The Quantum Internet Could Be Immune To Cyber Attack

We have become used to the current state of the Internet and most users have a general understanding about how things work online. But the Internet is not always secure and the risk of falling victim to cyber attacks is increasing daily, especially for those users not taking adequate precautions.

The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can be swiftly decoded by a quantum computer.

A new type of computer, based on quantum physics rather than standard electronics, could break most modern cryptography. The effect would be to render communications as insecure as if they weren’t encoded at all - meaning that state secrets, medical records and banking systems would all be vulnerable once the quantum computer becomes a reality.

But the power of quantum technologies could also be used against quantum technologies, with the aim of protecting our data against quantum hacking and researchers have now discovered a new quantum computing method that will allow for safer and more secure connections in many applications.

Eindhoven University of Technology is currently setting up a unique testbed to validate this technology in several societal settings, thus paving the way for a fast and unhackable quantum Internet. 

Taking autonomous driving as the first use case, the researchers aim to have the world’s first quantum-secured autonomous driving car ready by next year. Idelfonso Tafur Monroy, TU/e Professor at the Electro-Optical Communication group and the Center for Quantum Materials and Technology Eindhoven (QT/e) recognises the particular threat to systems that require a lot of accurate control, such as autonomous driving. “For example, a hack could trick others into thinking your car is in a different location, slowing down, or changing direction,” he says. “It is even possible that your car is hacked and commandeered by someone external to the vehicle.”

The immense computing power of quantum is especially useful in calculations with many different outcomes: these can be done in one operation at the same time. 

To crack current encryption, a conventional computer takes an unacceptable length of time to test every possible solution. A quantum computer tries them all at once and cracks it in the blink of an eye. In Quantum Key Distribution (QKD), quantum properties of photons such as polarisation state and entanglement can be used to create crypto-graphic keys. These keys can be seen as recipes that tell the recipient of some secret data what measurements of the photons are needed to properly decode and access the data.

The current problem is that, right now, there is no existing infrastructure to determine if a QKD system is actually safe when integrated into existing telecommunication infrastructure. 

Hence, the new testbed will help ascertain if a QKD system is viable and safe for societal use and a number of existing research projects at TU/e are already conducting tests with autonomous driving cars, on the campus and its environments. 

The promise for quantum technology is enormous. But it will require significant development before we reach the potential of a totally secure quantum Internet connecting everyone around the globe.

Eindhoven TU/e:    QuantumXC:    NIST:   American Scientist:    I-HLS:   Investment Monitor:   Vista Insurance:  

You Might Also Read: 

Special Measures To Deal With Quantum Technology:

 

« VPN Configuration: Understanding DNS Leaks & How to Prevent Them
Locking Down Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Dark Intelligence

Dark Intelligence

Dark Intelligence, created by Protective Intelligence, is the world’s first independent Dark Web Security Operations Centre.

Drumz

Drumz

Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.