Quantum Bayesian Networks

January 6, 2014

Quantum Cryptography Succumbs to an ANT

Filed under: Uncategorized — rrtucci @ 11:50 pm

Check out

NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware
At the blog http://leaksource.wordpress.com

Great article, full of leaked documents (not conspiracy theories). Random excerpt:

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

I’m not going to try to address in this blog post all the ramifications of these NSA revelations. All I want to do now is to discuss the implications of these revelations for quantum cryptography, which is often sold in the same package as quantum computers, but shouldn’t be. They are quite different. One has huge potential, and the other one is a bust, in my opinion.

As I’ve often said in this blog, quantum crypto is “pointless”. (I’m no crypto expert, but crypto expert Bruce Schneier has written a blog post expressing the same opinion).

Quantum crypto is like a Dutch boy using one of his fingers to plug a small hole in the dike, while at the same time a million gallons/sec of water are pouring over the dike.

Quantum crypto is probably a joke to the NSA. Those guys don’t care about the etiquette of mathematical proofs. They snicker at the premises of a mathematical theorem claiming that a quantum crypto protocol is impossible to break. What they believe in is the old adage that “All is fair in love and war”.

The reasons I believe that quantum crypto is pointless are very simple. Quantum crypto can only protect data that is being transmitted from point A to point B. It cannot protect stored data (like the data stored in your computer hard drive). Indeed, who would want to store their precious data in the form of a super-fragile quantum state? Since it can’t protect stored data, quantum crypto would provide almost zero protection against NSA’s shenanigans.

Before QC’s arrive, we can protect stored data using classical crypto protocols already in use. After QC’s arrive, the only way to protect stored data will be using post-quantum crypto (i.e., non-quantum crypto that cannot be broken with a QC). Anyway you slice the pie, we will need post-quantum crypto once we have QC’s. So, once we have QC’s, just use post-quantum crypto to protect all data, stored and transmitted. Thus, there will never be, pre or post QC, any need for quantum crypto.

  • Commercial companies that started selling quantum crypto 10-15 years ago, but were forced to diversify or die because the market for quantum crypto is non-existent: ID Quantique, Magiq

  • Academic institutions that have spent millions of dollars on quantum crypto: IQC (Institute for Quantum Computing, at Waterloo, Canada. Funded about half and half by Blackberry cofounder Mike Lazaridis and Canadian taxpayers)

  • American defense companies that have received millions of dollars in defense contracts to build large quantum crypto networks (the proverbial bridge to nowhere): the BBN branch of Raytheon.

  • US Defense Laboratories (that we know of) that have spent millions of dollars building a quantum crypto network: LANL (Los Alamos National Lab) (see “Los Alamos reveals it’s been running quantum network for two and a half years” May 07, 2013). It would be surprising if MIT Lincoln Lab wasn’t involved in something like this too, since they do a lot of quantum optics and communications work, plus they are located in the same city (Boston) as BBN Raytheon, plus they often collaborate with Raytheon.

China also has a hefty quantum crypto program.

1 Comment »

  1. lying liar dishonest
    Artur Ekert is a con man who is selling quantum cryptography snake oil to the people of Singapore. Oxford University, to which Ekert is affiliated, must be very proud of its East India Company representative in Singapore.

    For posterity, I am posting below, in its entirety, an essay which Ekert wrote and posted in several news outlets (e.g.here), on April 15, 2014. I find his mendacity breathtaking.

    Commentary
    Quantum physics may be key to keeping data safe
    By
    Artur Ekert
    Published: April 15, 4:12 AM

    -Photo-
    Devices that perform simple quantum cryptography protocols have been used in banking. They do not do device-independent cryptography, but technology may mature to the level at which such schemes can be implemented. Photo: Reuters

    Every day, we share information about ourselves over telephone calls, email messages and Internet transactions. Our lives are increasingly digitised and our social connections literally networked. Thanks to United States government documents leaked last year, we know how little of this data traffic is private.

    Even encrypted data is vulnerable. In documents disclosed by Edward Snowden, the US National Security Agency was revealed to have a programme called Penetrating Hard Targets with a goal of cracking strong encryption. An element was “to determine if, and how, a cryptologically useful quantum computer can be built”.

    It is well known that a quantum computer, which uses physics inaccessible to conventional computers to speed up calculations, can crack RSA — one of the most widely used encryption systems today.

    This month, news of the Heartbleed bug in the implementation of supposedly secure Internet protocols reminds us that even well-meant attempts to protect us can go wrong.

    So what can individuals, organisations and governments concerned about keeping our secrets do? What are the ultimate limits of privacy?

