Quantum mechanics creates location-based cryptography
2010 07 28

By Alasdair Wilkins | io9.com



Imagine a form of encrypted communication so secure that itís physically impossible to access it unless youíre actually at the location where youíre supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiverís location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But thatís just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states itís impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, theyíd still need multiple transmitters to mimic the supposed location, but thatís now physically impossible because the first adversary would need to both store the qubitís state and send it on to the next confederate, and quantum mechanics says thatís impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.


Article from: io9.com



Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution




Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Canít Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
ciphermysteries.com
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)


Latest News from our Front Page

VOTER FRAUD: Was the Scottish Independence Referendum Rigged to Fail?
2014 09 20
Was voter fraud committed during the Scottish Independence referendum? It has been confirmed that the names of 10 people were already crossed off a voter list prior them voting inside a polling station. According to reports, the Glasgow City Council confirmed that there were ten cases of suspected electoral fraud occurring at polling stations following the Scottish referendum vote on the 18th. ...
Scandinavians Split Over Syrian Influx
2014 09 20
This exemplifies the insanity of Scandinavia. The narrow victory of the left-leaning Social Democratic Party in Swedenís elections last Sunday marked a broad shift in its politics. But a new coalition government is unlikely to reconsider one of the countryís most challenging policies: its response to the Syrian civil war. Sweden has taken an open-door approach to people fleeing the conflict, ...
The Israel lobby in United Kingdom - Who Runs Britain?
2014 09 20
Who runs British politics? Who in Britain supports all the wars the UK has been involved in? The Israel Lobby in the UK - Full Documentary By Peter Oborne from Dispatchees Links from Youtube: Zionist attack on western civilization Reed Douglas - The Controversery of Zion Source: youtube.com The cowardice at the heart of UK relationship with Israel Close friends and allies: Prime Minister David Cameron ...
Another Palestinian Mass Grave Discovered, Evidence of Massacre
2014 09 20
Another mass grave discovered, evidence of 1948 Judaic holocaust by bullets, knives and bludgeons against Palestinians. The Israeli military admits to have been surprised by the abilities of Palestinian resistance fighters during its recent war on the Gaza Strip. A top Israeli military official says heís impressed by the training of Palestinian resistance fighters from Hamas and the Islamic Jihad groups. He ...
Russian Media to be owned by Russians
2014 09 20
Comment: Russian media by and for Russians? Wow, revolutionary! I guess they are stick of foreign oligarchs and zionist with dual citizenship. Duma seeks limits on foreign ownership of Russian media companies A group of opposition lawmakers have prepared a bill that orders Russian mass media companies to have at least 80 percent of their stock held by Russian investors. The bill is backed ...
More News Ľ