Quantum mechanics creates location-based cryptography
By Alasdair Wilkins | io9.com
Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.
The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.
And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.
This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.
As the authors note in their abstract:
Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
Article from: io9.com
Also tune into:
Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers
Nick Pelling - Deciphering of the Mysterious Voynich Manuscript
Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)
Latest News from our Front Page
Pro-Israel bias: BBC admits editorial breach in interview with Israeli defense chief
The BBC has reached a â€śprovisional findingâ€ť to uphold complaints made by Palestinian activists that the broadcaster breached its editorial guidelines in a â€śsoftâ€ť interview with the Israeli defense minister.
Complaints focused on BBC journalist Sarah Montagueâ€™s alleged failure to challenge controversial claims made by Israeli Defense Minister Moshe Yaâ€™alon.
Journalist Amena Saleem, who works with the Palestine Solidarity Campaign (PSC), wrote ...
41% of Americans Support Criminalizing "Hate Speech"
The following are from a recent poll about what some are calling on for "hate speech"
1. Support for Hate Crimes Legislation
Do you support or oppose the federal law that requires increased penalties for hate crimes committed on the basis of the actual or perceived race, color, religion, national origin, ethnicity, or gender of any person?
2. Support for Expanding Hate Crimes
FBI Admits No Major Cases Cracked with Patriot Act Snooping Powers
FBI agents canâ€™t point to any major terrorism cases theyâ€™ve cracked thanks to the key snooping powers in the Patriot Act, the Justice Departmentâ€™s inspector general said in a report Thursday that could complicate efforts to keep key parts of the law operating.
Inspector General Michael E. Horowitz said that between 2004 and 2009, the FBI tripled its use of bulk ...
Sweetener Stevia Was Once Hailed As An Anti-Fertility Agent for Population Reduction
Maybe it's not so sweet now... If you've thought stevia, the natural alternative to sugar and artificial sweetners with aspartame, et al., is too good to be true, there may be a catch. Check out this textbook written in 1970 by Paul and Anne Ehrlich, the precursor to the textbook Ecoscience they wrote with Obama Science Czar John P. Holdren ...
TPP Aproved: Senate Republicans Give Obama New Powers - Details Remain 'Classified'
President Obama won a big victory for his trade agenda Friday with the Senateâ€™s approval of fast-track legislation that could make it easier for him to complete a wide-ranging trade deal that would include 11 Pacific Rim nations.
A coalition of 48 Senate Republicans and 14 Democrats voted for Trade Promotion Authority late Friday, sending the legislation to a difficult fight ...
|More News » |