"boffins praised their fellow egg-heads"
A hack against systems running quantum key cryptography only worked because of implementation errors, according to new research. A paper published in September demonstrated how the avalanche photo-detectors as used in quantum cryptography rigs might be blinded, essentially causing equipment to malfunction without generating an …
No matter how "secure" a particular method or algorithm may be, it is ALWAYS the implementation that leaves holes for the smart attacker. IE, the fundamentals may be unbreakable, but a human always is doing the actual implementation, and issues such as TTM (Time To Market) mean that corners will be cut when producing the actual software/hardware that will implement the algorithm. Human factors - hard to get around... :-)
I thought there was also an attack where an entangled triplet was achieved which meant there were potentially 2 photons with the same polarisation as the source. I think it needed physical access to the sending end. Is this still an issue or just a lab ‘vulnerability’? Anyone know?
... then the data is stored on a computer with a CD burner, with full unmonitored/unaudited access granted to every low-level Lady Gaga-loving flunky in the building.
Again, it seems to me that all a malicious person needs to do is "continually observe" a quantum data stream thereby alerting the subscribing parties of an intercept attempt.
Since they couldn't be sure the keys weren't compromised, they would never be able to established secure communications.
I'm curious to know how this apparent weakness will be foiled in operational systems.
No doubt 'system being tested' indicates the last of these probabilities.
Biting the hand that feeds IT © 1998–2017