdviser "" announced that it was created in 2021 on the basis of its separate division Tomsk in JSC "," plans ProKwanT special economic zone (SEZ) "Tomsk" to build its own scientifically production complex in the status of a resident. More. here
The first stage of the creation of the University network with quantum encryption has been completed at Moscow State University
On August 25, 2021, InfoTeCS announced that, together with the Center for Quantum Technologies of the Physics Department of Moscow State University named after M.V. Lomonosov completed the first stage of creating the University Quantum Network (UKS). Read more here.
QRate and Innopolis University defended an unmanned vehicle using quantum cryptography
On May 12, 2021, it became known that the research and production company QRate and Innopolis University implemented a project to protect the autonomous control systems of an unmanned vehicle using quantum communications technologies. Read more here.
Russian scientists have updated the world record in the effectiveness of quantum cryptography systems
A joint group of researchers from the Russian Quantum Center, the Center for Quantum Communications NTI MISiS and the research and production company QRate has updated the world record in the efficiency of classical post-processing algorithms in quantum cryptography systems. QRate announced this on February 17, 2021. Russian scientists have reduced the share of the key spent on authentication of classical data to 1%, and also proposed an error correction algorithm based on polar codes.
Both of these advances will increase the efficiency of existing quantum key distribution systems. A significant role in the effectiveness of such systems is played by classical post-processing - a set of procedures aimed at correcting errors in quantum keys, as well as excluding a potentially accessible attacker from it. information To implement the post-processing procedure, a classic authenticated channel is needed, communications so an important parameter is also the cost of the quantum key for authentication.
Improving the algorithms of classical post-processing will lead to an increase in the speed of key generation and a decrease in the cost of integrating equipment in the future.
The quantum technology market is just being formed so far. According to the roadmap for the development of quantum communications, which is supervised by Russian Railways, 16.7 billion rubles will be invested in this high-tech direction in Russia by 2024. As of February 2021, there are already working solutions that can be built into the existing infrastructure. But their potential has not yet been fully revealed. The capabilities of the technology will grow in the process of its improvement.
Quantum cryptography is promising primarily for protecting communication channels through which valuable strategic information is transmitted. Especially when it comes to data with a long shelf life or negotiations of top management. As the digitalization of society develops, additional scenarios for the use of equipment for quantum key distribution will appear, for example, protecting unmanned vehicles from mass hacking, says Yuri Kurochkin, CTO QRate, director of the NTI "Quantum Communications" competence center at MISIS. " |
The first achievement is an error correction algorithm based on polar codes, which is more resistant to external manifestations of the environment. Thus, devices for quantum key distribution will be able to work stably not only in ideal laboratory conditions, but also in real situations where environmental parameters can have significant deviations due to the effects of different factors. This is especially important for industrial quantum cryptography devices operating in real city communication lines.
The second achievement is to reduce the share of the key required to authenticate classical data transmitted during classical postprocessing. In quantum cryptography systems, a portion of a key that was previously distributed is used to authenticate classical messages in subsequent rounds of key generation. The lower this consumption, the more efficient the system as a whole works. In this authentication protocol, the share of the key spent on authenticating traffic has significantly decreased and may be less than a fraction of a percent.
Information security is one of the key needs of society. When developing technologies for data protection, we must take into account not only existing, but also future threats. The introduction of quantum key distribution allows a fundamentally different level of protection, which makes it resistant to future attacks. At the same time, there is constant improvement - scientific developments make it possible to improve products and technologies. In this case, we offer software tools to optimize the operation of quantum key distribution devices, so they quickly integrate into QRate devices - notes Alexey Fedorov, head of the scientific group of the Russian Quantum Center, PhD in Physics. |
Both discoveries influence the development of quantum cryptography technology. Increasing the efficiency of quantum key distribution devices will accelerate mass adoption and expand the scope of this technology in the future.
MSU launched a telephone network with quantum encryption
On January 11, 2021, Lomonosov Moscow State University (MSU) announced the launch of a telephone line with quantum encryption. It will connect 20 subscriber points on the territory of the university. Read more here.
Chinese mobile operator implements quantum call encryption
In early January 2021, the Chinese telecommunications company China Telecom announced the launch of a pilot program in which smartphone users will be able to make calls using quantum encryption algorithms. The new service from China Telecom is available in Anhui Province, initially only selected customers will be able to use it. Read more here.
2020
Quantum Cryptography Market Valued at $93.1 Million
In 2020, the volume of the quantum cryptography market is estimated at $93.1 million. This was announced in mid-February 2022 by the research company ResearchAndMarkets. Analysts said spending on such technologies is increasing and will continue to rise.
Against the background of the coronavirus infection crisis (COVID-19), the global quantum cryptography market, estimated at $93.1 million in 2020, is projected to reach a revised size of $291.9 million by 2026 and will grow at a rate of 20.8% according to ResearchAndMarkets. The market in question is expected to show annual growth of 33.7%, and in a number of states positive dynamics will be even higher in China + 36.9%, Japan + 41.8% and India + 50.2%.
