Skip to content
Information Technology, Internet

The new frontier in online security: quantum-safe cryptography

Monash University 3 mins read

A team of experts led by Monash University researchers, in collaboration with Australia’s national science agency CSIRO, have created an algorithm that can help strengthen online transactions that use end-to-end encryption against powerful attacks from quantum computers. 

 

Cryptography researchers from Monash University’s Faculty of Information Technology and CSIRO’s data and digital specialist arm Data61 have developed the most efficient quantum-secure cryptography algorithm, called ‘LaV’, to enhance the security of end-to-end encryption, with potential application across instant messaging services, data privacy, cryptocurrency and blockchain systems.

 

End-to-end encryption is a way to secure digital communication between a sender and receiver using encryption keys. Mobile messaging services like WhatsApp and Signal use end-to-end encryption so that no one, including the communication system provider, telecom providers, internet providers or hackers can access the information being transmitted between the sender and the receiver. 

 

It would take millions of years for a normal computer or even a supercomputer to hack into and gain access to data protected by end-to-end encryption. But a large-scale quantum computer could break current encryption within minutes and gain access to encrypted information more easily. 

 

Lead researcher of the collaborative quantum security project co-funded by Monash University and CSIRO’s Data61, Dr Muhammed Esgin, said the new cryptography tool will help make end-to-end encryption more secure, so online services can withstand hacks or interference from the most powerful quantum computers in the future. 

 

“While end-to-end encryption protocols are quite well established and are used to secure data and messaging in some of the most popular instant messaging applications across the world, currently they are still vulnerable to more sophisticated attacks by quantum computers,” Dr Esgin said. 

 

“This new cryptographic tool can be applied to various mobile applications and online transactions that use end-to-end encryption and is the first practical algorithm that can be used to fortify existing systems against quantum computers.”

 

Co-author of the research and quantum-safe cryptography expert Associate Professor Ron Steinfeld said software for current technology is not being developed keeping in mind the future advent of much more powerful computing devices. 

 

“Over the past few years we have seen many significant cyberattacks and data leaks in Australia alone, clearly showing that we need to pay much more attention to cybersecurity and mitigate vulnerabilities in our systems before such vulnerabilities are exploited by attackers,” Associate Professor Steinfeld said. 

 

“Government and Standards organisations worldwide are preparing for the possibility that large scale quantum computers, which can threaten the security of currently deployed encryption systems, could become a reality within the next decade or so. 

 

“Our past experience has shown the process of updating encryption algorithms deployed in existing online systems can also take a decade or more to complete. This means that we need to urgently start updating our cybersecurity infrastructure to use quantum-safe cryptography, to ensure our systems are protected before the approaching quantum threat is realised,” Associate Professor Steinfeld said.  

 

This research was conducted in collaboration with researchers Dr Dongxi Liu and Dr Sushmita Ruj (now at the University of New South Wales) from CSIRO’s Data61, and was presented at Crypto 2023, the 43rd International Cryptology Conference held earlier this year in Santa Barbara, USA.  

 

“The National Institute of Standards and Technology has been standardising methods like encryption and digital signatures to protect basic internet security in a post-quantum world. However, these measures are not enough to protect advanced security applications. Our research is filling this gap,” said Dr Liu.

 

“Our new algorithm has been implemented into code by Dr Raymond Zhao from CSIRO’s Data61 and is available open source.” 

 

As the next step, the research team is working on building a full quantum-secure key transparency protocol which can be readily deployed in encryption applications. 

 

Lead researcher Dr Muhammed Esgin from Monash University's Faculty of Information Technology is available for interviews.

 

To learn more about the research, please see: https://eprint.iacr.org/2022/141  

 

- ENDS -


MEDIA ENQUIRIES 
Teju Hari Krishna, Monash University 
T: +61 450 501 248 E: media@monash.edu 
For more Monash media stories, visit our news and events site

More from this category

  • Information Technology
  • 17/10/2024
  • 23:25
LyondellBasell

LYB completes acquisition of solvent-based recycling company APK

Company welcomes additional recycling technology to its portfolioAmbition to further develop solvent-based recycling technology and bring to commercial scaleCompany secures future of employees and fosters expertise with full integrationPlant to be transformed into post-consumer plastic waste recyclingROTTERDAM, The Netherlands, Oct. 17, 2024 (GLOBE NEWSWIRE) -- LyondellBasell (LYB) today announced it became full owner of APK AG in Merseburg, Germany. APK will be fully integrated and continue as part of LYB, a sustainability leader in the chemical industry. It is LYB’s ambition to further develop the company’s unique solvent-based technology for low density polyethylene (LDPE) and build commercial plants in the…

  • Information Technology, Telecommunication
  • 17/10/2024
  • 13:00
Juniper Networks

JATCO Drives into the Future with the AI-Native Networking Platform from Juniper Networks

TOKYO, 17 OCTOBER 2024 – Juniper Networks (NYSE: JNPR), a leader in secure AI-Native networking, today announced that JATCO Ltd., a global leader in the automotive transmission industry, has implemented Juniper’s AI-Native Networking Platform to deliver exceptional experiences with industry leading AIOps for a robust ‘triple-win’ Wi-Fi network that addresses the business challenges faced by its employees, executives and IT administrators due to its ageing Wi-Fi environment. Jointly owned by Nissan, Mitsubishi Motors and Suzuki, JATCO has been supplying transmissions to automakers globally since its founding in 1970, a constant enabler of the industry’s development through its advanced industrial technology…

  • Business Company News, Information Technology
  • 17/10/2024
  • 11:52
CIMIC Group

CIMIC’s Leighton Asia secures further data centre project in India

CIMIC Group company Leighton Asia has been awarded a contract to construct a data centre in Hyderabad, India, by a multinational technology corporation. The…

  • Contains:

Media Outreach made fast, easy, simple.

Feature your press release on Medianet's News Hub every time you distribute with Medianet. Pay per release or save with a subscription.