Singapore researchers tapping quantum cryptography to enhance network encryption

This new crypto standard is unhackable and forms the cornerstone of my Blockchain 3.0 without using keys, even a supercomputer will have a hard time figuring out it’s secrets.

With *QKD technology, the laws of quantum theory — with the highly sensitive nature of quantum signals — are tapped to distribute private keys over an insecure network. They can detect any attempts on eavesdropping, offering a secure form of encrypted communication, according to the Singapore organisations. 

“The secret key is transmitted using a sequence of carefully prepared single-photon quantum signals. If the secret key is intercepted, the quantum signals will be disturbed and keys will be rendered useless,” they explained. “This enhances the security of digital communication as data cannot be intercepted or eavesdropped.”

The main drawback of Quantum Key Distribution is that it usually relies on having an authenticated classical channel of communications. In modern cryptography, having an authenticated classical channel means that one has either already exchanged a symmetric key of sufficient length or public keys of sufficient security level. With such information already available, one can achieve authenticated and secure communications without using QKD, such as by using the Galois/Counter Mode of the Advanced Encryption Standard. Thus QKD does the work of a Stream Cipher at many times the cost. Noted security expert Bruce Schneier remarked that quantum key distribution is “as useless as it is expensive”.[1]

Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key.[2] In real-world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm.

Contributed by Oogle.

*PS I created the concepts but I did not invent this technology. I can easily modify it for WiFi, LiFi, LTE, CDMA or any networks. This also forms part of my consensus mechanism except it is on a Distributed network based on DNS client using Mac address. Who knows how to decipher it? 

Author: Gilbert Tan TS

IT expert with more than 20 years experience in Multiple OS, Security, Data & Internet , Interests include AI and Big Data, Internet and multimedia. An experienced Real Estate agent, Insurance agent, and a Futures trader. I am capable of finding any answers in the world you want as long as there are reports available online for me to do my own research to bring you closest to all the unsolved mysteries in this world, because I can find all the paths to the Truth, and what the Future holds. All I need is to observe, test and probe to research on anything I want, what you need to do will take months to achieve, all I need is a few hours.​

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s