The growth of the global market will be driven by an increase in the frequency of cyber attacks, increased attention to cybersecurity and the development of complex wireless networks. Quantum cryptography is attracting increasing attention due to the growing digitalization, as well as a sharp increase in risks in the field of cybersecurity and other threats. The market growth is driven by greater reliance of organizations and customers on computer networks for transactions and communication, leading to demand for advanced technologies to protect sensitive data. Increased cybersecurity funding and widespread use of advanced security solutions are driving the market growth, with the increasing penetration of IoT and cloud technologies expected to create new growth opportunities. In addition, the market growth is driven by the increasing adoption of next generation wireless networking technologies.
The urgent need to protect the network from various vulnerabilities is prompting an increasing number of industries, such as defense, government, healthcare, automotive and retail, to use quantum cryptography solutions.
The quantum cryptography market USA is estimated at $40.6 million in 2021. As of February 2022, the United States accounts for 37.5% of the global market., China The world's second largest economy is projected to reach a market volume of $40.6 million. Among other noteworthy geographical markets in which growth is predicted Japan Canada , 19.5% and 21.5% should be noted. In, it To Europe is projected to Germany grow by about 21.1% on an annualized basis, with the rest of the market Europe reaching $23 million. North America will dominate the global market and hold a leading share of revenues thanks to its extensive customer base, increased cyber attacks, and increased investment in R&D. In the Asia-Pacific market, providers of quantum cryptography services and solutions are expected to make increasing efforts to collaborate with customers to increase overall sales and market presence.[4]
IBM has implemented protection against cyber attacks using quantum computers in its services
At the end of November 2020, IBM introduced protection against quantum cyber attacks into its services. The company introduced "quantum cryptography" capabilities for three services in IBM Cloud: Red Hat OpenShift, Cloud Kubernetes Service and Key Protect. Customers using these services will now be able to protect data with an encryption algorithm that will have a better chance of countering future attacks by quantum computers, the company said. Read more here.
ITMO proposed a modification of the quantum encryption system with a compact detector
On July 14, 2020, it became known that ITMO scientists proposed a modification of the quantum encryption system with a compact detector. Read more here.
A secure quantum communication channel with a length of 1120 km has been created
On June 16, 2020, it became known that a secure quantum communication channel of 1120 km was created. As of June 2020, the data transfer rate is only one byte of information per minute and a half.
As reported, a team of researchers from China, Singapore and the UK was able to combine the cities of Nanshan and Dalin with a quantum link protected from hacking using the Mo-Tzu satellite.
We managed to carry out quantum key exchange between two ground stations at a distance of 1120 km. We increased the transmission efficiency of entangled photons by about four times and reached a speed of 0.12 bits per second. explained by experts |
Some problems of modern quantum communication systems are associated with the fact that light when moving through fiber gradually weakens, and in this regard, the distance between the nodes of quantum networks for June 2020 is several hundred kilometers.
The researchers are trying to solve this problem in two ways: with the help of so-called repeaters of quantum signals, which can read the quantum signals entering them, amplify them and send them to the addressee without violating the integrity of the data, or by increasing the range of transmission of quantum information through communication satellites.
The Mo-Tzu orbital probe was launched back in September 2016 and was used for the first "intercontinental" sessions of transmitting quantum information, but the number of photons transmitted was not enough for full encryption. The satellite remains in the "field of view" of ground stations for too short a period of time, and during this time it is necessary to have time to transmit the full key to encrypt data sent on ground lines. This can be achieved in two ways - to increase the efficiency of an existing system for detecting entangled photons, or to make their source more powerful.
The scientists chose the first method and increased the sensitivity of ground-based telescopes, which play the role of receivers of cosmic quantum signals, and also developed optical and mechanical components for more accurate aiming at Mo-Tzu. With the help of telescopes, physicists have created a permanent communication channel that transmits a full-fledged key for encrypting data as part of a short communication session with a satellite, which lasts no more than 285 seconds.
As of June 2020, the data transfer rate is one byte of information in one and a half minutes. As experts noted, the sending of quantum keys can be accelerated hundreds of times if the transmitter power on board the satellite is increased[5] has been[6].
Scientists develop communication protocol that adds artificial noise to source data
On June 16, 2020, it became known that researchers from the University of Basel and the Federal Institute of Technology Zurich are working to create a communication protocol that guarantees complete confidentiality. The protocol adds artificial noise to the source data, providing protection against intruders.
To combat cybercriminals who have quantum computers, experts are developing encryption methods based on the principles of quantum mechanics. The protocol can be implemented experimentally and guarantees security in cases where the devices used for communication are so-called "black boxes." Quantum computers are embedded in black boxes where light or sound does not penetrate, as this is necessary to eliminate decoherence and invoke superposition in qubits.
