QUANTUM-SECURE ENCRYPTION IN A SIMPLE AND INEXPENSIVE FORM 

QUANTUM-SECURE ENCRYPTION IN A SIMPLE AND INEXPENSIVE FORM 

Ever wondered about data security while dealing with various information on various platforms or about the quantum attacks that more than 80% of the population in India is witnessing. 

Data Security

Data Security is one of the most cardinal topics when dealing with diverse information.  
It can be described as a key distribution system in which a person sends information hidden behind a key which can be a long string of seemingly unassociated numbers. The receiver of that information can access the same if they possess another specific key. These keys are related in a mathematical way that is nearly impossible to guess but can easily be solved with the right algorithm or using a quantum computer.    

There have been various potential solutions for securing data against a “quantum attack”, of which, some of them have been commercialized as well. However, they are computationally high-end and require dedicated optical fibers or satellite links through lasers.

Quantum Cryptography

Quantum Cryptography can be explained as an encryption method that uses the naturally occurring properties of quantum mechanics to secure and transmit data in a way that cannot be hacked. It is the process of encrypting and protecting data so that the person who has the secret key can only decrypt it. It is different from traditional cryptographic systems which depend on physics, rather than mathematics, as the key aspect of its security model. It can be described as a system that is completely secure against being compromised without the knowledge of the information sender or the receiver. It points to the fact that it is impossible to copy or view data encoded in a quantum state without alerting the sender or receiver. It uses individual particles of light to transmit data over optic fiber. The security of the same depends on quantum mechanics. The secure properties include the following:

● particles can exist in more than one place or state at a time

● a quantum property cannot be observed without changing or disturbing it

● whole particles cannot be copied.


SPoTK

Shantanu Chakrabartty, a Professor in Clifford W. Murphy who is also a Vice Dean for Research and Graduate Education in the Preston M. Green Department of Electrical & Systems Engineering at the McKelvey School of Engineering has tailored a security system that is resistant to quantum attacks. Moreover, the system is inexpensive, more convenient and scalable without the need for fancy new equipment. 

Shantanu Chakrabartty

The new protocol for Symmetric Key Distribution referred to as SPoTK: A Protocol for Symmetric Key Distribution over Public Channels Using Self-Powered Timekeeping Devices does not require lasers or satellites or long new cables. It depends on tiny microchips embedded with even tinier clocks that run without batteries. The clocks are electrons that seem to transport themselves between two locations on the chip using quantum tunneling, which is a quantum mechanical phenomenon where a wave function propagates through a potential barrier. When the chips are created, their initial state is recorded on a computer server.

Next comes the encryption part where a secure channel is to be created. The creator must note the time on a subset of the clocks and send the information to the server, which can utilize its knowledge of the initial state to determine what time the clocks read. The server lets the creator know what the times were and if correct, a secure channel of communication has been opened.

The quantum nature of the electron’s transport adds a few extra layers of security; if they are measured, the clock collapses. It will disappear forever. Neither a spy nor the recipient can access the information. The SPoTKD could be used to ensure that the medical records are destroyed after being read by a doctor, or to enforce time limits on software licenses.
They can secure voting records or make sure that no one is reading your email.

Reference: https://source.wustl.edu/2022/03/tiny-cheap-solution-for-quantum-secure-encryption/

Also, Have a Look at : A Quantum Approach to IoT Security Management

Author