Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption

Hackers Eavesdrop On Quantum Crypto With Lasers 161

Martin Hellman writes "According to an article in Nature magazine, quantum hackers have performed the first 'invisible' attack on two commercial quantum cryptographic systems. By using lasers on the systems — which use quantum states of light to encrypt information for transmission —' they have fully cracked their encryption keys, yet left no trace of the hack.'"
This discussion has been archived. No new comments can be posted.

Hackers Eavesdrop On Quantum Crypto With Lasers

Comments Filter:
  • Re:pwned (Score:2, Interesting)

    by yahwotqa ( 817672 ) on Monday August 30, 2010 @05:00AM (#33413182)
    From TFA:

    Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without disturbing it.

    So, I guess the encryption system used here isn't really "quantum", since above doesn't apply, is it?

  • by MichaelSmith ( 789609 ) on Monday August 30, 2010 @05:01AM (#33413186) Homepage Journal

    Eve gets round this constraint by 'blinding' Bob's detector — shining a continuous, 1-milliwatt laser at it.

    So Bob could just detect the blinding signal and stop transmitting.

  • Commercial Systems (Score:3, Interesting)

    by iYk6 ( 1425255 ) on Monday August 30, 2010 @05:32AM (#33413276)

    I was surprised to discover that there were commercial systems of quantum cryptography. Quantum cryptography is academic at this point. It is not as strong as old fashioned cryptography (like AES) and is much more expensive. Then I realized that there is no reason that someone can't use both. It would be pretty ridiculous if someone were using quantum cryptography as their only security, and not encrypting the data first with old fashioned cryptography.

  • by PseudonymousBraveguy ( 1857734 ) on Monday August 30, 2010 @05:41AM (#33413304)

    Quantum cryptography is academic at this point. It is not as strong as old fashioned cryptography (like AES) and is much more expensive. Then I realized that there is no reason that someone can't use both.

    Quantum crypto (at this point) is a key exchange mechanism. Thus, it doesn't compare to AES at all. You HAVE to use quantum crypto together with a classical exncryption algorithm. However, if you use quantom crypto you care about 100% theoretical security. Else you would simply use DH or any other well-known classical key exchange. And if you care about 100% theoretical security, there is no alternative to OTP.

  • by julesh ( 229690 ) on Monday August 30, 2010 @06:32AM (#33413418)

    Except that to be able to use quantum crypto at all, you need to provide a physical way to pass the quantum state. And with that requirement, why won't you just pass the key the good old fashioned way? Strictly more secure, and much cheaper.

    More secure? Hardly. All you have to do is eavesdrop on the key exchange and you have the key. In a real world scenario, typically this means bribing a few security guards, breaking into one of the communicators' homes or offices and retrieving the key from their computer, or intercepting a message sent over a physical line, probably encrypted via a non-100%-reliable cryptographic system, with the (at least) theoretical possibility that the encryption on the key exchange can be broken.

    In a properly implemented quantum crypto system, this is theoretically impossible: the key passes directly from one endpoint to the other, and any interference between the two is easily detectable. It isn't stored for longer than the message takes to be sent, so breaking in to retrieve it is impractical. Done properly, the quantum crypto system is as secure as it is possible to be. As it happens, the system here was not done properly; it failed to detect interference on the line (and as ability to detect interference is, essentially, the point of quantum crypto, this is bad news).

  • Re:pwned (Score:5, Interesting)

    by maxwell demon ( 590494 ) on Monday August 30, 2010 @08:41AM (#33413850) Journal

    Well, there are several points here:

    • Every cryptographic security is only up to possible bugs in the implementation (remember the Debian ssh problem?), so exactly 100% security is impossible. However, one difference betweeen the classical and quantum case is that in the quantum case any possible exploit has to be "online" (i.e. you have to actually intercept the actual sent message and manage to manipulate the receiving system), while for classical key exchange the breaking can also be after the fact (i.e. if all you want is the exchanged information, you can passively record all data and then try to break it afterwards). This means that
      1. all communications performed before that exploit was found remains secure (unlike classical protocols where you only need the recorded data to apply any exploit), and
      2. since the attacker has to manipulate the systems during operation, as soon the exploit is known you can take additional measures in order to detect it (e.g. in this case, I think it should be quite easy to detect a relatively strong laser which is continuously shining at the receiving device), thus detecting whether someone tries to exploit it (unlike classical systems, where you have no clue if someone tries to attack your cryptographic system). That is, instead of replacing your whole cryptographic infrastructure (which may be expensive), you can simply add detectors for the manipulation needed for the exploit, so that you only transmit confidential information in case the exploit isn't applied.
    • As the article mentions, the commercial systems add the quantum cryptography on top of the classical cryptography. So if the quantum cryptography is broken, you still have the security of the classical system. On the other hand, if the classical system used is broken (be it because the underlying cryptographic scheme is broken, or be it by exploiting a bug in the specific implementation) then you still have the security of the quantum cryptography.
  • by Anonymous Coward on Monday August 30, 2010 @09:15AM (#33414142)