Some theoretical proposals for black box communication protocols existed before, but they could not be implemented experimentally, since the devices used had to be very effective in detecting information about the encryption key. If information blocks remain undetected, it is impossible to know if they were stolen by a third party.
The protocol being developed is designed to solve this problem by "diluting the information with noise." Adding artificial noise to information about the cryptographic key will not allow you to obtain enough information and put the security of the protocol at risk of attacks. In addition, the researchers were able to reduce the requirements for devices used for highly efficient information detection[7].
Scientists have found a way to improve the security of quantum cryptography
On April 6, 2020, it became known that scientists from the consortium of the NTI Competence Center "Quantum Communications" have developed a way to increase the level of security of quantum cryptography. Thanks to a special verification algorithm, extraneous "noise" is highlighted and removed, which can affect the process of operation of the random number generator. This 100% eliminates the possibility of external influence on the encryption process. An article about the development was published in the journal Optics Express.
As reported, behind every process of sending and receiving information in the modern world is cryptography - a data encryption system that ensures their security. The most common is the so-called asymmetric encryption, which uses not one secret key, but two: open and private. The private (secret) key is stored only by one of the participants in the cryptographic system who wants to receive an encrypted message. To do this, it sends a public key over a regular (unclassified) information channel, which is used to encrypt the message. To decrypt a message, it is not enough to have only a public key - you also need to know the private key.
This situation is similar to if a person, wanting to receive a secret message, handed out small locks to everyone, but would not give anyone the keys to these locks. Anyone who wanted to share their secret with him could put a secret message in the box and lock it with this lock. Obviously, now no one but him will be able to open the box and read the secret message, even if the box falls into the hands of the attacker.
The asymmetric encryption system relies on an unproven mathematical statement that it is impossible to decompose an integer into simple multipliers in polynomial time. Therefore, it is believed that the power of a modern computer is not enough to hack such a system, but such capabilities may appear in a quantum computer in the near future. This casts doubt on the security of classical cryptography methods in the approaching age of quantum supremacy.
In contrast to possible quantum hacking technologies, scientists are actively developing and introducing methods of quantum cryptography - encryption based not on computer, but algorithms on the laws of quantum mechanics. Quantum cryptography systems solve the problem of securely distributing a secret key between participants in a cryptographic system. The secret key is transmitted over an optical channel using single photons. According to the laws of quantum mechanics, an attacker will not be able to quietly intercept individual photons, so that any time he tries to find out the secret key, the system will signal the danger. In addition to the source and detector of single photons, an important element of the quantum cryptography system is the so-called quantum random number generator. Since an attacker cannot intercept single photons, he can try to attack this particular element of the system. Scientists of the consortium of the NTI Competence Center "Quantum Communications" (, NUST "MISIS" the company and) QRate Russian Quantum Center have developed a way to increase the level of security of quantum cryptography systems using a special algorithm that allows you to detect attacks exactly on a quantum random number generator.
To generate random bit sequences, the scientists proposed using noise arising in a semiconductor laser and associated with spontaneous radiation. Since spontaneous radiation is caused by the so-called zero oscillations of the electromagnetic field, it can be argued that such noises in the laser are of a purely quantum nature, and therefore it is fundamentally impossible to learn to predict them and, most importantly, they turn out to be immune to any attempts to "subordinate" them to external control. However, since it is impossible to directly use these noise without conventional (classical) measuring devices, quantum noise is "contaminated" with classical noise, which an attacker can potentially use to compromise random bits obtained with these noise.
Scientists from QRate and NUST MISIS have developed a protocol that allows "on the fly" to assess the contribution of classical noise and thus determine the level of potential threat. Moreover, their proposed protocol allows the output random bit sequence to be converted to "true quantum" without the use of complex post-processing algorithms, such as hashing, which are usually used for these purposes.
According to the developers, their algorithm can already be used in existing and projected quantum random number generators for quantum cryptography installations.
2019
Cryptography is presented that quantum computers cannot hack
At the end of December 2019, researchers from the King Abdullah University of Science and Technology (Saudi Arabia) and the University of St. Andrews (Scotland) presented a new unbreakable security system. They created an optical microchip that allows you to transfer information from user to user through a one-time communication channel. According to the creators, even quantum computers are unable to hack such cryptography .
Modern cryptographic methods allow you to quickly exchange data, but quantum algorithms will one day make it easy to hack them. The creators of the microchip claim that their method of cryptography cannot be hacked, and it takes up less space on the network than traditional communications. The proposed system uses keys created by an optical chip that are not stored or transmitted with the message. As a result, they cannot be recreated or intercepted.
