{"id":9905,"date":"2022-04-14T14:00:20","date_gmt":"2022-04-14T18:00:20","guid":{"rendered":"https:\/\/eportfolios.macaulay.cuny.edu\/messenger\/?p=9905"},"modified":"2026-02-06T14:44:47","modified_gmt":"2026-02-06T19:44:47","slug":"is-quantum-cryptography-the-answer-to-hacking","status":"publish","type":"post","link":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/2022\/04\/14\/is-quantum-cryptography-the-answer-to-hacking\/","title":{"rendered":"Is Quantum Cryptography the Answer to Hacking?"},"content":{"rendered":"<p><span style=\"font-weight: 400\">There were <\/span><a href=\"https:\/\/www.welivesecurity.com\/2021\/02\/03\/identity-theft-spikes-amid-pandemic\/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=wls-newsletter-050221\"><span style=\"font-weight: 400\">1.4 million reports of identity theft reported last year<\/span><\/a><span style=\"font-weight: 400\">, and it is estimated that by 2025, cybersecurity will cost the world <\/span><a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\"><span style=\"font-weight: 400\">$10.5 trillion annually<\/span><\/a><span style=\"font-weight: 400\">. While conventional methods (i.e: public key encryption, private key encryption) of cybersecurity are becoming obsolete, quantum cryptography may be the key to a more secure digital world.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Quantum cryptography presents a unique approach to eliminating hacking and phishing by using the basic principles of&nbsp; quantum mechanics to encrypt data. It has the potential to revolutionize cybersecurity by creating <\/span><a href=\"https:\/\/quantumxc.com\/blog\/quantum-cryptography-explained\/\"><span style=\"font-weight: 400\">virtually \u201cunhackable\u201d spaces<\/span><\/a><span style=\"font-weight: 400\"> that will ensure that data stays confidential.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">But how does this happen?&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Quantum cryptography revolves around the qubit. Qubits are <\/span><a href=\"https:\/\/whatis.techtarget.com\/definition\/qubit\"><span style=\"font-weight: 400\">electrons<\/span><\/a><span style=\"font-weight: 400\"> in a magnetic field that have the ability to <\/span><a href=\"https:\/\/federalnewsnetwork.com\/commentary\/2019\/06\/how-federal-agencies-can-unleash-the-power-of-quantum-cryptography\/\"><span style=\"font-weight: 400\">transmit information<\/span><\/a><span style=\"font-weight: 400\">. They are negatively charged, extremely small subatomic particles that have encryption properties.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">The effect of different principles of quantum mechanics allows for qubits to be extremely secure.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">The principle of entanglement enables qubits to behave as a collective system. In essence, it allows qubits to function as a system rather than as individual particles.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">The uncertainty principle and the \u2018no change\u2019 theory work together to say that <\/span><a href=\"https:\/\/www.nist.gov\/topics\/physics\/introduction-new-quantum-revolution\/cryptography-quantum-age#:~:text=The%20uncertainty%20principle%20indicates%20that,way%20that%20can%20be%20detected.\"><span style=\"font-weight: 400\">measuring any object will disturb it<\/span><\/a><span style=\"font-weight: 400\">. For instance, if Alice wants to check if Jocelyn is sleeping and Alice taps Jocelyn, that might wake Jocelyn up. By waking Jocelyn up, Alice has disturbed Jocelyn\u2019s sleep.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">In a similar fashion, quantum cryptography keeps messages secure by \u201cdisturbing\u201d the message being sent if it was being measured by a hacker.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Quantum cryptography requires the message to be sent over a certain distance in order to transmit the information correctly. Furthermore, it requires the sender and receiver to have \u201ccalibrated\u201d their devices to allow for the correct flow of qubits and the correct message to be communicated.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Hypothetically, if two parties are exchanging information, they are the only ones with access to it. However, if a third party attempts to intercept the message, the message will not have traveled the appropriate distance and the message will be altered. Hence, neither the intended receiver nor the interceptor will get access to the message. This ensures <\/span><a href=\"https:\/\/federalnewsnetwork.com\/commentary\/2019\/06\/how-federal-agencies-can-unleash-the-power-of-quantum-cryptography\/\"><span style=\"font-weight: 400\">complete confidentiality<\/span><\/a><span style=\"font-weight: 400\">, as well as a mechanism to test for hackers and interceptors.