Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Dreame — the vacuum company — just ‘launched’ its own phones

    Dreame — the vacuum company — just ‘launched’ its own phones

    May 1, 2026
    Amazon’s built-in AI price history expands to show the entire last year

    Amazon’s built-in AI price history expands to show the entire last year

    May 1, 2026
    Birdfy’s smart bird feeder is down to its best-ever price for Mother’s Day

    Birdfy’s smart bird feeder is down to its best-ever price for Mother’s Day

    May 1, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Cryptographers Are Discovering New Rules for Quantum Encryption
    Science

    Cryptographers Are Discovering New Rules for Quantum Encryption

    News RoomBy News RoomJuly 8, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Cryptographers Are Discovering New Rules for Quantum Encryption

    The original version of this story appeared in Quanta Magazine.

    Say you want to send a private message, cast a secret vote, or sign a document securely. If you do any of these tasks on a computer, you’re relying on encryption to keep your data safe. That encryption needs to withstand attacks from code breakers with their own computers, so modern encryption methods rely on assumptions about what mathematical problems are hard for computers to solve.

    But as cryptographers laid the mathematical foundations for this approach to information security in the 1980s, a few researchers discovered that computational hardness wasn’t the only way to safeguard secrets. Quantum theory, originally developed to understand the physics of atoms, turned out to have deep connections to information and cryptography. Researchers found ways to base the security of a few specific cryptographic tasks directly on the laws of physics. But these tasks were strange outliers—for all others, there seemed to be no alternative to the classical computational approach.

    By the end of the millennium, quantum cryptography researchers thought that was the end of the story. But in just the past few years, the field has undergone another seismic shift.

    “There’s been this rearrangement of what we believe is possible with quantum cryptography,” said Henry Yuen, a quantum information theorist at Columbia University.

    In a string of recent papers, researchers have shown that most cryptographic tasks could still be accomplished securely even in hypothetical worlds where practically all computation is easy. All that matters is the difficulty of a special computational problem about quantum theory itself.

    “The assumptions you need can be way, way, way weaker,” said Fermi Ma, a quantum cryptographer at the Simons Institute for the Theory of Computing in Berkeley, California. “This is giving us new insights into computational hardness itself.”

    This Message Will Self-Destruct

    The story begins in the late 1960s, when a physics graduate student named Stephen Wiesner started thinking about the destructive nature of measurement in quantum theory. Measure any system governed by the rules of quantum physics, and you’ll alter the quantum state that mathematically describes its configuration. This quantum measurement disturbance was a hindrance for most physicists. Wiesner, who took an unorthodox information-centric view of quantum theory, wondered whether it could be made useful. Perhaps it could serve as a form of built-in tamper protection for sensitive data.

    But Wiesner’s ideas were too far ahead of their time, and he left academia after graduate school. Fortunately, he’d discussed his ideas with his friend and fellow physicist Charles Bennett, who unsuccessfully tried to interest others in the subject for a decade. Finally, in 1979, Bennett met the computer scientist Gilles Brassard while swimming off the coast of Puerto Rico during a conference. Together, they wrote a groundbreaking paper describing a new approach to an important cryptographic task. Their protocol was based on quantum measurement disturbance, and needed no assumptions about the difficulty of any computational problems.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhy the Run-Up to Prime Day Is the Worst Time to Shop on Amazon
    Next Article Meta’s $24.99 monthly pay later plan covers the Quest 3 and Quest Plus

    Related Posts

    A Startup Says It Has Found a Hidden Source of Geothermal Energy

    A Startup Says It Has Found a Hidden Source of Geothermal Energy

    December 8, 2025
    A Fentanyl Vaccine Is About to Get Its First Major Test

    A Fentanyl Vaccine Is About to Get Its First Major Test

    December 6, 2025
    The Oceans Are Going to Rise—but When?

    The Oceans Are Going to Rise—but When?

    December 6, 2025
    Thursday’s Cold Moon Is the Last Supermoon of the Year. Here’s How and When to View It

    Thursday’s Cold Moon Is the Last Supermoon of the Year. Here’s How and When to View It

    December 4, 2025
    The Data Center Resistance Has Arrived

    The Data Center Resistance Has Arrived

    December 4, 2025
    Boeing’s Next Starliner Flight Will Be Allowed to Carry Only Cargo

    Boeing’s Next Starliner Flight Will Be Allowed to Carry Only Cargo

    December 4, 2025
    Our Picks
    Amazon’s built-in AI price history expands to show the entire last year

    Amazon’s built-in AI price history expands to show the entire last year

    May 1, 2026
    Birdfy’s smart bird feeder is down to its best-ever price for Mother’s Day

    Birdfy’s smart bird feeder is down to its best-ever price for Mother’s Day

    May 1, 2026
    Severe Linux Copy Fail security flaw uncovered using AI scanning help

    Severe Linux Copy Fail security flaw uncovered using AI scanning help

    May 1, 2026
    We just got a new reason to believe the Trump phone is real(ish)

    We just got a new reason to believe the Trump phone is real(ish)

    May 1, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Aurzen’s tiny trifold projector is almost 40 percent off right now News

    Aurzen’s tiny trifold projector is almost 40 percent off right now

    By News RoomMay 1, 2026

    Not all trifolds are created equal — just ask our own Allison Johnson, who recently…

    Some of Xteink’s credit card-sized e-readers are losing their best feature

    Some of Xteink’s credit card-sized e-readers are losing their best feature

    May 1, 2026
    Elon Musk had a bad week in court

    Elon Musk had a bad week in court

    May 1, 2026
    Dyson put someone else’s motor in its robot vacuum

    Dyson put someone else’s motor in its robot vacuum

    May 1, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.