Quantum mechanics creates location-based cryptography
2010 07 28
By Alasdair Wilkins | io9.com
Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.
The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.
And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.
This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.
As the authors note in their abstract:
Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
Article from: io9.com
Also tune into:
Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers
Nick Pelling - Deciphering of the Mysterious Voynich Manuscript
Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)
Latest News from our Front Page
Right into enemy hands? ISIS shows off new weapons allegedly airdropped by US (VIDEO)
2014 10 23
Islamic State has published a new video in which a jihadist shows off brand-new American hardware, which was purportedly intended for the Kurds they are fighting in the Syrian border town of Kobani.
The undated video, posted by the unofficial IS mouthpiece “a3maq news”, sees a jihadist showing several boxes of munitions with English-language markings, with a parachute spread out on ...
STAGED INFECTION: Has The Ebola ‘Outbreak’ Narrative Fallen Apart?
2014 10 22
Over the past month, the ‘pandemic’ propaganda surrounding the deadly Ebola virus seemed to reach vitriolic levels – raising serious questions about the validity of this current viral outbreak…
On Monday of this week, it was reported that 48 people were released and cleared after a 21-day quarantine due to their contact with the now deceased Ebola-stricken patient Thomas Eric ...
6,000-Year-Old Temple with Possible Sacrificial Altars Discovered
2014 10 21
A 6,000-year-old temple holding humanlike figurines and sacrificed animal remains has been discovered within a massive prehistoric settlement in Ukraine.
Built before writing was invented, the temple is about 60 by 20 meters (197 by 66 feet) in size. It was a "two-story building made of wood and clay surrounded by a galleried courtyard," the upper floor divided into five ...
What happened to Journalist Serena Shim? Assassinated? Find out what happened to Serena, Press TV director calls on Turkey
2014 10 21
Press TV news director Hamid Reza Emadi says the “suspicious death,” of the news channel’s correspondent in Turkey is a tragedy for “anyone who wants to get the truth.”
Emadi made the remarks in an interview with Press TV on Sunday following Serena Shim’s death across the border from Syria’s Kurdish city of Kobani, where the ISIL terrorists and Kurdish fighters ...
Ancient Roman Nanotechnology Inspires Next-Generation Holograms for Information Storage
2014 10 21
The Lycurgus Cup, as it is known due to its depiction of a scene involving King Lycurgus of Thrace, is a 1,600-year-old jade green Roman chalice that changes colour depending on the direction of the light upon it. It baffled scientists ever since the glass chalice was acquired by the British Museum in the 1950s, as they could not work ...
|More News » |