{"id":9628,"date":"2020-09-09T07:37:10","date_gmt":"2020-09-09T07:37:10","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=9628"},"modified":"2023-11-08T11:08:41","modified_gmt":"2023-11-08T11:08:41","slug":"quantum-cryptography-vs-quantum-hacking-a-cat-and-mouse-game","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/quantum-cryptography-vs-quantum-hacking-a-cat-and-mouse-game\/","title":{"rendered":"Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9628\" class=\"elementor elementor-9628\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a1334d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1334d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29eb7b6d\" data-id=\"29eb7b6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b67e88c elementor-widget elementor-widget-text-editor\" data-id=\"4b67e88c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Takeaway:<\/strong>\u00a0<em>As the quantum technologies start to become a reality, this cybersecurity quandary has recently taken the form of a true cat vs. mouse game. Since it\u2019s still to early to predict how this hack (pun intended) &amp; slash story will unfold, let\u2019s trace it back to its origins to know what happened so far and what is happening now.<\/em><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The world of\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/10282\/information-security-is\" class=\"broken_link\" rel=\"noopener\">information security<\/a>\u00a0really looks the historical challenge between weapons vs. armors in the military sector. As a new form of apparently unbreachable defense is developed, a new weapon gets invented to pierce through even the thickest armor.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>No matter how ideally\u00a0<a href=\"https:\/\/vpn-review.com\/cybersecurity-tips-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">secure your cybersecurity strategy<\/a>\u00a0may look, new hacking strategies will find a way to get over, around, or through it in due time.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>As the\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/34023\/quantum-advantage\" class=\"broken_link\" rel=\"noopener\">quantum technologies<\/a>\u00a0start to become a reality, this\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/24747\/cybersecurity\" class=\"broken_link\" rel=\"noopener\">cybersecurity<\/a>\u00a0quandary has become a true cat vs. mouse game. Since it\u2019s still too early to predict how this hack (pun intended) &amp; slash story will unfold, let\u2019s trace it back to its origins to know what happened so far and what&#8217;s happening now.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c816766 elementor-widget elementor-widget-heading\" data-id=\"c816766\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Chapter One: Quantum Hacking<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7a8d89 elementor-widget elementor-widget-text-editor\" data-id=\"b7a8d89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the beginning, there was\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/1770\/cryptography\" class=\"broken_link\" rel=\"noopener\">cryptography<\/a>. Even today,\u00a0<a href=\"https:\/\/gizmodo.com\/u-s-government-has-69-proposed-candidates-for-quantum-1823084809\" target=\"_blank\" rel=\"noreferrer noopener\">public key cryptography<\/a>\u00a0is most basic yet effective\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/5507\/encryption\" class=\"broken_link\" rel=\"noopener\">encryption<\/a>\u00a0technique to protect your data from malicious actors and keep it away from prying eyes. Schemes like the popular\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/21852\/rsa-encryption\" class=\"broken_link\" rel=\"noopener\">RSA<\/a>\u00a0one, are based upon a relatively simple assumption: even the most potent computer currently available does not have the computing power to\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/1773\/decryption\" class=\"broken_link\" rel=\"noopener\">decrypt<\/a>\u00a0these keys.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So far, so good. However, there\u2019s an issue, that at least for now, is largely theoretical. There\u2019s a way to break the code.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The so-called Shor\u2019s algorithm is a one-of-a-kind algorithm for integer factorization that can break the RSA scheme. The issue is that it only works on\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/5735\/quantum-computer\" class=\"broken_link\" rel=\"noopener\">quantum computers<\/a>\u00a0since they can exist in multiple states and solve a large number of problems at the same time with the same processing power. And while this technology still doesn\u2019t exist, it\u2019s only a matter of time before it will.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In other words, when quantum computers will start to see the light, quantum hacking will become a serious threat since it will be able to defeat all current encryption schemes. And while the cybersecurity experts are busy moving to quantum-resistant cryptography before the quantum hacking apocalypse occurs, there are\u00a0<a href=\"https:\/\/www.idginsiderpro.com\/article\/3454845\/has-the-quantum-crypto-break-already-happened.html\" class=\"broken_link\" rel=\"noopener\">some who claim that<\/a>\u00a0the day of the dreaded quantum crypto break may have already happened.