The new technology is absolutely unbreakable, as we demonstrated in the article. It can be used to protect confidential communication of users separated by any distance, at a speed close to light, and using inexpensive optical chips compatible with electronics, "explained the head of the study, Professor Andrea di Falco (Andrea di Falco) from the School of Physics and Astronomy at the University of St. Andrews. |
According to the developers, their technology opens up a completely new cryptography technique that provides "perfect secrecy" on a global scale with minimal costs.
The introduction of mass and affordable methods of global security is a worldwide task, and we offer an elegant solution. If this scheme is implemented around the world, crypto hackers will have to look for another job, the authors of the study note[8] |
Testing of quantum encryption on fiber-optic fiber with a length of 143 kilometers
On September 25, 2019, it became known that the Kazan Quantum Center of Kazan National Research Technical University named after A.N. Tupolev - KAI (KCC KNITU-KAI), Rostelecom and Tattelecom successfully ensured the exchange of quantum encryption keys on a fiber-optic communication line (VOLS) with a length of 143 kilometers. This is a record for existing commercial communication networks . Earlier, in 2018, Rostelecom tested a similar technology on a 58-kilometer VOLS.
In Tatarstan, the test VOLS connected the laboratory of Practical Quantum Cryptography of the KCC KNITU-KAI with the Rostelecom communication center in Apastovo. The testing involved the backbone networks of two independent telecom operators - Rostelecom and Tattelecom, which is important for the practical introduction of quantum communications.
One of the technical tasks is to ensure the transmission of quantum keys over long distances in fiber optic lines. The tested prototype of a hybrid quantum classical protection data transmission and reception complex, developed at KNITU-KAI and supports the transmission of quantum keys over long distances. It includes a quantum key distribution system at side frequencies, a crypto router and a single photon detector manufactured by the Russian company SKONTEL. The development of the St. Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University) was used as the original quantum key distribution system.
When testing the operation of the crypto router, video conferencing sessions were organized between two communication nodes at a distance of 143 kilometers with optical losses in the 37 dB channel. To exchange encryption keys, a stream of single photons was used, in the quantum states of which classical information was recorded. Quantum key mailing took place at a modulation phase change rate of 100 MHz with an average photon count of 0.2 per modulation cycle. The average rate of generation of quantum keys in the channel made it possible to change the 256-bit encryption key up to twice a minute.
Experts believe that quantum communications provide the highest degree of protection for the transmission of data over the fiber optic network as of September 2019. The technology is based on the use of fundamental laws of quantum physics that cannot be circumvented. To exchange encryption keys, the technology uses single photons, whose states irrevocably change as soon as someone tries to "read" them. Any interception attempt will be immediately detected and prevented[9].
Rostelecom has organized an experimental data network with quantum encryption in Russia
On June 5, 2019, Rostelecom"" introduced an experienced data network with. quantum enciphering It for the first time uses equipment and solutions from different manufacturers with the organization of their correct interaction along the entire data transmission path. Also, for the first time in the country, such a network has several nodes with the technical ability to connect many users, regardless of the location of their offices and the cryptographic equipment used with CRK (quantum key distribution technology).
The experimental network in St. Petersburg includes nodes in the Rostelecom laboratory on Sinopskaya embankment, in the SeifNet engineering center on Aptekarsky Prospekt, as well as in the communications museum on Pochtamtsky Lane. All of them are interconnected by Rostelecom's high-speed fiber-optic data transmission lines. To organize the protection of information transmission using the CRC, only domestic equipment and solutions are involved - the St. Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University), the Russian Quantum Center, T8, and S-Terra. The multi-node network presented in St. Petersburg generates more than 2000 bits of secret key information in 1 second.
Rostelecom has been engaged in in-depth testing of equipment and solutions of domestic vendors in the field of quantum communications for about a year. We are generally satisfied with the results, they prove that on the existing infrastructure of Rostelecom, the use of KRK is technically available. Now we are moving to a fundamentally new level of testing, when a multi-node network with equipment from various vendors is created. On such a network, it is important for us to test and show potential customers prototypes of commercial services, for example, the organization of protection of data transmission trunks or virtual private networks (VPN) using CRK. Future commercial services will be tested on the network created in St. Petersburg, "said Boris Glazkov, vice president for strategic initiatives at Rostelecom . |
Rostelecom"" expects the launch of the first commercial services using quantum key distribution technology (KPC) in the next two years - it guarantees the highest degree of transmission protection, data since it is based on the fundamental laws of physics. This was stated by the president of the company. Mikhail Oseevsky
Experts believe that quantum communications provide the highest degree of data transmission protection existing in June 2019. The technology is based on the use of fundamental laws of quantum physics that cannot be circumvented. To exchange encryption keys, the technology uses single photons, whose states irrevocably change as soon as someone tries to "read" them. Any interception attempt will be immediately detected and prevented.
Tests of the system for quantum protection of data transmission to the VOLS of Rostelecom
On January 29, 2019, Rostelecom announced that it had successfully conducted the second stage of testing domestic equipment and solutions for organizing quantum protection of data transmission on an existing fiber-optic communication line (FOCL). The test participants were the Russian Quantum Center (RCC), QRate and S-Terra CSP. Read more here.
