Transactions and communications that are safe from quantum computer attacks

València, Feb 14 (EFE) .- Researchers from the Polytechnic University of Valencia (UPV) will participate in an international project to develop and analyze cryptographic protocols that prevent attacks by quantum computers and keep transactions and communications safe.

In the project, which will begin next April and will last for three years until March 2024, the Valencian researchers will work together with experts from Japan, Turkey and France, according to the data EFE has had access to.


In everyday actions such as an internet conversation or a transaction, there are certain encryption operations whose keys are practically impossible to obtain, which guarantees our security and privacy.

It is difficult to find out because they are based on complex mathematical problems, which only quantum computing could address, since it turns these problems into simple operations and allows them to be deciphered and thus endanger our security and privacy, say UPV sources.

To face this future threat, UPV researchers belonging to the VRAIN Institute will participate in this project that will develop and analyze cryptographic protocols that guarantee maximum security in communications, to make them more “resistant” even against possible attacks with quantum computers. .

In the project, called FAVPQC -Formal Analysis and Verification of Post-Quantum Cryptographic Protocols- they will work together with experts from the Advanced Institute of Science and Technology of Japan (JAIST, for its acronym in English), the Mayis University (Turkey) and the University from Rouen Normandy (France).

VRAIN researcher Santiago Escobar tells EFE that “today there are already quantum computers, but their implementation is limited, so there is no risk at all.”

READ  The pillars that sustain Maduro in power in Venezuela - Spain

“To anticipate the scenario of universal quantum programming, different groups around the world are working on the development and validation of communications protocols so that they are insurmountable even against attacks based on quantum computing. And this is the objective of this international project”, stands out.


Thus, within the framework of the FAVPQC project, post-quantum cryptographic protocols will be developed and analyzed using Maude-NPA, the most advanced software in the world today for the study of communication protocols that use advanced cryptographic properties and which bears the seal of the VRAIN Institute. of the UPV.

Maude-NPA helps to find security flaws or verify that a protocol is free from attacks, it is free and allows analysis of cryptographic security protocols, taking into account the algebraic properties of the cryptosystem.

“Sometimes these properties can reveal weaknesses in cryptosystems and, in other cases, they are part of the security assumptions of the protocol. All of this contributes to Maude-NPA deciphering it,” says Escobar.

During the project, proposals for post-quantum protocols submitted to the international competition organized by the National Institute of Standards and Technology (NIST) of the United States will be analyzed.

This body has been promoting an initiative for some years to respond to the security challenges that derive from quantum computing.

UPV researchers will contribute to “deciphering” the security levels that some of the protocols already developed to deal with these attacks with quantum computers may offer.

READ  Barcelona: Sergino Dest trains with Barcelona squad for first time

“We are going to use our tool to make these new protocols more resistant to attacks with quantum computing and the idea right now is to analyze them and see to what extent they are safe and what vulnerabilities they may have”, he points out and highlights that it allows “to verify many more properties crypto than other competing tools. “

“When dealing with data, the security and privacy of the information become vital. This project will have an impact on more powerful and secure communication protocols against attacks carried out with a quantum computer”, concludes the researcher. EFE

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.