Estate Living Magazine Develop - Issue 44 August 2019 | Page 61
L I V E
Quantum encryption
The ‘no-cloning theorem’ proved by William Wootters,
Wojciech Zurek and Dennis Dieks in 1982 states that quantum
information carried by particles such as photons cannot be
replicated exactly. The forerunner in quantum encryption is the
Chinese government. Central to this is the development of the
quantum key and that, with the nodes to decrypt and encrypt,
creates a vulnerability but substantially lowers the threat. The
challenge now is in creating technology that is small, scalable
and affordable. And, of course, there is now the spectre of
quantum hacking to contend with.
Homomorphic encryption
Homomorphic encryption allows users to work on data without
decrypting it. However, to get to the end product, one has to use
a secure key to unlock it. In 2009, IBM researcher Craig Gentry
came up with the first fully homomorphic encryption scheme,
and compared the system to ‘one of those boxes with the gloves
that are used to handle toxic chemicals … All the manipulation
happens inside the box, and the chemicals are never exposed
to the outside world.’ The challenge is speed, but IBM says it is
getting there.
S M A R T
obvious, and also obeying the four basic password rules:
• 12 character minimum
• include numbers, symbols, capital letters and lowercase
letters
• do not use dictionary words
• do not rely on obvious substitutions such as Spain becoming
5pa1n.
Of course, if you need some help with all the passwords, a
password manager is your best option.
As for the devices you purchase for the security of your family
and home, hold the makers accountable for the security that
they are selling you. And for communication, why not take a look
at where Brian Acton has most recently invested – Signal (signal.
org)?
Biometric encryption
Already used in our everyday lives, biometric encryption has
revolutionised how we unlock digital devices and physical
doors, and how we buy our morning coffees. The concerns
are multiple, ranging from our data being stored in unsecured
locations to having it hacked and used against us in purchases,
and also about how facial recognition is largely a failure when
combating crime. Another common criticism is how the
encryption can be confused by the common cold and therefore
cause a potential problem in accessing one’s phone, bank
accounts, and even one’s home, but as the technology develops
and machine learning matures, this should not be as challenging
a problem as it seems now.
E C
Wearable two-factor authentication
Recently travelling in London, I watched as people used their
phones as their Oyster card to access public transport, and
even scanned their phones to pay for their coffee and croissant
on their rush to work. It brought to mind the work by Digisec –
technology so small it can fit into something as small as a ring,
and can be placed in clothing. These little encryption devices
are so easy to carry and, hopefully, will keep us safer.
But let’s be practical
For most of us, these technologies are far outside of our
technological abilities and financial means, so what can we do
to keep our data safe? Changing all passwords regularly sounds
Chantal Lailvaux