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89b7b3e elementor-widget elementor-widget-heading\" data-id=\"89b7b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Chapter Two: Post-Quantum Cryptography<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25b3ca3 elementor-widget elementor-widget-text-editor\" data-id=\"25b3ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To staunch the risk of quantum hacking, someone thought about developing quantum cryptography because, well, it makes sense to fight fire with fire, doesn&#8217;t it? Lo and behold, here it comes post-quantum cryptography, also known as quantum encryption.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Post-quantum cryptography is an umbrella term that encompasses several different approaches, all aimed at making much harder (when not impossible) for quantum computers to break the encryption schemes. All these approaches are currently theoretic, so it\u2019s hard to tell which one will become\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3235970\/what-is-quantum-cryptography-it-s-no-silver-bullet-but-could-improve-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">the new security standard<\/a>\u00a0when quantum computing becomes mainstream.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The first idea is pretty straightforward \u2014 creating longer\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/25403\/encryption-key\" class=\"broken_link\" rel=\"noopener\">encryption keys<\/a>\u00a0so that even quantum computers can\u2019 break them. The cons of this approach are quite self-explanatory, however. To stay ahead of quantum computers, key length will have to increase substantially, making encryption slower and significantly more expensive.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2c37e1 elementor-widget elementor-widget-text-editor\" data-id=\"a2c37e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Longer symmetric keys can also be used since quantum computers have no real edge over traditional ones in decrypting systems like SNOW 3G or AES. A somewhat half-way approach could be to use\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/1789\/symmetric-encryption\" class=\"broken_link\" rel=\"noopener\">symmetric encryption<\/a>\u00a0for the messages, and asymmetric encryption only for the keys.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Since symmetric key management systems such as\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/3996\/kerberos\" class=\"broken_link\" rel=\"noopener\">Kerberos<\/a>\u00a0and the 3GPP Mobile Network Authentication Structure are already available, expanding them can be much more feasible than developing something new from scratch.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Lattice-based cryptography is another potential solution and currently the leading candidate for post-quantum security since it\u2019s the most practical to implement. For years, schemes like NTRU encryption or the ring-LWE algorithms have been repeatedly tested and proved to be resistant enough.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8d995 elementor-widget elementor-widget-text-editor\" data-id=\"2e8d995\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.techopedia.com\/definition\/27904\/quantum-key-distribution-qkd\" class=\"broken_link\" rel=\"noopener\">Quantum key distribution<\/a>\u00a0(QKD) currently is the most promising method to create completely secured encryption keys by sending subatomic particles through a fiberoptic line. China is particularly ahead with this technology, and may have found a way to address some of the current limitations of QKD. Instead of utilizing specifically-enhanced high-speed fiber optics communication equipment, scientists found a way to leveraging existing fiber networks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>However, QKD still require the use of relays and repeaters, as well as routers and hubs when messages travel long distances. All of them represent a potentially weak point that hackers could use to break into the network and steal the encryption code.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aebb5c elementor-widget elementor-widget-heading\" data-id=\"6aebb5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Chapter Three: Defeating Post-Quantum Cryptography<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8189af8 elementor-widget elementor-widget-text-editor\" data-id=\"8189af8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As the story unfolds, things become even more complicated and the hacking cat may catch the cybersecurity mouse once again. As it always happens in the cybersecurity landscape, once a technology to secure data is discovered, hackers will find a technology to break it again. So here you go: let me present you\u00a0<a href=\"https:\/\/www.technologyreview.com\/s\/613079\/theres-a-new-way-to-break-quantum-cryptography\/\" target=\"_blank\" rel=\"noreferrer noopener\">injection locking<\/a>, a laser technique to go &#8220;pew-pew&#8221; on quantum cryptography.