Quantum mechanics creates location-based cryptography
2010 07 28

By Alasdair Wilkins | io9.com



Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.


Article from: io9.com



Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution




Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
ciphermysteries.com
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)


Latest News from our Front Page

If Someone Secretly Controlled What You Say, Would Anyone Notice?
2014 10 01
The subject enters a room in which a 12-year-old boy is seated. A 20-minute conversation ensues. The subject quizzes the boy about current events and other topics to get a sense of his intelligence and personality. But the boy is not what he appears to be. Unbeknownst to the subject, the boy is wearing a radio receiver in his ear, and ...
Obama has had accurate intelligence about ISIS since BEFORE the 2012 election, says administration insider
2014 10 01
‘President Barack Obama’s intelligence briefings have provided him with specific information since before he won re-election in 2012 about the growing threat of the terror group now known alternatively as ISIS and ISIL, an administration insider told MailOnline on Monday. ‘Unless someone very senior has been shredding the president’s daily briefings and telling him that the dog ate them, highly accurate ...
Can holding a magnet against your head help defeat depression?
2014 10 01
Former GP Sue Mildred suffered from crippling depression and anxiety for 20 years. On two occasions it was so severe that she ended up in hospital, and for 15 years she was unable to work. Sue, 51, has tried antidepressants, talking therapies and, out of desperation, even ECT (electro-convulsive therapy), where an electric current is passed through the brain. This did ...
Extremists to have Facebook and Twitter vetted by anti-terror police
2014 09 30
Theresa May to announce new Extremist Disruption Orders to strengthen counter-terrorism if the Tories win the next general election Extremists will have to get posts on Facebook and Twitter approved in advance by the police under sweeping rules planned by the Conservatives. They will also be barred from speaking at public events if they represent a threat to “the functioning of democracy”, ...
Scottish Independence: Protesters demand revote
2014 09 30
Pro-independence campaigners gathered outside the Scottish Parliament for the second day in a row, this time to demand a revote of the September 18 referendum. While yesterday’s “Rally For A Revote” saw the return of Saltires and Yes banners to Holyrood, it did not match the turnout for the “Voice Of The People” rally held on Saturday, when up 3000 people ...
More News »