Quantum mechanics creates location-based cryptography
2010 07 28
By Alasdair Wilkins | io9.com
Imagine a form of encrypted communication so secure that itís physically impossible to access it unless youíre actually at the location where youíre supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.
The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.
And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiverís location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But thatís just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states itís impossible to create an exact replica of a quantum state.
This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, theyíd still need multiple transmitters to mimic the supposed location, but thatís now physically impossible because the first adversary would need to both store the qubitís state and send it on to the next confederate, and quantum mechanics says thatís impossible.
As the authors note in their abstract:
Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
Article from: io9.com
Also tune into:
Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers
Nick Pelling - Deciphering of the Mysterious Voynich Manuscript
Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Canít Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)
Latest News from our Front Page
The Aeon of Horus is Ending and the Elites are Nervous as their Icons are Dying
2014 04 18
I predict there is going to be a huge resurgence of interest in European indigenous spiritual traditions from Norse to Celtic/Gaelic to Slavic and so on. Millions of Europeans are going to realise that we are the victims of Christianity and New Age garbage. Their bastardised Kabbalah, the psychic force used by Crowley and the elites to cement his Aeon ...
Easter - Christian or Pagan?
2014 04 18
Contrary to popular belief, Easter does not represent the "historical" crucifixion and resurrection of Jesus Christ. In reality, the gospel tale reflects the annual "crossification" of the sun through the vernal equinox (Spring), at which time the sun is "resurrected," as the day begins to become longer than the night.
Rather than being a "Christian" holiday, Easter celebrations date back ...
Man-Made Blood Might Be Used in Transfusions by 2016
2014 04 18
Researchers in the U.K. have created the first man-made red blood cells of high enough quality to be introduced into the human body
The premise of the HBO show and book series True Blood revolves around a technological breakthrough: scientists figure out how to synthesize artificial human blood, which, as an ample new source of non-human food, allows vampires to "come ...
The Trials of the Cherokee Were Reflected In Their Skulls
2014 04 18
Researchers from North Carolina State University and the University of Tennessee have found that environmental stressors Ė from the Trail of Tears to the Civil War Ė led to significant changes in the shape of skulls in the eastern and western bands of the Cherokee people.
The findings highlight the role of environmental factors in shaping our physical characteristics.
Our Fears May Be Shaped by Ancestral Trauma
2014 04 18
Last December, an unsettling Nature Neuroscience study found that mice who were taught to associate the smell of cherry blossoms with pain produced offspring who feared the smell of cherry blossoms, even if they had never been exposed to it before. We knew that the process was epigeneticóthat it was not hard-wired in the permanent genetic structure of the mouseóbut ...
|More News Ľ |