Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Gear News of the Week: Insta360 Debuts a Drone Company, and DJI Surprises With an 8K 360 Camera

2 August 2025

Peacock Feathers Are Stunning. They Can Also Emit Laser Beams

2 August 2025

Security News This Week: Google Will Use AI to Guess People’s Ages Based on Search History

2 August 2025
Facebook X (Twitter) Instagram
Just In
  • Gear News of the Week: Insta360 Debuts a Drone Company, and DJI Surprises With an 8K 360 Camera
  • Peacock Feathers Are Stunning. They Can Also Emit Laser Beams
  • Security News This Week: Google Will Use AI to Guess People’s Ages Based on Search History
  • Trump Promised to ‘Drill, Baby, Drill.’ The New Rigs Are Nowhere to Be Found
  • The 11 Best Coolers We’ve Tested for Every Kind of Adventure
  • Vivo Y400 5G: Launch Date, Expected Price in India and Specifications
  • Uber’s Drive to Become the Kleenex of Robotaxis
  • Silent Hill F Impressions And Ninja Gaiden: Ragebound | The Game Informer Show
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Cryptographers Are Discovering New Rules for Quantum Encryption
News

Cryptographers Are Discovering New Rules for Quantum Encryption

News RoomBy News Room30 June 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

The original version of this story appeared in Quanta Magazine.

Say you want to send a private message, cast a secret vote, or sign a document securely. If you do any of these tasks on a computer, you’re relying on encryption to keep your data safe. That encryption needs to withstand attacks from code breakers with their own computers, so modern encryption methods rely on assumptions about what mathematical problems are hard for computers to solve.

But as cryptographers laid the mathematical foundations for this approach to information security in the 1980s, a few researchers discovered that computational hardness wasn’t the only way to safeguard secrets. Quantum theory, originally developed to understand the physics of atoms, turned out to have deep connections to information and cryptography. Researchers found ways to base the security of a few specific cryptographic tasks directly on the laws of physics. But these tasks were strange outliers—for all others, there seemed to be no alternative to the classical computational approach.

By the end of the millennium, quantum cryptography researchers thought that was the end of the story. But in just the past few years, the field has undergone another seismic shift.

“There’s been this rearrangement of what we believe is possible with quantum cryptography,” said Henry Yuen, a quantum information theorist at Columbia University.

In a string of recent papers, researchers have shown that most cryptographic tasks could still be accomplished securely even in hypothetical worlds where practically all computation is easy. All that matters is the difficulty of a special computational problem about quantum theory itself.

“The assumptions you need can be way, way, way weaker,” said Fermi Ma, a quantum cryptographer at the Simons Institute for the Theory of Computing in Berkeley, California. “This is giving us new insights into computational hardness itself.”

This Message Will Self-Destruct

The story begins in the late 1960s, when a physics graduate student named Stephen Wiesner started thinking about the destructive nature of measurement in quantum theory. Measure any system governed by the rules of quantum physics, and you’ll alter the quantum state that mathematically describes its configuration. This quantum measurement disturbance was a hindrance for most physicists. Wiesner, who took an unorthodox information-centric view of quantum theory, wondered whether it could be made useful. Perhaps it could serve as a form of built-in tamper protection for sensitive data.

But Wiesner’s ideas were too far ahead of their time, and he left academia after graduate school. Fortunately, he’d discussed his ideas with his friend and fellow physicist Charles Bennett, who unsuccessfully tried to interest others in the subject for a decade. Finally, in 1979, Bennett met the computer scientist Gilles Brassard while swimming off the coast of Puerto Rico during a conference. Together, they wrote a groundbreaking paper describing a new approach to an important cryptographic task. Their protocol was based on quantum measurement disturbance, and needed no assumptions about the difficulty of any computational problems.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFisker Went Bankrupt. What Do Its EV Owners Do Next?
Next Article This cool new phone shows what’s wrong with Motorola in 2024

Related Articles

News

Gear News of the Week: Insta360 Debuts a Drone Company, and DJI Surprises With an 8K 360 Camera

2 August 2025
News

Peacock Feathers Are Stunning. They Can Also Emit Laser Beams

2 August 2025
News

Security News This Week: Google Will Use AI to Guess People’s Ages Based on Search History

2 August 2025
News

Trump Promised to ‘Drill, Baby, Drill.’ The New Rigs Are Nowhere to Be Found

2 August 2025
News

The 11 Best Coolers We’ve Tested for Every Kind of Adventure

2 August 2025
News

Uber’s Drive to Become the Kleenex of Robotaxis

2 August 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Phones

Vivo Y400 5G: Launch Date, Expected Price in India and Specifications

News Room2 August 2025
News

Uber’s Drive to Become the Kleenex of Robotaxis

News Room2 August 2025
Gaming

Silent Hill F Impressions And Ninja Gaiden: Ragebound | The Game Informer Show

News Room2 August 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025128 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Trump Promised to ‘Drill, Baby, Drill.’ The New Rigs Are Nowhere to Be Found

2 August 2025

The 11 Best Coolers We’ve Tested for Every Kind of Adventure

2 August 2025

Vivo Y400 5G: Launch Date, Expected Price in India and Specifications

2 August 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.