Quantum mechanics creates location-based cryptography
2010 07 28
By Alasdair Wilkins | io9.com
Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.
The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.
And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.
This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.
As the authors note in their abstract:
Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
Article from: io9.com
Also tune into:
Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers
Nick Pelling - Deciphering of the Mysterious Voynich Manuscript
Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)
Latest News from our Front Page
Gov’t Fear Factory: ISIS Is Here, Just in Time for Another 9/11 Anniversary
2014 08 23
The government has been doing a whole lot of talking lately about the 9/11-style threat ISIS poses on American soil, how ISIS is like ’nothing the Pentagon has ever seen’ and how ISIS is likely already here... and all just in time right before another 9/11 anniversary! Fancy that.
Considering it’s on record where ISIS got a lot of its military ...
France delivered arms to Syrian rebels, Hollande confirms
2014 08 22
President Francois Hollande said on Thursday that France had delivered weapons to rebels battling the Syrian regime of Bashar al-Assad “a few months ago.”
The deliveries took place “a few months ago, when the Syrian rebels had to face both the armies of the dictator Bashar al-Assad and this terrorist group Islamic State,” Hollande told reporters on a tour of the ...
Brooklyn DA exposes hidden Child Sexual Abuse in the Orthodox Jewish Community
2014 08 22
Comment: We all know that the sex abuse cases within the Catholic church have been plastered all over the media in the last 6-8 years, but when do you ever hear about the rapes, sexual molestation and child sex abuse cases within the jewish orthodox community? Is the media helping to cover it? Will they give the same treatment of ...
California’s Economic Collision Course: Immigration and Water
2014 08 22
You have heard it before: “As California goes, so goes the nation.” If that is the case, the national economy will be harmed for decades to come because of California’s misplaced priorities today. Indeed, by emphasizing high-speed rail over water and failing to deal with its debt crisis, California poses a long-term threat to our national economy and ...
ISIS offered to swap Foley for ’Lady Al Qaeda’ - neuroscientist MIT-graduate
2014 08 21
An MIT-educated neuroscientist terrorist known as ’Lady al Qaeda’ was named on a ’laundry list’ of demands from ISIS captors holding James Foley named, it was revealed today.
Petite mother-of-three Aafia Siddiqui is currently serving 86 years in a Texas jail after being arrested with plans for a ’mass casualty attack’ in the US, including infecting people with Ebola and a ...
|More News » |