2017
Quantum phone ViPNet presented in Russia
On December 13, 2017, InfoTeCS announced the introduction of the ViPNet Quantum Phone, a system that demonstrates the integration of quantum key distribution equipment.
The product was developed in the laboratory of quantum optical technologies of the Physics Department of Moscow State University, and VPN ViPNet (using the example of two products - ViPNet Client and ViPNet Connector). The ViPNet quantum phone allows you to connect workstations to installed ViPNet software and encrypt traffic between them using quantum key distribution. Quantum key distribution allows you to ensure a high level of security when transmitting data over untrusted (public) communication channels, helps to eliminate the threat of calculating security keys on quantum computers.
Quantum 4D coding technology first tested in urban conditions
As it became known on August 30, 2017, researchers from the University of Ottawa successfully conducted the first real tests of quantum 4D coding technology, transmitting encrypted messages between two stations located on the roofs of high-rise buildings, the distance between which was 300 meters.[10]
Technology
Traditional quantum communication technologies, already used in some places to create "unbreakable" quantum networks, use a standard binary number system, encoding one bit of transmitted information in one photon. Some time ago, the so-called multidimensional quantum coding technology was invented, which allows you to double the amount of information enclosed in one photon of light. This, in turn, allows each photon to carry one of four values - 00, 01, 10 and 11, as a result of which the technology was called quantum 4D coding. In addition, the technology distinguishes a higher level of protection from attempts to deliberately intervene and greater resistance to the influence of extraneous environmental factors.
Experiment
The test was carried out at a distance of 300 meters. During the experiment, information was transmitted between two base stations installed on the roofs of buildings, which were previously placed inside wooden boxes that protect them from bad weather. Under such conditions, the data transmission error rate was 11%, which is much lower than the level required to organize a secure quantum communication channel. Taking into account repetitions and redundant information for error correction, the system was able to transmit 1.6 times more information than a conventional two-dimensional quantum coding system operating under ideal conditions.
Our experiment was the world's first data transfer carried out using multidimensional quantum coding technology in real urban conditions, including bad weather, "said Ebrahim Karimi, lead researcher. - The safe quantum communication system we have demonstrated, working in the open air, is able to provide communication with satellites in orbit and places on the surface of the Earth, where it is inappropriate to lay an optical fiber. In addition, such a system can serve to organize safe communication with moving objects, such as aircraft and ships. |
Plans
Scientists plan to test the quantum 4D coding system at a distance of 3 kilometers, after which they expect to increase the distance to 5.6 kilometers using intermediate stations and an adaptive optics system designed to compensate for distortions introduced by the atmosphere. In the longer term, the researchers plan to add more "coding measurements," which in turn will further increase the amount of information packed into a single photon.
From the point of view of quantum communications technologies, the world around us is a very "noisy" place filled with obstacles, moving air and permeated with electromagnetic signals. As a result, transmitting a signal in a "noisy" urban environment over a distance of 3 kilometers is equivalent to transmitting the same signal to a satellite from a base station located in a quiet isolated place, the researchers emphasized.
China first tested quantum encryption for data transmission from satellite
On August 10, 2017, it became known that Chinese scientists were the first in the world to successfully transfer data using quantum encryption technology. The package of information was sent from the Mo-Tzu satellite to the observation stations Xinglong (Hebei province) and Nanshan (Xinjiang Uygur Autonomous Region). The distance between the satellite and ground stations ranged from 645 to 1200 km at different points in the transmission of the data packet, Pan Jianwei, an academician of the Chinese Academy of Sciences, said in an interview with Xinhua[11]
According to him, quantum encryption technology has achieved a data transfer rate "20 orders of magnitude higher" than if fiber laid from space was used for this purpose. At the same time, Pan Jiangwei stressed that to generate and transmit 300 Kbit of encrypted information to Earth, Chinese scientists had only one 10-minute window, within which the satellite flew over the country's territory.
Quantum encryption technology solves several security issues. For example, an absolutely safe telephone conversation that no one can listen to, or transfers of bank data that no one can intercept. When trying to hack a quantum communication channel, all data transmitted over it will simply be destroyed, "said Pan Jiangwei. |
The Mo-Tzu quantum communications satellite was launched in August 2016. The period of rotation of the satellite around the earth is 90 minutes, weight - 631 kg. The device is designed to conduct a number of scientific experiments, including testing the quantum distribution of the key between the orbited device and ground complexes, studying the mechanism of quantum entanglement, as well as testing quantum teleportation between the satellite and the station in Tibet. It was assumed that the studies would take about two years.[12]
It was originally planned to transmit data to five stations in China and Austria. By the end of 2017, two more ground objects will be prepared for receiving data from Mo-Tzu - in Germany and Italy.