    In a real world scenario, typically this means bribing a few security guards, breaking into one of the communicators' homes or offices and retrieving the key from their computer, or intercepting a message sent over a physical line

    Using the old fashioned way, you divide the key into 5 or 6 pieces before it leaves the cryptosystem, you distribute responsibility of the pieces. The pieces are stored on devices, and given to guards.

    The guards have physical possession of the devices, but not the PIN number for that piece.

    None of the pieces assist in reassembling the key without all other pieces present.

    Key pieces are not brought back together until brought to the destination system's crypto module.

    Nothing other than dedicated crypto modules ever have access to the key for securing your initial key exchange, and these get kept locked up.

    Security guards protect physical access to the communication endpoints, but do not possess the credentials to activate them; plus multiple combinations and keys are required to even open the safe with any hardware required for securing further key exchanges.

    You can perform key rollovers whether you use quantum or traditional crypto. You transmit the new public key digitally signed with the old private key, over a message encrypted with the current session key.

    Then you transmit the new symmetric key, encrypted with the peer's new public key, in a message encrypted with the current symmetric key.

    If your adversary can compromise crypto equipment under high security, quantum crypto won't protect you.

    The benefits of quantum crypto are mostly theoretical.

    However, obviously someone believes the technology is more proven than it is, as they're trying to base commercial systems on the promise.

    If they are relying on quantum key exchange as their only security of the key exchange, at this point, they are foolish.

  • by SeekerDarksteel ( 896422 ) on Monday August 30, 2010 @09:38AM (#33414298)
    The article is either missing massive details or these researchers are vastly overstating the power of their technique. The entire _point_ of quantum key exchange is that if Eve intercepts the signal she cannot tell if she read a 0 or a 1 because she does not know which basis the 0 or 1 was generated in. Even IF Eve passed a 1 along every time she read a 1, when Alice and Bob go to do the basis comparison over the standard channel they will notice errors because Eve read the signal in the wrong basis and passed along an incorrect value.

    I've tried reading the actual journal paper, but unfortunately they just seem to handwave this problem away. Maybe there's a reason they can, but its sure as hell not explained as far as I can see unless they're assuming Eve has also compromised the classical channel as well as the quantum channel.
  • Re:pwned (Score:5, Interesting)

    by WED Fan ( 911325 ) <akahige@tras[ ]il.net ['hma' in gap]> on Monday August 30, 2010 @09:40AM (#33414314) Homepage Journal
    Why the GP was modded troll is beyond me. This is a "huge kick in the balls". Isn't the point of QC to make it easy to detect if someone has even listened in, let alone broken anything? I'd have to say that what it means is the current implementation of QC is an epic fail. Back to the old drawing board.
  • by Vadim Makarov ( 529622 ) <makarov@vad1.com> on Monday August 30, 2010 @10:25AM (#33414754) Homepage
    with the manufacturer's full approval to boot

    I'm not sure the manufacturers would approve the existence of our lab [iet.ntnu.no] if they could dictate it. Thankfully we are independent and need not seek their approval. The manufacturers did appreciate responsible disclosure, though. I don't know how this hacking affects their business in the short term (may as well be detrimental to sales), even though it is surely good for business in the long term as it leads to more secure systems.
  • Re:pwned (Score:3, Interesting)

    by GameboyRMH ( 1153867 ) <gameboyrmh&gmail,com> on Monday August 30, 2010 @11:33AM (#33415544) Journal

    This wouldn't even work if this quantum link weren't so simple. This system is at least as simple as a serial link, and what they've done is like unplugging that link from the intended recipient computer and plugging it into their own.

    It looks like the only real security in the system 100% depended on MITMs being impossible - which is still true (from what I understand) - they've just diverted the traffic altogether rather than doing a MITM.

    If there were any authentication involved or the data being sent was actually encrypted this would be a non-issue.

"Engineering without management is art." -- Jeff Johnson

Working...