The Quantum Internet Could Be Immune To Cyber Attack

We have become used to the current state of the Internet and most users have a general understanding about how things work online. But the Internet is not always secure and the risk of falling victim to cyber attacks is increasing daily, especially for those users not taking adequate precautions.

The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can be swiftly decoded by a quantum computer.

A new type of computer, based on quantum physics rather than standard electronics, could break most modern cryptography. The effect would be to render communications as insecure as if they weren’t encoded at all - meaning that state secrets, medical records and banking systems would all be vulnerable once the quantum computer becomes a reality.

But the power of quantum technologies could also be used against quantum technologies, with the aim of protecting our data against quantum hacking and researchers have now discovered a new quantum computing method that will allow for safer and more secure connections in many applications.

Eindhoven University of Technology is currently setting up a unique testbed to validate this technology in several societal settings, thus paving the way for a fast and unhackable quantum Internet. 

Taking autonomous driving as the first use case, the researchers aim to have the world’s first quantum-secured autonomous driving car ready by next year. Idelfonso Tafur Monroy, TU/e Professor at the Electro-Optical Communication group and the Center for Quantum Materials and Technology Eindhoven (QT/e) recognises the particular threat to systems that require a lot of accurate control, such as autonomous driving. “For example, a hack could trick others into thinking your car is in a different location, slowing down, or changing direction,” he says. “It is even possible that your car is hacked and commandeered by someone external to the vehicle.”

The immense computing power of quantum is especially useful in calculations with many different outcomes: these can be done in one operation at the same time. 

To crack current encryption, a conventional computer takes an unacceptable length of time to test every possible solution. A quantum computer tries them all at once and cracks it in the blink of an eye. In Quantum Key Distribution (QKD), quantum properties of photons such as polarisation state and entanglement can be used to create crypto-graphic keys. These keys can be seen as recipes that tell the recipient of some secret data what measurements of the photons are needed to properly decode and access the data.

The current problem is that, right now, there is no existing infrastructure to determine if a QKD system is actually safe when integrated into existing telecommunication infrastructure. 

Hence, the new testbed will help ascertain if a QKD system is viable and safe for societal use and a number of existing research projects at TU/e are already conducting tests with autonomous driving cars, on the campus and its environments. 

The promise for quantum technology is enormous. But it will require significant development before we reach the potential of a totally secure quantum Internet connecting everyone around the globe.

Eindhoven TU/e:    QuantumXC:    NIST:   American Scientist:    I-HLS:   Investment Monitor:   Vista Insurance:  

You Might Also Read: 

Special Measures To Deal With Quantum Technology:

 

« VPN Configuration: Understanding DNS Leaks & How to Prevent Them
Locking Down Cyber Security »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

JSCAPE

JSCAPE

JSCAPE is a provider of managed file transfer, and secure FTP server software providing safe, seamless and reliable systems for data delivery worldwide.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.