Quantum mechanics creates location-based cryptography
2010 07 28

By Alasdair Wilkins | io9.com

Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.

Article from: io9.com

Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution

Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)

Latest News from our Front Page

Norway Joins the Race to Develop Killer Robots
2014 10 24
Norway is a large exporter of weapons, which makes the resolution of the debate about creating killer robots an important issue for everyone.  One could debate the overall merits or failings of robotic systems, but an area that clearly has become a point for concern on all sides is the emergence of "killer robots." According to robotics pioneer, David Hanson, ...
Gene That Once Aided Survival in the Arctic Found to Have Negative Impact on Health Today
2014 10 23
In individuals living in the Arctic, researchers have discovered a gene variant that arose thousands of years ago and most likely provided an evolutionary advantage for processing high-fat diets or for surviving in a cold environment; however, the variant also seems to increase the risk of hypoglycemia, or low blood sugar, and infant mortality in today’s northern populations. {snip} “Our work ...
The Ebola hoax: questions, answers, and the false belief in the “One It”
2014 10 23
“The Reality Manufacturing Company doesn’t just sell ‘fake paintings’ that are easy to spot. No. They also sell images that are geared to mesh with people’s deeply held instincts and thereby produce rigid false beliefs. People are sure that if they gave up such beliefs, their world would fall apart and blow away in the wind.” ...
New Controversial Theory Suggests "Hobbits" Were Not Human - Who Were These Mysterious Beings?
2014 10 23
The origin of the Hobbit species remains a challenging subject to scientists. The Hobbit’s discovery confirmed the view that the Earth was once populated by many species of human, but new research the Hobbit’s were not human at all! So, who were these mysterious beings? Where did they come from? The idea that our species, Homo sapiens, was the only species of human on ...
Right into enemy hands? ISIS shows off new weapons allegedly airdropped by US (VIDEO)
2014 10 23
Islamic State has published a new video in which a jihadist shows off brand-new American hardware, which was purportedly intended for the Kurds they are fighting in the Syrian border town of Kobani. The undated video, posted by the unofficial IS mouthpiece “a3maq news”, sees a jihadist showing several boxes of munitions with English-language markings, with a parachute spread out on ...
More News »