The Quantum Internet Could Be Immune To Cyber Attack

We have become used to the current state of the Internet and most users have a general understanding about how things work online. But the Internet is not always secure and the risk of falling victim to cyber attacks is increasing daily, especially for those users not taking adequate precautions.

The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can be swiftly decoded by a quantum computer.

A new type of computer, based on quantum physics rather than standard electronics, could break most modern cryptography. The effect would be to render communications as insecure as if they weren’t encoded at all - meaning that state secrets, medical records and banking systems would all be vulnerable once the quantum computer becomes a reality.

But the power of quantum technologies could also be used against quantum technologies, with the aim of protecting our data against quantum hacking and researchers have now discovered a new quantum computing method that will allow for safer and more secure connections in many applications.

Eindhoven University of Technology is currently setting up a unique testbed to validate this technology in several societal settings, thus paving the way for a fast and unhackable quantum Internet. 

Taking autonomous driving as the first use case, the researchers aim to have the world’s first quantum-secured autonomous driving car ready by next year. Idelfonso Tafur Monroy, TU/e Professor at the Electro-Optical Communication group and the Center for Quantum Materials and Technology Eindhoven (QT/e) recognises the particular threat to systems that require a lot of accurate control, such as autonomous driving. “For example, a hack could trick others into thinking your car is in a different location, slowing down, or changing direction,” he says. “It is even possible that your car is hacked and commandeered by someone external to the vehicle.”

The immense computing power of quantum is especially useful in calculations with many different outcomes: these can be done in one operation at the same time. 

To crack current encryption, a conventional computer takes an unacceptable length of time to test every possible solution. A quantum computer tries them all at once and cracks it in the blink of an eye. In Quantum Key Distribution (QKD), quantum properties of photons such as polarisation state and entanglement can be used to create crypto-graphic keys. These keys can be seen as recipes that tell the recipient of some secret data what measurements of the photons are needed to properly decode and access the data.

The current problem is that, right now, there is no existing infrastructure to determine if a QKD system is actually safe when integrated into existing telecommunication infrastructure. 

Hence, the new testbed will help ascertain if a QKD system is viable and safe for societal use and a number of existing research projects at TU/e are already conducting tests with autonomous driving cars, on the campus and its environments. 

The promise for quantum technology is enormous. But it will require significant development before we reach the potential of a totally secure quantum Internet connecting everyone around the globe.

Eindhoven TU/e:    QuantumXC:    NIST:   American Scientist:    I-HLS:   Investment Monitor:   Vista Insurance:  

You Might Also Read: 

Special Measures To Deal With Quantum Technology:

 

« VPN Configuration: Understanding DNS Leaks & How to Prevent Them
Locking Down Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.