Quantum mechanics creates location-based cryptography
2010-07-28 0:00

By Alasdair Wilkins | io9.com



Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.


Article from: io9.com



Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution




Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
ciphermysteries.com
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)


Latest News from our Front Page

Vikings Were Pioneers of Craft and International Trade
2015-02-26 23:30
The connections between technology, urban trading, and international economics which have come to define modern living are nothing new. Back in the first millennium AD, the Vikings were expert at exploring these very issues. While the Vikings are "gone" their legacy is remembered, such as at the annual Jorvik Viking Festival in York. The Norsemen's military prowess and exploration are more ...
Just Based on DNA, Scientists Can Construct an Image of Your Face
2015-02-26 22:05
Putting pencil to paper has been the tried-and-true method to illustrate the faces of wanted criminals, but new technology is changing this traditional approach. DNA, rather than an artist’s skill, is an emerging tool to recreate the face behind a crime. The new forensic technique is called DNA phenotyping. It relies on DNA, found for instance in a drop of blood, ...
FCC Votes In Favor Of Obama's Net Neutrality - Has The Slippery Slope To Web Censorship Begun?
2015-02-26 20:14
"An open Internet is essential to the American economy, and increasingly to our very way of life," according to President Obama and it appears his perspective on the heavy hand of government regulation inserting itself into the last bastion of freedom and dynamism in the US economy, is how best to achieve "openness." Having pressured FCC's Tom Wheeler, the vote ...
The Endgame: White Genocide
2015-02-25 21:06
Made by youtube.com/ThisisEuropa facebook.com/ThisIsEuropa “There is no place in modern Europe for ethnically pure states. That’s a 19th century idea and we are trying to transition into the 21st century, and we are going to do it with multi-ethnic states.” – Wesley Clark, U.S. general, ex-NATO Supreme Commander, talking about the NATO bombing of Serbia, 1999. What is White Genocide? ▪ Moving millions of ...
Former German Lawyer Sylvia Stolz has been jailed again
2015-02-26 3:28
Sylvia Stolz, the former defence attorney for Ernst Zundel has been convicted today in a Munich court, once again under the tyrannical BRD laws concerning so-called “holocaust denial” and thereby “inciting racial hatred”. She was sentenced to 20 months in prison with no possibility of parole. The case stems from her presentation at the AZK in Switzerland in 2012 where ...
More News »