Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Australian scientists have developed the most efficient quantum security encryption algorithm LaV, which is now open source.

2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)11/24 Report--

CTOnews.com, November 19 (Xinhua) scientists from the School of Information Technology at Monash University in Australia and Data61, the data and digital expert department of the Australian Federal Scientific and Industrial Research Organization (CSIRO), have developed the most efficient quantum secure encryption algorithm to date, which they call "LaV".

The algorithm uses end-to-end encryption to resist the powerful attacks of quantum computers, so it is expected to enhance the security of systems such as online transactions, instant messaging services, data privacy, encrypted currencies and blockchains.

CTOnews.com noted that the paper was presented at the 43rd International Cryptography Conference in Santa Barbara, USA, and that the algorithm was open source on Gitlab. At present, the research team is trying to build a complete quantum security key transparency protocol to be deployed in encrypted applications.

According to reports, "end-to-end encryption" is a method of using encryption keys to protect digital communications between senders and recipients. Mobile message services such as WhatsApp and Signal use end-to-end encryption, so no one (including communication system providers, telecommunications providers, Internet providers, or hackers) can access the information transmitted between the sender and the receiver.

It may take millions of years for ordinary computers or even supercomputers to crack end-to-end encrypted data, but large quantum computers can crack it in minutes.

Dr. Muhammed Esgin, lead researcher in the quantum security project funded by Pixabay Monash University and CSIRO's Data61, said the new cryptographic tool will make end-to-end encryption more secure so that online services can withstand attacks or interference from the most powerful quantum computers in the future.

"although end-to-end encryption protocols are mature and used to secure data and messages in some of the world's most popular instant messaging applications, they are still vulnerable to more complex attacks from quantum computers," Dr. Esgin said.

He points out that the new encryption tool, which can be applied to a variety of mobile applications and online transactions that use end-to-end encryption, is the first practical algorithm that can be used to harden existing systems to prevent them from being hacked by quantum computers.

Associate Professor Ron Steinfeld, co-author of the Pexels paper and expert on quantum security cryptography, said: "in the past few years, we have seen a number of large-scale cyber attacks and data leaks in Australia, indicating that we need to pay more attention to network security and eliminate vulnerabilities in our systems before they can be exploited by attackers."

He said governments and standards organizations around the world were preparing for the possible emergence of large-scale quantum computers in the next decade or so that could threaten the security of currently deployed encryption systems.

"our past experience has shown that updating encryption algorithms deployed in existing online systems can take a decade or more to complete," said Associate Professor Steinfeld. This means that we need to urgently start updating our network security infrastructure to use quantum security passwords to ensure that our systems are protected before upcoming quantum threats are implemented.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report