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>As we explained in the previous paragraph, QKD uses photons to encode information, which are measured by the receiver to decrypt it. Anyone who tries eavesdropping the communication between sender and receiver will change the message.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In fact, the mere action of measuring the quantum properties of each photon unavoidably alters the information exchanged. This is the basic assumption of QKD: whenever the key to decrypt the information sent is changed before it reaches the receiver, the transmission is stopped to prevent anyone from overhearing it.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>What has been found, however, is that quantum communication can be attacked by changing the frequency of a laser. Photons with a different seed frequency are injected into the cavity so that the laser can resonate with it, effectively altering the output frequency. However, the frequency of the outgoing photons can be altered only if the polarization of the injected photon matches the outgoing ones.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This means that the code can be revealed with a 60% success rate by measuring the photons injected rather than the outgoing ones, leaving these ones completely unaltered.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Here you go, all your plans for security destroyed.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ad5a4 elementor-widget elementor-widget-heading\" data-id=\"c9ad5a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Final Thoughts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-844b159 elementor-widget elementor-widget-text-editor\" data-id=\"844b159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Will the cat eventually catch the mouse, or is the rodent going to escape the feline\u2019s claw forever (just like in a Tom &amp; Jerry cartoon?) Right now, it\u2019s way too early to know since quantum computers aren\u2019t even realized, yet.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>So, why are we talking about it at all? Because cybersecurity is a field where it&#8217;s critical to know the answer to a problem before that problem becomes just that.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As the quantum technologies start to become a reality, this cybersecurity quandary has recently taken the form of a true cat vs. mouse game. Since it\u2019s still to early to predict how this hack &#038; slash story will unfold, let\u2019s trace it back to its origins to know what happened so far and what is happening now. <\/p>\n","protected":false},"author":740,"featured_media":9629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[462,609,608],"ppma_author":[3585],"class_list":["post-9628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-cyber-security","tag-hacking","tag-quantum-cryptography"],"authors":[{"term_id":3585,"user_id":740,"is_guest":0,"slug":"claudio-buttice","display_name":"Claudio Buttic\u00e9","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7baf9ebc-2c25-4c4a-888d-7c1fc9aaf732-150x150.jpg","user_url":"https:\/\/www.medsnews.com\/","last_name":"Buttic\u00e9","first_name":"Claudio","job_title":"","description":"Dr. Claudio Buttic\u00e8, Pharm.D., a Freelance Journalist and Writer, is a former clinical and hospital pharmacist,. He is now an\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/User:Daimyo2\" target=\"_blank\" rel=\"noopener\">accomplished book author<\/a>\u00a0who has written on topics such as medicine, technology, world poverty, and science. His latest book is \"<a href=\"https:\/\/www.abc-clio.com\/ABC-CLIOCorporate\/product.aspx?pc=A5958C\">Universal Health Care<\/a>\". Many of his articles have been published in magazines such as\u00a0<a href=\"http:\/\/www.cracked.com\/members\/Tyresia2\/\" target=\"_blank\" rel=\"noopener\">Cracked<\/a>,\u00a0<a href=\"https:\/\/www.theelephant.info\/author\/cbuttice\/\" target=\"_blank\" rel=\"noopener\">The Elephant<\/a>,\u00a0<a href=\"http:\/\/www.digitaljournal.com\/user\/406448\/news\" target=\"_blank\" rel=\"noopener\">Digital Journal<\/a>,\u00a0<a href=\"https:\/\/trofire.com\/author\/cbutticedr\/\" target=\"_blank\" rel=\"noopener\">The Ring of Fire<\/a>, and\u00a0<a href=\"https:\/\/www.businessinsider.com\/italy-experiments-with-eating-insects-2016-2?IR=T\" target=\"_blank\" rel=\"noopener\">Business Insider<\/a>. He has also published pharmacology and psychology papers on several clinical journals and works as a medical consultant and advisor for many companies across the globe."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/740"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=9628"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9628\/revisions"}],"predecessor-version":[{"id":33987,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/9628\/revisions\/33987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/9629"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=9628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=9628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=9628"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=9628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}