Device-Independent Quantum Cryptography (IMAGE) ETH Zurich Department of Physics Caption The key to proving the security of device-independent quantum cryptography in a regime that is attainable with state-of-the-art quantum technology is the realization that any attack strategy, no matter how complex (symbolized in the lower row), can be decomposed into a sequence of simple steps (upper row). Credit (Image from Arnon-Friedman et al. Nature Comms 9, 459; 2018). Usage Restrictions None License Licensed content Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.