Previously, experiments with quantum encryption were carried out only on Earth: in Europe, the USA and China. Fiber was used to transmit keys, but the signal weakened as it progressed. Placing a signal source in space solved this problem, since the main part of the photon path passes in a vacuum.
According to scientists, quantum encryption will allow China to create an unbreakable network by 2030 that can provide complete confidentiality and will be resistant to any attacks. Attackers will be prevented from reading information from such data channels by the Heisenberg uncertainty principle, one of the fundamental principles of quantum mechanics, according to which any external interference in a quantum system will result in its irreversible change.
Creating a Secure Network in China
In July 2017, it became known that China is building an "unbreakable" communication network, which will be based on the principle of quantum cryptography. The project has already been launched in Jinan City. According to the local press, this is a historical moment. Earlier, a "quantum" communication channel was organized between the two largest cities in China.[13]
By July 25, 2017, there are 200 subscribers in the Jinan network - representatives of the military, government organizations, as well as the financial and energy sectors. They will be able to communicate without fear of wiretapping.
Quantum cryptography is a communication protection method based on the principles of quantum physics. Unlike traditional cryptography, which uses mathematical methods to ensure the secrecy of information, quantum cryptography focuses on physics, considering cases when information is transferred using objects of quantum mechanics - using electrons in electric current, or, as in the case of the project in Jinan, photons in fiber-optic communication lines.
A key feature of such a system is that any attack, any attempts to eavesdrop on will be immediately detected.
Quantum cryptography technology relies on the fundamental uncertainty of the behavior of a quantum system. Heisenberg's uncertainty principle states: it is impossible to simultaneously obtain the coordinates and momentum of a particle, it is impossible to measure one parameter of a photon without distorting the other. In other words, an attempt to measure interconnected parameters in a quantum system disrupts it by destroying the original signals - this means that it is possible to immediately detect the interceptor in the communication channel.
Traditional (mathematical) cryptography provides that attempts to crack encryption keys are a very complex mathematical problem; its solution requires extensive computing resources.
However, the further, the more powerful computers become, and the longer the encryption keys should become. In addition, quantum computers are on the way, whose computing power will be at a fundamentally higher level than modern technology. Traditional cryptography may be too weak in front of them.
Interception of keys in quantum cryptography is in principle possible, but, for the reasons described above, an attacker cannot but impersonate himself.
Tellingly, China was ahead of the planet in the matter of quantum cryptography. Creating an infrastructure for its practical implementation is extremely costly, and neither European nor American businesses were in a hurry to invest in it.
Europe was simply late for the train, - quotes the BBC professor of the University of Vienna Anton Zeilinger, a specialist in quantum physics. |
According to him, back in 2004 he called on the EU to invest more actively in "quantum" projects, but to no avail.
In the United States and Europe, quantum communication networks already exist, but they are all in the status of research, not commercial projects. China has moved a little further than its main competitors, but it is still far from commercializing the relevant projects and technologies.
The commercial spread of quantum cryptography is still a long way off, "said Georgy Lagoda, CEO of SEC Consult Services. But it is obvious that sooner or later this day will come, and should be preparing for this now. China is ahead of the curve, which means that if mass and very large investments in this area do not happen, we will all use almost exclusively Chinese developments after a while. |
This is not the first "quantum" project of China. In 2016, a satellite was launched in the country, with the help of which a program for providing quantum communications over long distances was tested in conditions when cabling is impossible. In addition, the "quantum" communication channel was organized between the largest cities of the PRC - Beijing and Shanghai.
High-speed quantum encoder of Moscow State University
On the basis of the technology created as part of the project of the Foundation for Advanced Research, a high-performance encryptor with a quantum channel for distributing cryptographic keys will be created for fast and absolutely safe transmission of information over fiber-optic communication lines.
The Faculty of Physics Lomonosov Moscow State University and OJSC InfoTeCS will develop a high-performance quantum channel encoder distribution (update) of cryptographic keys. It will be possible to use the equipment in distributed data centers, in the implementation of interbank transactions, in local and distributed networks for the exchange of confidential information and in other areas and processes that require a high degree of security when transferring large amounts of data. The creation of this unique equipment will be based on quantum communications technologies developed as part of the project of the Advanced Research Foundation in 2014-2017.
See more - MSU High-Speed Quantum Encoder
Grant of the Ministry of Education and Science of Russia to create a data center control system with communication lines protected by quantum encryption
The Ministry of Education and Science of Russia has allocated a three-year grant in the amount of 160 million rubles. ($2.7 million at the exchange rate for 16.03.2017 years) to create a distributed data center management system in which communication lines will be protected by quantum encryption. Among the developers, such IT companies as Samara SMART, St. Petersburg Bee Pitron and specialists from ITMO University (St. Petersburg) are identified. The project will be created by 2020. In the world, similar systems are used in Switzerland, China and America. There are no analogues in Russia.
