Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    Windows throttled my 4K webcam

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Could this be the key to eternal storage? Experts claim new DNA HDD can be ‘erased and overwritten repeatedly’

      March 9, 2026

      Need more storage? Get a lifetime of 10TB cloud space for just $270.

      March 8, 2026

      Google PM open-sources Always On Memory Agent, ditching vector databases for LLM-driven persistent memory

      March 8, 2026

      Regulate AWS and Microsoft, says UK cloud provider survey

      March 8, 2026

      Google releases Gemini 3.1 Flash Lite at 1/8th the cost of Pro

      March 4, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay

      March 9, 2026

      Save 30% on Ugreen’s fast USB-C charger with retractable cable

      March 9, 2026

      Windows throttled my 4K webcam

      March 9, 2026

      Send a letter to your future self with FutureMe

      March 9, 2026

      Hackers know your social security number. Here’s how to stay safe

      March 9, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»The New Math of Quantum Cryptography
    Technology

    The New Math of Quantum Cryptography

    TechAiVerseBy TechAiVerseSeptember 7, 2025No Comments10 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    The New Math of Quantum Cryptography
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    The New Math of Quantum Cryptography

    The original version of this story appeared in Quanta Magazine.

    Hard problems are usually not a welcome sight. But cryptographers love them. That’s because certain hard math problems underpin the security of modern encryption. Any clever trick for solving them will doom most forms of cryptography.

    Several years ago, researchers found a radically new approach to encryption that lacks this potential weak spot. The approach exploits the peculiar features of quantum physics. But unlike earlier quantum encryption schemes, which only work for a few special tasks, the new approach can accomplish a much wider range of tasks. And it could work even if all the problems at the heart of ordinary “classical” cryptography turn out to be easily solvable.

    But this striking discovery relied on unrealistic assumptions. The result was “more of a proof of concept,” said Fermi Ma, a cryptography researcher at the Simons Institute for the Theory of Computing in Berkeley, California. “It is not a statement about the real world.”

    Now, a new paper by two cryptographers has laid out a path to quantum cryptography without those outlandish assumptions. “This paper is saying that if certain other conjectures are true, then quantum cryptography must exist,” Ma said.

    Castle in the Sky

    You can think of modern cryptography as a tower with three essential parts. The first part is the bedrock deep beneath the tower, which is made of hard mathematical problems. The tower itself is the second part—there you can find specific cryptographic protocols that let you send private messages, sign digital documents, cast secret ballots, and more.

    In between, securing those day-to-day applications to mathematical bedrock, is a foundation made of building blocks called one-way functions. They’re responsible for the asymmetry inherent in any encryption scheme. “It’s one-way because you can encrypt messages, but you can’t decrypt them,” said Mark Zhandry, a cryptographer at NTT Research.

    In the 1980s, researchers proved that cryptography built atop one-way functions would ensure security for many different tasks. But decades later, they still aren’t certain that the bedrock is strong enough to support it. The trouble is that the bedrock is made of special hard problems—technically known as NP problems—whose defining feature is that it’s easy to check whether any candidate solution is correct. (For example, breaking a number into its prime factors is an NP problem: hard to do for large numbers, but easy to check.)

    Many of these problems seem intrinsically difficult, but computer scientists haven’t been able to prove it. If someone discovers an ingenious algorithm for rapidly solving the hardest NP problems, the bedrock will crumble, and the whole tower will collapse.

    Unfortunately, you can’t simply move your tower elsewhere. The tower’s foundation—one-way functions—can only sit on a bedrock of NP problems.

    To build a tower on harder problems, cryptographers would need a new foundation that isn’t made of one-way functions. That seemed impossible until just a few years ago, when researchers realized that quantum physics could help.

    It started with a 2021 paper by a graduate student named William Kretschmer that drew attention to a strange problem about the properties of quantum systems. Researchers soon showed that Kretschmer’s problem could replace one-way functions as the foundation for a new tower of cryptographic protocols. The following year, Kretschmer and others proved that this alternative approach could work even without hard NP problems. Suddenly, it seemed like it might be possible to construct a cryptographic fortress that would be far sturdier.

    But where to build it? The quantum problem Kretschmer used as his foundation involved hypothetical computing devices called oracles that can instantaneously answer specific questions. Oracles can be useful theoretical tools, but they don’t actually exist. Kretschmer’s proofs were like a blueprint for building a castle in the sky. Was there a way to bring it down to earth?

    Second Foundation

    In the fall of 2022, that question caught the attention of Dakshita Khurana, a cryptographer at the University of Illinois at Urbana-Champaign and NTT Research. Khurana and her graduate student Kabir Tomer set out to build a new tower of cryptography. Her first step was to build a new foundation using quantum building blocks instead of classical one-way functions. She would then need to prove that this new foundation could support a tower of other cryptographic protocols. Once she proved that the foundation could support the tower, she would have to find a solid place for the whole thing to sit—a bedrock of real-world problems that seem even harder than the NP problems used in classical cryptography.

    Dakshita Khurana set out to find mathematical building blocks that could replace one-way functions as a foundation for quantum cryptography.

    Photograph: Ravi Shankar Khurana

    For the first step, Khurana and Tomer focused on a quantum version of a one-way function, called a one-way state generator, that satisfied the three properties that make one-way functions useful. First, the function must run quickly so that you can easily generate a cryptographic lock and the corresponding key to open it for each message you want to send. Second, each lock must be secure, requiring great effort to break open without the right key. Finally, every lock must be easy to open with the right key.

