• Latest

Fraud-Proofing Credit Cards Through Quantum Physics

December 29, 2014
Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

December 10, 2025
Decomposing body of kidnapped Anambra lawmaker found

Police arrest suspect linked to murder of Anambra assembly member, Azuka

December 10, 2025
N7.8b Fraud: AGF Okays Arraignment Of Stella Oduah

N5b corruption charges: FG arraigns Ex-aviation minister, Stella Oduah

December 10, 2025
2026: Osun Governor, Adeleke joins Accord Party

2026: Accord party to declare Adeleke as Osun Guber candidate

December 10, 2025
We Are Not Recruiting”- NAF Warns Nigerians About Fraudulent Advert

NAF releases list of shortlisted applicants for basic military training course

December 10, 2025
“Identity Thieves on the Rampage’  By Wole Soyinka

Soyinka condemns heavy security around Tinubu’s son says ‘he goes around with his battalion’

December 10, 2025
SSANU expresses concern over high electricity costs in universities

SSANU threatens nationwide shutdown

December 10, 2025
SEC unveils agenda for capital market in 2025

SEC sets 2026 recapitalisation plan

December 10, 2025
Malami Donates N11m To Kebbi Flood Victims

Again, EFCC detains ex- AGF Malami

December 10, 2025
  • About US
  • Advert Rates
  • Privacy Policy
  • Contact
Wednesday, December 10, 2025
  • Login
Present Nigeria
  • Home
  • News
  • Politics
  • Business
  • Crime
  • Entertainment
  • Health
  • Lifestyle
  • Opinion
  • Education
  • Sports
  • World News
No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Crime
  • Entertainment
  • Health
  • Lifestyle
  • Opinion
  • Education
  • Sports
  • World News
No Result
View All Result
Present Nigeria
No Result
View All Result

Fraud-Proofing Credit Cards Through Quantum Physics

by Present Nigeria
December 29, 2014
in Africa, Business
0
30
SHARES
60
VIEWS
FacebookTwitterWhatsappTelegram

[dropcap] R [/dropcap] esearchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly secure way to authenticate credit cards, IDs, biometrics, and parties involved in quantum cryptography.

The method — quantum-secure authentication of optical keys — basically consists of sending a beam of light at cards treated with a special paint and using the reflection as the authentication mechanism.

RelatedPosts

Fallon’s #ChristmasFails can knock out your holiday spirit

Howard the Duck’s Comeback Is Complete With This Mondo Portrait

Former LBJ adviser slams ‘Selma’ for painting the President in a poor light

It employes coherent states of light with a low mean photon number — loosely speaking, that means there’s lots of space for the photons to bounce around in.

Photons can be in more than one place at a time, so when the cards reflect the beam, there will be more dots of light sent back than there are photons, and attackers won’t have enough data to measure the entire pattern.

The solution is easy to implement with current technology, and it does not depend on the secrecy of any stored data, the researchers claim.

However, “we’ve left in place unsecure magnetic card readers a decade or more after we knew they weren’t secure enough,” observed Rob Enderle, principal analyst at the Enderle Group.

That behavior “could limit adoption of any new, more secure technology for cards,” he told TechNewsWorld.

Details on the Research

The researchers used cards coated with a layer of white paint containing millions of nanoparticles that bounce incoming light particles between them until the light escapes.

They also used two spatial light modulators, a pinhole and a photon detector. One SLM transformed incoming light into the desired challenge wavefront and sent it to the card. The corresponding reflected response and the challenge were stored in a database.

Each challenge-response pair currently requires 20 KB of memory; the 50-MB database holds 2,500 pairs.

Every superposition of challenge-response pairs itself is a challenge-response pair, adding a further layer of security.

The second SLM added light reflected back from the cards to the conjugate phase pattern of the expected response wavefront only if the response was correct.

The correct responses were then sent to a lens behind the second SLM that focused them onto a photon detector to authenticate them.

Technical Details of the System

The challenges in this system are high-spatial-dimension states of light with few photons and the response is a bunch of light dots in a speckled pattern. The pattern created depends on the challenge and the positions of the paint particles.

Each challenge in the experiment was described by a 50 x 50 binary matrix, with each element corresponding to a phase of either 0 or Pi.

“We needed to make the illumination pattern complex enough to make sure that the number of photons is lower than the number of pixels in the image,” research leader Pepijn Pinske, Ph.D., told TechNewsWorld.

The first SLM transforms an incoming plane wavefront into a challenge wavefront selected at random from the database. Since the challenge is dynamically created and exists only after the transformation, it cannot be intercepted.

The response is recorded in a phase-sensitive way.

The light source used in the research was an attenuated laser beam chopped into 500 ns light pulses each containing 230 plus or minus 40 photons.

The database contains 2,500 challenge-response pairs because “the diffraction limit sets an upper limit to the number of separate spots you can write on a small surface,” Pinske said. “2,500 is about the maximum for the chosen area.”

Pluses and Minuses of the System

The challenge-response database could be hacked, but “the keys would not be in a form that could be digitally reproduced and therefore [would be] virtually useless to the attacker,” Adam Kujawa, head of Malware Intelligence at Malwarebytes, told TechNewsWorld.