The world's first non-breakable satellite with quantum encryption has begun work
Chinese media reported at the beginning of the year on the start of operation of the world's first quantum satellite Mo Tzu, launched into orbit in August 2016[14]
As expected, the 631-kilogram satellite "Mo-Tzu" (Micius), named after the Chinese philosopher-legist, will be in orbit at a distance of 500 km from the earth's surface for at least two years.
According to Xinhua, a stable connection has been established for data transmission between the completed Mo-Tzu satellite and the experimental platform for quantum teleportation at Ali Station in Tibet.
Despite the "fantastic" name of the quantum teleportation platform, it is not related to teleportation described in fiction.
The Mo-Tzu equipment implements a communication channel based on pairs of so-called entangled photons - subatomic particles, the properties of which depend on each other. Scientists expect to transmit one of the photons from the satellite to research centers in China and Austria.
2016: T8 and RCC begin building secure quantum communications system
T8 NTC and the Russian Quantum Center (both residents of the Skolkovo Foundation's IT cluster) announced in the summer of 2016 that they had begun joint work on a secure communication system based on quantum cryptography technology, which can be used within the existing telecommunications infrastructure. The document on cooperation was signed by Ruslan Raufovich, Director General of RKCUnusov, and Vladimir Treshchikov, Head of T8 . Read more: RCC Secure Quantum Communication System
2015
Acronis implements quantum encryption
On September 30, 2015, Acronis announced plans to introduce quantum encryption technologies into its data protection products. The Swiss ID Quantique will help her in this, the investor of which is the QWave Capital fund[15] by Sergei Belousov. [15].
Acronis will develop quantum cryptography technologies. The vendor plans to equip their products with them and believes that this will provide a higher level of security and privacy. Acronis expects to be the first company on the market to implement such protection methods.
Acronis' partner in the development of quantum cryptography will be the Swiss company ID Quantique, with which the vendor has entered into an agreement. ID Quantique is a company associated with Acronis CEO Sergei Belousov - he is the founder of QWave Capital, one of ID Quantique's investors.
One of the technologies that Acronis plans to implement in its solutions is quantum key distribution. The encryption key is transmitted over the fiber channel via single photons. An attempt to intercept or measure certain parameters of physical objects, which in this case are carriers of information, inevitably distorts other parameters. As a result, the sender and receiver detect an attempt to obtain unauthorized access to the information. It is also planned to apply quantum random number generators and encryption that is resistant to quantum algorithms.
ID Quantique technologies focus on information protection in the public sector and commercial companies.
"Quantum computing requires a new approach to data protection," Sergei Belousov said. - We at Acronis are convinced that privacy is one of the most important components in comprehensive data protection in the cloud. Today, we are working with leading companies such as ID Quantique to ensure that users of our cloud products get the safest solutions in the industry and are protected from future threats and attacks. "
Acronis expresses confidence that quantum encryption will help save customers (who believe that the provider will be able to read their data) from fear of sending data to the cloud.
Toshiba experiment
On June 23, 2015, Toshiba announced the start of preparations for the launch of an unbroken encryption system [16].
According to the developers of the new technology, the best way to protect information on the network is to use disposable keys for decryption. The problem is the secure transfer of the key itself.
Quantum cryptography uses the laws of physics for this, in contrast to the usual methods based on mathematical algorithms. The key in the system created by Toshiba is transmitted in the form of photons generated by the laser - light particles are delivered via a special fiber optic cable that is not connected to the Internet. The nature of the photons is such that any attempts to intercept the data change the data and this is immediately detected, and since the one-time key must have a size identical to the encrypted data, reuse of the same pattern is avoided, making decoding without the correct key impossible.
Toshiba began research in quantum cryptography technologies in 2003. The company introduced its first system in October 2013, and in 2014 the company achieved stable transmission of quantum keys over standard fiber for 34 days.
With all its fundamental advantages, this method is characterized by significant basic limitations: due to the attenuation of the light signal, the transmission of photons (without a repeater) is possible at a distance of no more than 100 km. Photons are sensitive to vibration and high temperatures, which also complicates their transmission over long distances. And to implement the technology, equipment is required, where one server costs about $81 thousand.
As of June 24, 2015, Toshiba is not abandoning plans to launch long-term system testing to verify the method. During testing, it will begin on August 31, 2015, encrypted genome analysis results obtained at the Toshiba Life Science Analysis Center will be transmitted to Tohoku Medical Megabank (at Tohoku University), for a distance of about 7 km. The program is designed for two years, until August 2017. The study will monitor the stability of the transmission rate during long-term operation of the system, the influence of environmental conditions, including weather, temperature and state of the optical connection.
If the experiment is successful, commercial use of the technology will be possible in a few years. By 2020, the company expects to begin providing services to state organizations and large enterprises. With the reduction in the cost of technology, the service will come to private users.