    The crucial difference lay in the nature of the locks. Classical one-way functions generate mathematical locks made of bits—the 0s and 1s that store information in a classical computer. Quantum one-way state generators would instead generate locks made of units of quantum information called qubits. These quantum locks could potentially remain secure even if all classical locks are easy to break. Khurana and Tomer hoped to start with this new quantum foundation and build a tower of cryptographic protocols on top of it. “This turned out to be quite hard,” Khurana said. “We were stuck for many, many months.”

    By July 2023, Khurana was nearly nine months pregnant and planning for parental leave. Tomer was out of ideas. “I’m much more pessimistic than Dakshita,” he said. “She’s always the one who believes that things will work.”

    Then they made a breakthrough. The crucial step was defining another mathematical building block that served as something like a basement floor: a structure that would connect the foundation of one-way state generators to a tower of cryptographic protocols. When Khurana and Tomer worked out what properties that building block would need to have, they found that it resembled a one-way function with a perplexing mixture of quantum and classical characteristics. As in an ordinary one-way function, both locks and keys were made of classical bits, but the procedure for generating these locks and keys would only run on a quantum computer. Stranger still, the new building block satisfied the first two defining properties of one-way functions, but not the third: It was easy to generate locks and keys, and every lock was hard to break. But a key wouldn’t easily open its lock.

    Khurana and Tomer dubbed these perplexing new building blocks one-way puzzles. Intuitively, it’s hard to imagine how they could possibly be useful: What good is a key that you can never use? But the two cryptographers showed that one-way puzzles combined with other quantum trickery would actually enable many cryptographic protocols. If you can generate locks and keys that fit together in principle, it doesn’t matter whether the unlocking procedure is wildly inefficient.

    Kabir Tomer and Khurana connected the new quantum building blocks to real-world problems harder than the ones used in classical cryptography.

    Photograph: James Bartusek

    “Just knowing that there exists some algorithm that can be arbitrarily slow is sufficient,” said Kretschmer, who is now a researcher at the Simons Institute. “That is very surprising.”

    With that missing piece in place, they quickly finished the proof on August 4. Khurana’s daughter was born just days later.

    Permanent Record

    By November, Khurana was back at work and ready to attempt the second phase of her plan. She and Tomer had shown that many kinds of cryptography could be built upon one-way puzzles, and that one-way puzzles could in turn be built upon a new quantum foundation made of one-way state generators. The next step in their original plan was to connect that quantum foundation to a new bedrock—some relatively unassailable set of math problems that are even more intractable than those in NP.

    But as Khurana and Tomer grappled with that task, they decided to take a more direct approach: Forget about the one-way state generators, and instead anchor one-way puzzles directly to the mathematical bedrock.

    William Kretschmer showed that in theory, quantum cryptography could be secure without the one-way functions that are essential to all classical encryption.

    Photograph: Justin DuRant

    From one perspective, that seemed like an odd choice. One-way puzzles were mathematical oddities that Khurana and Tomer had used in an intermediate step of their proof.

    Yet one-way puzzles had some advantages. For one thing, while they’re quantum, the locks and keys that they generate are classical. Khurana thought that might make it easier to connect them to a bedrock of classical mathematics. In addition, one-way puzzles generate keys that are too unwieldy to actually open locks. That could make it easier to link them to problems so tricky that even checking solutions seems hopelessly hard.

    But what specific problems would work? Khurana had a candidate in mind: calculating a specific combination of the entries in a table of numbers called a matrix. This problem, known as the matrix permanent problem, is notoriously difficult to solve for large matrices, and there’s no simple way to check whether a calculation is correct. The matrix permanent problem also has other special mathematical properties that cryptographers find appealing.

    “This would be a beautiful problem to base cryptography on,” Khurana said.

    The matrix permanent problem also connects to a different problem that quantum computers can easily solve but classical computers seemingly can’t. Researchers are working on proving this quantum computational advantage in a precise theoretical sense. Khurana and Tomer showed that such a proof would also let them build secure one-way puzzles—and thus the whole tower of quantum cryptography—on top of the permanent problem.

    “They were able to do this from these well-studied assumptions,” Kretschmer said. “I was really happy to see that.”

    With their new result, Khurana and Tomer have effectively reduced two open problems to one. If researchers complete the proof that quantum computers truly surpass classical ones at a specific task, that will automatically put quantum cryptography on much stronger theoretical footing than practically any kind of classical cryptography.

    Alas, you won’t be able to use Khurana and Tomer’s new approach to send secret messages any time soon. Despite recent progress, quantum computing technology is not yet mature enough to put their ideas into practice. Meanwhile, other researchers have devised quantum cryptography methods that could be used sooner, though more work will be needed to establish that they’re truly secure.

    Quantum cryptography has already proved full of surprises, and researchers have only recently begun exploring the possibilities. “We’re just trying to understand this new landscape that really existed the whole time,” Zhandry said.


    Original story reprinted with permission from Quanta Magazine, an editorially independent publication of the Simons Foundation whose mission is to enhance public understanding of science by covering research developments and trends in mathematics and the physical and life sciences.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticlePsychological Tricks Can Get AI to Break the Rules
    Next Article How to Add WIRED as a Preferred Source on Google (2025)
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay

    March 9, 2026

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    March 9, 2026

    Windows throttled my 4K webcam

    March 9, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025707 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025298 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025166 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025163 Views
    Don't Miss
    Technology March 9, 2026

    Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay

    Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay – NotebookCheck.net…

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    Windows throttled my 4K webcam

    Send a letter to your future self with FutureMe

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Imprisoned hacker hints GTA 6 source code could leak, threatening release date delay

    March 9, 20262 Views

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    March 9, 20264 Views

    Windows throttled my 4K webcam

    March 9, 20264 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.