    Researchers in Singapore and elsewhere are developing a form of cryptography that could end the long-running battle between code-makers and code-breakers. It promises that we can communicate secretly even when we do not trust our devices; we can certify their security without knowing every detail of their implementation.

    What’s more, the scheme is resistant to enemies with superior technology. You can be surrounded by the most powerful adversaries you can possibly imagine and still keep your data secure.

    THE QUANTUM OF SOLACE

    When technical buzzwords are stripped away, all we need to communicate secretly is a sequence of random bits — just 1s and 0s. These bits make a cryptographic key.

    To encrypt your message, you convert it into 1s and 0s, like the codes inside computers. Then, bit by bit, you add the key to your message. The random bits scramble the message. The result is easily deciphered by someone having the same cryptographic key, but cannot be cracked by anyone else.

    For this technique to be secure, it is vital that the key bits are truly random, never reused and securely delivered. So, the problem is: How do we make and share such keys?

    In 1991, I proposed a way to use quantum physics to distribute a cryptographic key. Unlike encryption techniques that get their security from being computationally hard to hack, quantum cryptography relies on the laws of physics for protection.

    Quantum physics is our best description of how the world operates at its most fundamental level. It describes how individual particles of matter and light, atoms and photons, behave and interact. The scheme I invented shares a key between two people (let’s call them Alice and Bob) using pairs of quantum “entangled” photons.

    A source of entangled photons can be placed anywhere — with Alice, Bob or adversarial Eve, on a satellite or in any location whatsoever — as long as Alice and Bob are able to receive photons from the source. These photons may be beamed through open air or, like light signals that carry Internet traffic, be sent through optical fibre.

    Alice and Bob measure the polarisation of each photon (polarisation is the phenomenon in which light points in a particular direction, like the polarised glare that sunglasses block) as being 1 or 0.

    Quantum physics tells us the result for an individual photon is random, but that Alice and Bob’s results for each pair must be correlated — they will match — thanks to their entanglement.

    With a few extra steps, this is how Alice and Bob end up with matching cryptographic keys. Any eavesdropping attempt introduces a mismatch to the keys, which Alice and Bob can detect by openly comparing a portion and discarding the key if it is insecure.

    Recently, my Singapore colleague Valerio Scarani and others showed this idea to be more powerful than I originally thought, pioneering the concept of “device-independent” cryptography. They realised you can certify the security of devices simply by checking the correlation of Alice and Bob’s measurements.

    As long as our devices pass the test, we can confidently use equipment bought from any source, including an adversary. Remarkably, this check even guarantees security if the enemy has technology that is beyond our knowledge. More recently still, we have discovered that we do not even need to completely trust ourselves.

    Key distribution requires Alice and Bob to make random choices in the measurements they perform. What if these choices are manipulated; if we don’t have free will?

    Thanks to the discovery of a quantum trick to perform “randomness amplification”, as long as our choices are not completely predictable, we can communicate secretly.

    MAKING IT REAL

    Quantum cryptography is not only an academic curiosity. Devices that perform simple quantum cryptography protocols are already in the market and have been used in banking and voting.

    They do not do “device-independent cryptography” with entangled photons, but technology under development may sooner or later mature to the level at which such schemes can be implemented. This kind of cryptography is on the edge of being feasible in research labs.

    Singapore is among the world leaders in this field. My colleagues at the Centre for Quantum Technologies here already demonstrated some years ago the cryptography scheme I had first proposed. Professor Christian Kurtsiefer and Assistant Professor Alexander Ling used lasers and telescopes on the rooftops of buildings to exchange a secret key across the NUS campus using entangled photons.

    Now, we are working towards making the kind of correlation measurements that will certify device-independent schemes and developing compact, rugged quantum devices that can form nodes in a future quantum network.

    We even plan to test a device on a satellite as satellites can distribute keys over long distances.

    With world experts also in the theory of cryptography, everything is in place for us to make fast progress.

    I think the day when we stop worrying about untrustworthy or incompetent providers of cryptographic services may not be that far away.

    ABOUT THE AUTHOR:

    Professor Artur Ekert is Director of the Centre for Quantum Technologies and Lee Kong Chian Centennial Professor at the National University of Singapore. He is also Professor of Quantum Physics at the University of Oxford in the United Kingdom. An article, titled The ultimate physical limits of privacy, on the same subject by Prof Ekert and Renato Renner has been published in the international journal Nature.

    Comment by rrtucci — April 17, 2014 @ 3:16 am


RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Blog at WordPress.com.

%d bloggers like this: