Skip to content
Information Technology, Internet

The new frontier in online security: quantum-safe cryptography

Monash University 3 mins read

A team of experts led by Monash University researchers, in collaboration with Australia’s national science agency CSIRO, have created an algorithm that can help strengthen online transactions that use end-to-end encryption against powerful attacks from quantum computers. 


Cryptography researchers from Monash University’s Faculty of Information Technology and CSIRO’s data and digital specialist arm Data61 have developed the most efficient quantum-secure cryptography algorithm, called ‘LaV’, to enhance the security of end-to-end encryption, with potential application across instant messaging services, data privacy, cryptocurrency and blockchain systems.


End-to-end encryption is a way to secure digital communication between a sender and receiver using encryption keys. Mobile messaging services like WhatsApp and Signal use end-to-end encryption so that no one, including the communication system provider, telecom providers, internet providers or hackers can access the information being transmitted between the sender and the receiver. 


It would take millions of years for a normal computer or even a supercomputer to hack into and gain access to data protected by end-to-end encryption. But a large-scale quantum computer could break current encryption within minutes and gain access to encrypted information more easily. 


Lead researcher of the collaborative quantum security project co-funded by Monash University and CSIRO’s Data61, Dr Muhammed Esgin, said the new cryptography tool will help make end-to-end encryption more secure, so online services can withstand hacks or interference from the most powerful quantum computers in the future. 


“While end-to-end encryption protocols are quite well established and are used to secure data and messaging in some of the most popular instant messaging applications across the world, currently they are still vulnerable to more sophisticated attacks by quantum computers,” Dr Esgin said. 


“This new cryptographic tool can be applied to various mobile applications and online transactions that use end-to-end encryption and is the first practical algorithm that can be used to fortify existing systems against quantum computers.”


Co-author of the research and quantum-safe cryptography expert Associate Professor Ron Steinfeld said software for current technology is not being developed keeping in mind the future advent of much more powerful computing devices. 


“Over the past few years we have seen many significant cyberattacks and data leaks in Australia alone, clearly showing that we need to pay much more attention to cybersecurity and mitigate vulnerabilities in our systems before such vulnerabilities are exploited by attackers,” Associate Professor Steinfeld said. 


“Government and Standards organisations worldwide are preparing for the possibility that large scale quantum computers, which can threaten the security of currently deployed encryption systems, could become a reality within the next decade or so. 


“Our past experience has shown the process of updating encryption algorithms deployed in existing online systems can also take a decade or more to complete. This means that we need to urgently start updating our cybersecurity infrastructure to use quantum-safe cryptography, to ensure our systems are protected before the approaching quantum threat is realised,” Associate Professor Steinfeld said.  


This research was conducted in collaboration with researchers Dr Dongxi Liu and Dr Sushmita Ruj (now at the University of New South Wales) from CSIRO’s Data61, and was presented at Crypto 2023, the 43rd International Cryptology Conference held earlier this year in Santa Barbara, USA.  


“The National Institute of Standards and Technology has been standardising methods like encryption and digital signatures to protect basic internet security in a post-quantum world. However, these measures are not enough to protect advanced security applications. Our research is filling this gap,” said Dr Liu.


“Our new algorithm has been implemented into code by Dr Raymond Zhao from CSIRO’s Data61 and is available open source.” 


As the next step, the research team is working on building a full quantum-secure key transparency protocol which can be readily deployed in encryption applications. 


Lead researcher Dr Muhammed Esgin from Monash University's Faculty of Information Technology is available for interviews.


To learn more about the research, please see:  


- ENDS -

Teju Hari Krishna, Monash University 
T: +61 450 501 248 E: 
For more Monash media stories, visit our news and events site

More from this category

  • Information Technology
  • 01/12/2023
  • 01:07

Cleverbridge Launches CleverInsights to Deliver Accurate, AI-Powered Analytics for Subscription Businesses

The product's easy-to-use dashboards empower companies to accurately benchmark and forecast performance, calculate robust customer health scores, and more.COLOGNE, GERMANY / ACCESSWIRE / November 30, 2023 / Cleverbridge, a growth engine for global technology companies, today announced the launch of CleverInsights, an advanced analytics suite that leverages AI and 18+ years of eCommerce data to provide unparalleled visibility into recurring revenue, retention, and other essential subscription metrics. Pre-built dashboards for benchmarking, forecasting, anomaly detection, and customer health scoring empower organizations to derive deep insights and optimize performance in near real-time amid an uncertain and ever-changing business environment. These features streamline…

  • Information Technology
  • 29/11/2023
  • 10:07
SEAtS Software

SEAtS Software, a Leading EdTech Provider, Announces Global Launch of Stand-Alone Mitigating Circumstances Solution

DUBLIN, Ireland, Nov. 28, 2023 (GLOBE NEWSWIRE) -- SEAtS Software, a leading provider of student success solutions, is proud to announce the global availability of their stand-alone mitigating & special circumstances solution. This solution is designed to help higher education institutions manage the increasing volume and complexity of mitigating and special circumstances applications from students.Mitigating and special circumstances are situations that affect a student's ability to perform academically, such as illness, bereavement, or personal issues. These situations require a fair and transparent process to assess the impact on the student's grades and provide appropriate support and adjustments.However, many institutions are…

  • Information Technology
  • 29/11/2023
  • 07:07
CSP, Inc.

ARIA Cybersecurity Partners With Logi-Tech To Protect Australia’s Critical Infrastructure From Growing Cyberthreat

Leading Australian MSSP launches new managed Security Operations Center (SOC) service for IT and critical infrastructure customersBOSTON, MA / ACCESSWIRE / November 28, 2023 / ARIA Cybersecurity Solutions, a CSPi business (NASDAQ:CSPI), has launched its AZT PROTECT™ solution in Australia via a partnership with Logi-Tech, a leading local managed security service provider (MSSP). By adding AZT PROTECT to its portfolio, Logi-Tech can offer a groundbreaking service for protecting critical applications in operational technology (OT) environments such as manufacturing, mining, and government.Logi-Tech's new managed Security Operations Center (SOC) service is based on a combination of the ARIA Advanced Detection Response (ADR)…

Media Outreach made fast, easy, simple.

Feature your press release on Medianet's News Hub every time your distribute with Medianet. Pay per release or save with a subscription.