Hackers exploit quantom cryptography

  • Context: Graduate 
  • Thread starter Thread starter Kidphysics
  • Start date Start date
  • Tags Tags
    Cryptography hackers
Click For Summary

Discussion Overview

The discussion revolves around the vulnerabilities in quantum cryptography as highlighted by a recent article. Participants explore the implications of these vulnerabilities, the need for improved detection methods, and the potential for hackers to exploit quantum systems.

Discussion Character

  • Debate/contested

Main Points Raised

  • Some participants describe the hacking method as "simple, ingenious, and effective," suggesting a level of sophistication in the approach.
  • One participant emphasizes the need for better detectors that can accurately assess quantum states rather than simply recording binary values based on classical light pulses.
  • A participant expresses concern about the time lag between interference in the entangled state and the recording of messages, suggesting that this could be exploited by hackers to remain undetected.
  • Another participant speculates that the properties of quantum mechanics, such as the collapse of entangled states, should theoretically allow for more precise measurements of disturbances, although they acknowledge their limited understanding of quantum mechanics.

Areas of Agreement / Disagreement

Participants express differing views on the implications of the vulnerabilities in quantum cryptography, with no consensus reached on the effectiveness of current detection methods or the potential for exploitation by hackers.

Contextual Notes

Participants mention assumptions regarding the properties of quantum mechanics and the effectiveness of detection methods, but these assumptions remain unresolved within the discussion.

Physics news on Phys.org
So they need to make better detectors that don't just record a bit value of 1 if a classical "bright light pulse" is received
 
Thats an interesting article.
 
DrChinese said:
Welcome to PhysicsForums, Kidphysics!

Thank you Dr.C, I hope to learn as much as I can here, and I see that there are some really helpful people here too.

This article is troubling though. Someone pointed out that there would be a buffer in time between Eve's interference on the entangled state and the time Bob records a message. So one of the original hacker's response was that Eve could compensate this lag by cutting corners in the route from A to B, freeing up time needed to remain incognito.

I haven't learned about QM yet, but one would assume that collapsing an entangled state should lead to much more intimate and precise (especially with time) measurements of disturbance. At least, these are the properties QM can boast.
 

Similar threads

  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 4 ·
Replies
4
Views
1K
  • · Replies 0 ·
Replies
0
Views
2K
  • · Replies 46 ·
2
Replies
46
Views
6K
  • · Replies 7 ·
Replies
7
Views
6K
  • · Replies 63 ·
3
Replies
63
Views
9K
  • · Replies 1 ·
Replies
1
Views
3K
  • · Replies 3 ·
Replies
3
Views
3K
  • · Replies 5 ·
Replies
5
Views
8K
  • · Replies 3 ·
Replies
3
Views
2K