1989: American Experiments
Until recently, the method of quantum key propagation was perceived as science fiction. But in 1989, at the Watson Research Center IBM , a group of scientists led by Charles Bennett and Gil Brasard built the first system of experimental and practical implementation of the VV84 protocol. This system allowed two users to exchange a private key at a data rate of 10 bps at a distance of 30 cm.
Later, the idea was developed at the Los Alamos National Laboratory in an experiment to distribute the key over fiber optic cable over a distance of 48 km. When transmitting a signal in the air, the distance was 1 km. An experiment plan has been developed to transmit a quantum signal to a satellite. If this experiment succeeds, one hopes that the technology will soon become widely available.
Quantum cryptographic research is developing at a rapid pace. In the near future, information protection methods based on quantum information will be used primarily in top-secret military and commercial applications.
Development prospects
Quantum cryptography has not yet reached the level of practical use, but has approached it. There are several organizations in the world where active research in the field of quantum cryptography is underway. Among them are IBM, GAP-Optique, Mitsubishi, Toshiba, the National Laboratory in Los Alamos, the California Institute of Technology (Caltech), as well as the young company MagiQ and the QinetiQ holding, supported by the British Ministry of Defense. The range of participants covers both the world's largest institutions and small start-up companies, which allows us to talk about the initial period in the formation of the market segment, when both can participate on equal terms.
Of course, the quantum direction of cryptographic information protection is very promising, since quantum laws allow you to take information protection methods to a qualitatively new level. Today, there is already experience in creating and testing a computer network protected by quantum cryptographic methods - the only network in the world that cannot be hacked.
Quantum cryptography for mobile devices
Quantum cryptography - extremely reliable method of protection of communication channels in the theory against interception, however in practice it is so far quite difficult to realize it. On both ends of the channel the difficult equipment - sources of single photons, control facilities polarization of photons and sensitive detectors has to be installed. At the same time for measurement of an angle of polarization of photons it is necessary to know for sure how the equipment on both ends of the channel is focused.[2] devices. Disclosed is a quantum cryptography method suitable for mobile devices
Scientists from University of Bristol offered the scheme at which the difficult equipment is necessary only for one negotiator. The second only modifies a condition of photons, coding these information, and sends them back. Apparaturu for this you can razmestit in the karmannom ustroystve. Authors propose also a solution of the problem of orientation of the equipment. Izmereniya proizvodyatsya in the sluchaynykh napravleniyakh. The list of the directions can be published openly, but at interpretation only the coinciding directions will be considered. Authors call a method "quantum distribution of keys, independent of a reference system": rfiQKD.
Post-quantum cryptography
Main article: Post-quantum cryptography
See also
- Information Security Catalog - System and Project Encryption Tools
- Quantum Computers and Quantum Communications
- Russian Quantum Center (RCC, Russian Quantum Center, RQC)
Literature
- Charles H. Bennett, Francois Bessette, Gilles Brassard, Louis Salvail, and John Smolin, "Experimental Quantum Cryptography", J. of Cryptography 5, 1992, An excellent description of
- A.K. Ekert, " Quantum Cryptography Based on Bell's Theorem", Phys. Rev. lett. 67, 661 (1991).
- Toby Howard, Quantum Cryptography, 1997, www.cs.man.ac.uk/aig/staff/toby /writing/PCW/qcrypt.htm
- C.H. Bennet, " Quantum Cryptography Using Any Two Non-Orthogonal States", Phys. Rev. lett. 68, 3121 (1992).
- A. Korolkov, Quantum cryptography, or how light forms encryption keys. Computer at School, No. 7, 1999
- V. Krasavin, Quantum cryptography
- ↑ Quantum computing poses a threat to cybersecurity.
- ↑ 2,0 2,1 China drafts ‘quantum-proof’ protocol to defend against advanced cyber attacks
- ↑ Complex hardware offering
- ↑ Quantum cryptography market to reach $291.9 million by 2026
- ↑ [https://www.securitylab.ru/news/509247.php A protected quantum communication channel of 1120 km long
- ↑ created]
- ↑ The new communication protocol will provide complete confidentiality
- ↑ [1]releases/2019-12/kauo-nss121919.php New security system to revolutionize communications privacy
- ↑ Russia has tested quantum encryption on a record-length fiber optic fiber
- ↑ The first real tests of quantum 4D coding technology were carried out
- ↑ The world's first non-breakable satellite with quantum encryption has begun work
- ↑ China launched the world's first quantum communications satellite
- ↑ China set to launch an 'unhackable' internet communication
- ↑ The world's first non-breakable satellite with quantum encryption began work.
- ↑ 15,0 15,1 [http://www.cnews.ru/news/top/2015-09-30_acronis_vnedrit_v_svoi_produkty_tehnologii_kvantovogo created
- ↑ ixzz3dzeIexOC Quantum cryptography is being tested