“There are simply too many particles which are too small that need to be positioned with too high accuracy [to let anyone make a physical copy of the database],” Pinske said.

Further, hackers can’t cycle through the challenge-response pairs and return the appropriate response because the security doesn’t exist within the challenge response but in the light photons of the key, Kujawa said.

“The verifier picks a random challenge light pattern which cannot be read out since there aren’t enough photons in it to measure the pattern,” Pinske explained. That, combined with the technological impossibility of copying the database, makes the system secure.

“I’m concerned that the output could change depending on environmental conditions or just over the life of the electronics,” commented Jim McGregor, principal analyst at Tirias Research.

Nothing’s Impossible

The system could be broken by using a passive linear optical system that automatically transforms any challenge into the correct response, Pinske said. “That is very close to making a physical copy of the key.”

QSA will not solve all a user’s security needs, he cautioned. “In the end, an unclonable key can be stolen, and we offer no solution to that.”

Still, “we do improve one aspect in a very fundamental way: the physical key,” Pinske pointed out. “That is already quite a feat.”

Security “must be done in layers, because different [types of data] require different levels of security and because you have limitations in memory, performance, bandwidth and power at different levels in the value chain,” McGregor told TechNewsWorld.

Possible Uses for the QSA

Coupling QSA with biometrics “would add significantly to the difficulty” of using stolen cards, and geolocation tracking would invalidate it if it were used by a thief in a location away from the legitimate cardholder, Enderle suggested.

“Apple could adopt this technology, which is well beyond that currently in use, but I would expect the cost to be prohibitive,” he mused. It would probably show up in big pharmaceutical firms and in government or military installations “where security funding is generally greater.”

QSA also could be used to authenticate paintings, Pinske said, and “we are even wondering if the scattering [of light] from teeth could be used as a kind of biometric version of QSA

Share this:

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)

Related

Tags: magictech
Share12Tweet8SendShareShare2
Previous Post

5 Lagoons floating islands project begins to take shape in the Maldives

Next Post

The Curious Case of the Disappearing Distros

Related Posts

SEC unveils agenda for capital market in 2025

SEC sets 2026 recapitalisation plan

December 10, 2025
CBN Dissolves Boards of Titan Trust, Union, Keystone, Polaris Banks

CBN issues licences to 82 BDCs under revised guidelines

December 10, 2025
Reps threaten to demand sack of NNPCL boss, Kyari over ”attempt to destroy Dangote refinery”

Reps C’ttee summons NNPCL boss, Ojulari over 2021 audit queries

December 9, 2025
Tik Tok Sues Trump Administration Over US Ban

TikTok places restrictions on night live-streaming in Nigeria

December 8, 2025
Next Post

The Curious Case of the Disappearing Distros

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED

Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

December 10, 2025
Decomposing body of kidnapped Anambra lawmaker found

Police arrest suspect linked to murder of Anambra assembly member, Azuka

December 10, 2025
N7.8b Fraud: AGF Okays Arraignment Of Stella Oduah

N5b corruption charges: FG arraigns Ex-aviation minister, Stella Oduah

December 10, 2025
2026: Osun Governor, Adeleke joins Accord Party

2026: Accord party to declare Adeleke as Osun Guber candidate

December 10, 2025
  • BROKEN PROMISES: The Untold Story Of PHCN Privatization, Betrayed Workers & The Jettisoned Labour Agreement

    BROKEN PROMISES: The Untold Story Of PHCN Privatization, Betrayed Workers & The Jettisoned Labour Agreement

    197 shares
    Share 79 Tweet 49
  • PENSION ALERT FOR ALL WORKERS: A Call to Rescue Our Future from Exploitation

    172 shares
    Share 69 Tweet 43
  • The Great Betrayal Of Ex-PHCN Workers

    139 shares
    Share 56 Tweet 35
  • Christopher Kolade dies at 92

    114 shares
    Share 46 Tweet 29
  • THE PRIVATIZATION OF PHCN – A Legacy of Rot, Collusion and Systemic Corruption

    112 shares
    Share 45 Tweet 28

PRESENT, a credible online newspaper from the cell of Red Carpet Communications Limited, is published by an experienced and profoundly resourceful journalist, Yemi Olowolabi.
It leads in lucid presentation of trending stories and breaking news in Politics, Business, Economy, Entertainment, Sports, Lifestyles and Other Features.
With a heritage of in-depth coverage and adept leverage of core professionals, PRESENT is the trusted witness of the news.

Recent News

Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

Photos: Inauguration of ward coordinators of PBAT Continuity Project in Akoko North East

December 10, 2025
Decomposing body of kidnapped Anambra lawmaker found

Police arrest suspect linked to murder of Anambra assembly member, Azuka

December 10, 2025
N7.8b Fraud: AGF Okays Arraignment Of Stella Oduah

N5b corruption charges: FG arraigns Ex-aviation minister, Stella Oduah

December 10, 2025
  • Home
  • News
  • Politics
  • Business
  • Crime
  • Entertainment
  • Health
  • Lifestyle
  • Opinion
  • Education
  • Sports
  • World News

© 2025 Present Nigeria. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Crime
  • Entertainment
  • Health
  • Lifestyle
  • Opinion
  • Education
  • Sports
  • World News

© 2025 Present Nigeria. All Rights Reserved.