Quantum mechanics creates location-based cryptography
2010 07 28

By Alasdair Wilkins | io9.com



Imagine a form of encrypted communication so secure that itís physically impossible to access it unless youíre actually at the location where youíre supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiverís location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But thatís just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states itís impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, theyíd still need multiple transmitters to mimic the supposed location, but thatís now physically impossible because the first adversary would need to both store the qubitís state and send it on to the next confederate, and quantum mechanics says thatís impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.


Article from: io9.com



Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution




Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Canít Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
ciphermysteries.com
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)


Latest News from our Front Page

NATO Exercise in Ukraine Coincided with MH-17 Shoot-down
2014 07 24
Rapid Trident was omitted from the flurry of coverage on the shoot-down MH-17. From the U.S. Army in Europe website: Rapid Trident supports interoperability among Ukraine, the United States, NATO and Partnership for Peace member nations. The exercise helps prepare participants to operate successfully in a joint, multinational, integrated environment with host-nation support from civil and governmental agencies. ...
Warning of íimminentí terror attack in Norway
2014 07 24
Norwegians were warned Thursday of the concrete possibility of a terror attack occurring in that country at the hands of people with connections to an extremist group in Syria. A press conference was called in Oslo, Norway on Thursday where an announcement was made of a "possible concrete threat" to national security in that country from terrorists related to an extremist ...
Judge says government can access everything in a Gmail account
2014 07 24
All your emails are belong to us. At least thatís what the latest court order from a judge in New York says. The warrant, granted on June 11, states that the government can access all the content and files contained in a Gmail account. Yes, this is a significant blow to privacy. The subject of this specific search relates to a money laundering ...
Scotland Yard Spied on Grieving Families: secret surveillance after police victim shot seven times in head íby mistakeí
2014 07 24
More terror from the íanti-terrorí brigade. Undercover police gathered evidence on 18 grieving families By Rob Evans and Vikram Dodd | The Guardian Undercover police officers secretly gathered intelligence over two decades on 18 families fighting to get justice from the police, it was revealed on Thursday. The intelligence covering high-profile campaigns was collected between the mid-1980s and 2005, and affected grieving families ...
Air Algerie AH5017 with 116 onboard goes missing for hours, found crashed in Mali
2014 07 24
An Air Algerie flight carrying 110 passengers and six crew members has reportedly crashed in Mali after having disappeared from radar early on Thursday morning between Burkina Faso and Algeria. A French Ministry of Defense official told Fox News that the two French fighter jets located the wreckage of the plane, which had crashed in Mali. An airport official additionally confirmed ...
More News Ľ