Some systems are inherently very difficult to hack, but given the proven problems of deployment and the ingenuity of attackers sidestepping security controls, it's unwise to describe anything as hack-proof – but that appeared to be the claim for a new quantum computer. However closer analysis shows the researchers qualified this claim, describing a ‘theoretically' hack-proof system in a report in Science Advances which explains the use of quantum encryption techniques in a new system developed at Duke University, The Ohio State University and Oak Ridge National Laboratory. It can create and distribute encryption codes at megabit-per-second rates- five to 10 times faster than existing methods.
EurekAlert quotes Daniel Gauthier, a professor of physics at The Ohio State University, as saying, "We are now likely to have a functioning quantum computer that might be able to start breaking the existing cryptographic codes in the near future. We really need to be thinking hard now of different techniques that we could use for trying to secure the internet."
The technique was reportedly demonstrated to be secure from common attacks, even in the face of equipment flaws that could open up leaks.
Previously they would transmit keys at relatively low rates - between tens to hundreds of kilobits per second - which are too slow for most practical uses on the internet. But Nurul Taimur Islam, a graduate student in physics at Duke, reports that by adjusting the time at which the photon is released, and a property of the photon called the phase, their system can encode two bits of information per photon instead of one. Along with high-speed detectors developed by Clinton Cahall, graduate student in electrical and computer engineering, and Jungsang Kim, professor of electrical and computer engineering at Duke, they power their system to transmit keys five to 10 times faster than other methods.
Encryption keys encoded in photons of light can be sent over existing optical fibre cable making it relatively straightforward to integrate this new transmitter and receiver into the current internet infrastructure.
While the researchers report that any attempt to hack a key exchange would leave errors on the transmission that could be easily spotted by the receiver, they acknowledge that real-world implementations of QKD require imperfect equipment, and these imperfections open up leaks that hackers can exploit.