Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Sunday January 21 2018, @09:02PM   Printer-friendly
from the I-do-NOT-see-what-you-did-there dept.

It looked like just another conference call. A panel of suited men sat at a table, large white name tags and water bottles before them. The man in the center, illuminated by fluorescent lights, spoke to a camera in front of him.

[...] The mics, cameras, and screens made for a seemingly ordinary—maybe even boring—meeting-by-telepresence. But behind the scenes, physicists were encrypting the videostream using arguably the most secure technology in existence. Bai and his colleagues were participating on the first-ever intercontinental, quantum-encrypted video conference.

And on Friday, the Chinese and Austrian researchers who engineered the call published how they did it in Physical Review Letters. Led by physicist Jian-Wei Pan of the University of Science and Technology of China, the team relied on networks of optical fiber, a handful of encryption algorithms, and a $100 million satellite that China launched in 2016—the only one specifically designed for quantum cryptography. "They've demonstrated a full infrastructure," says Caleb Christensen, the chief scientist at MagiQ Technologies, which makes quantum cryptography systems that connect a small number of users. "They've connected all the links. Nobody's done that with [quantum encryption] ever."

Story at: Wired


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by legont on Sunday January 21 2018, @09:44PM (7 children)

    by legont (4179) on Sunday January 21 2018, @09:44PM (#625822)

    It was not quantum encryption, but just quantum keys exchange. A very important step indeed, but the announcement is misleading.

    --
    "Wealth is the relentless enemy of understanding" - John Kenneth Galbraith.
    Starting Score:    1  point
    Moderation   +2  
       Interesting=1, Informative=1, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 0) by Anonymous Coward on Sunday January 21 2018, @10:33PM (6 children)

    by Anonymous Coward on Sunday January 21 2018, @10:33PM (#625844)

    And the relevance of this observation is...?

    • (Score: 1, Interesting) by Anonymous Coward on Monday January 22 2018, @04:27AM (5 children)

      by Anonymous Coward on Monday January 22 2018, @04:27AM (#625944)

      It's susceptible to the usual attacks on the encrypted signal. This is just like using a preshared key that's exchanged out of band.

      As the GP said, this is an important first step, but quantum encryption could offer far more protection, such as the ability to detect whether somebody else is listening in.

      • (Score: 2) by maxwell demon on Monday January 22 2018, @08:54AM (4 children)

        by maxwell demon (1608) on Monday January 22 2018, @08:54AM (#626000) Journal

        It's susceptible to the usual attacks on the encrypted signal.

        From the linked article, emphasis by me:

        This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China.

        One-time pad encryption is the one classical encryption method that is provably secure. There are no attacks on it. Provably.

        The only way to decode OTP-encrypted data is to get hold of the key. And that is what the quantum part is about: secure key sharing.

        --
        The Tao of math: The numbers you can count are not the real numbers.
        • (Score: 2) by tekk on Monday January 22 2018, @02:09PM (3 children)

          by tekk (5704) Subscriber Badge on Monday January 22 2018, @02:09PM (#626066)

          Of course, the problem with OTP is that the key has to be as long as the message, which makes it impractical for just about anything.

          • (Score: 0) by Anonymous Coward on Monday January 22 2018, @04:46PM

            by Anonymous Coward on Monday January 22 2018, @04:46PM (#626126)

            No, the length of the pad isn't what makes it impractical.
            You can break up a message into blocks of whatever size you want and you could apply a new pad for each block.
            The impracticality of one time pads lies with the transmission of the pad itself.
            How do you transmit the pad to use securely? It has to be encrypted... using some other encryption method.

          • (Score: 2) by maxwell demon on Monday January 22 2018, @07:33PM (1 child)

            by maxwell demon (1608) on Monday January 22 2018, @07:33PM (#626199) Journal

            That's not a problem if you can non-locally generate the key on the fly. Which is exactly what the quantum part provides.

            --
            The Tao of math: The numbers you can count are not the real numbers.
            • (Score: 0) by Anonymous Coward on Tuesday January 23 2018, @09:14PM

              by Anonymous Coward on Tuesday January 23 2018, @09:14PM (#626761)

              Correct, the tricky part is transmitting to the message sender the pad (or if you prefer to call it key) *securely.*
              My point was that the length of the pad having to match the length of the message is **not** the fundamental block to everyone using one time pad encryption.
              It is the secure transmission of the pad (key) that is the obstacle.
              Public key encryption is the worldwide standard because it doesn't have this problem.