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Together, these principles and mechanisms allow users to be notified when there is a third person listening in on the conversation. In order for a hacker to intercept a message, they must align their device with that of the intended recipient and then measure the photons. By measuring it, however, they will not be able to see the information being sent and also end up exposing themselves in the process. As a result, if the sender and receiver compare messages, they will be able to detect the presence of a third party.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">While quantum cryptography is promising, the actual practicality of it is almost unimaginable in today\u2019s standards. First, the implementation of this advanced encryption requires the use of quantum computers, and there is yet to be a practical commercial quantum computer available. There is also the limitation of the distance over which these messages can be sent. As quantum computers are not yet optimized for quantum cryptography, they could <\/span><a href=\"https:\/\/books.google.com\/books?id=IbfMBQAAQBAJ&amp;pg=PA132&amp;lpg=PA132&amp;dq=radius+of+quantum+encryption+is+10+miles&amp;source=bl&amp;ots=UVRSyR22xs&amp;sig=ACfU3U3-d6iw_0Y7oS1AeGIT5eNgmf1vpw&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwiTwefwpcP2AhUtk4kEHco-DJ8Q6AF6BAgkEAM#v=onepage&amp;q=radius%20of%20quantum%20encryption%20is%2010%20miles&amp;f=false\"><span style=\"font-weight: 400\">only be used within a radius of 10 miles<\/span><\/a><span style=\"font-weight: 400\"> as opposed to the virtually infinite radius of current cryptography.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><span style=\"font-weight: 400\">Cybercrime <\/span><a href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\"><span style=\"font-weight: 400\">thrived during the pandemic<\/span><\/a><span style=\"font-weight: 400\">, and as the internet becomes more of a staple in people\u2019s lives, keeping up-to-date with encryption and cybersecurity is more important than ever. Although quantum cryptography is still in its early stages of being theorized, the increasing threat of cybercrime encourages us to take basic steps to protect ourselves from identity theft, phishing and hacking.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/p>\n<p><i><span style=\"font-weight: 400\">For tips on how to protect your cybersecurity, consider checking out the following <\/span><\/i><a href=\"https:\/\/www.chubb.com\/us-en\/individuals-families\/resources\/6-ways-to-protect-yourself-from-hackers.html\"><i><span style=\"font-weight: 400\">guide<\/span><\/i><\/a><i><span style=\"font-weight: 400\"> made by CHUBB.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There were 1.4 million reports of identity theft reported last year, and it is estimated that by 2025, cybersecurity will cost the world $10.5 trillion annually. While conventional methods (i.e: public key encryption, private key encryption) of cybersecurity are becoming obsolete, quantum cryptography may be the key to a more secure digital world.&nbsp; &nbsp; Quantum&#8230;<\/p>\n","protected":false},"author":703,"featured_media":9906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"portfolio_post_id":0,"portfolio_citation":"","portfolio_annotation":"","openlab_post_visibility":"","footnotes":""},"categories":[26,1],"tags":[],"class_list":["post-9905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-science","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/posts\/9905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/users\/703"}],"replies":[{"embeddable":true,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/comments?post=9905"}],"version-history":[{"count":1,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/posts\/9905\/revisions"}],"predecessor-version":[{"id":10662,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/posts\/9905\/revisions\/10662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/media\/9906"}],"wp:attachment":[{"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/media?parent=9905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/categories?post=9905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/openlab.macaulay.cuny.edu\/messenger\/wp-json\/wp\/v2\/tags?post=9905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}