Laser can crack 'unbreakable' quantum communications
London, Oct 4 : A new research has found that by shining a bright laser into sensitive equipment that uses the technology of quantum cryptography, makes it possible to hijack communications without a trace.
Quantum cryptography has been used by some banks to protect data, and even to hide election results in Switzerland last year.
But, according to a report in New Scientist, it has been discovered that shining bright light into the sensitive equipment needed makes it possible to possible to intercept messages without detection.
"It turns the equipment into a puppet-box that an eavesdropper can control," said Vadim Makarov from the Norwegian University of Science and Technology in Trondheim, who uncovered the vulnerability.
Quantum cryptography relies on both users sharing a secret key, each digit of which is encoded into the polarisation of an individual light photon.
"Alice", the sender, transmits a stream of photons signalling either 1s or 0s. But for each one she randomly chooses from one of two ways to encode the digit.
Because the receiver, "Bob", doesn't know which system Alice has used he must be able to decode both types and has two pairs of photon detectors - one for each system.
A beam splitter randomly directs each photon received to one of the pairs. If a photon reaches the correct pair it is decoded correctly, if not Bob receives a false result.
Once the transmission is over, Alice uses an unencrypted channel to tell Bob which system she used for each photon. Digits decoded wrongly are discarded to reveal the final secret key used to secure later communications.
In practise, these steps are carried out automatically by a computer system.
An eavesdropper, "Eve", who intercepts the transmission, must emulate Bob's detection method and then pass the data on to him unaltered to fool him everything is normal.
But, quantum mechanics makes that impossible. The message will have been changed by Eve's interception to contain errors that reveal her presence when Alice and Bob compare notes later.
Now, however, Makarov and colleagues from Sweden and Russia have shown that Eve could control Bob's equipment, so that they both decode exactly the same digits from Alice's transmission.
When Alice later tells Bob which photons he encoded wrong, Eve can learn the key by listening in on the unencrypted message, and there are no extra errors to give her away.
The method exploits the way a common type of photon counter can have its sensitivity reduced by a very bright flash of light.
ANI
-
LPG Crunch: Karnataka Brings New SOPs, Makes PNG Registration Mandatory for Businesses -
Hyderabad Gold Silver Rate Today, 30 March 2026: Check Fresh 24K, 22K, 18K Gold And Silver Prices In City -
Opinion Poll For Kerala Assembly Election 2026: Ldf Strength In Kannur And Kasaragod -
Tamil Nadu Polls 2026: Vijay Reveals Rs 645 Crore Assets, Rs 266 Crore in Banks; Know All His Declaration -
Mumbai Metro Line 9 Set for April 3 Launch, Dahisar-Mira Bhayandar to Get Direct Boost -
Trump Hints At Breakthrough With Iran Amid War Escalation, Calls Recent Move A ‘Sign Of Respect’ -
Rahul Arunoday Banerjee Autopsy Report: Actor Was Underwater For Over An Hour, Sand Found In Lungs -
West Bengal Assembly elections: Election Commission transfers heads of 173 police stations -
Delhi Weather Brings Relief: IMD Issues Yellow Alert For Rain, Thunderstorms And Gusty Winds; Check Forecast -
Tamil Nadu Elections 2026: Vijay Files Nomination Same Day as MK Stalin, Sets Up Symbolic Political Face-Off -
Too Close To Call? 57 Key Seats Could Decide West Bengal Election 2026 As TMC And BJP Gear Up For Tight Battle -
Kim Jong Un Oversees New Solid-Fuel Missile Engine Test, Claims Capability To Reach US Mainland












Click it and Unblock the Notifications