Quantum mechanics creates location-based cryptography
2010 07 28
By Alasdair Wilkins | io9.com
Imagine a form of encrypted communication so secure that it’s physically impossible to access it unless you’re actually at the location where you’re supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.
The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.
And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver’s location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that’s just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it’s impossible to create an exact replica of a quantum state.
This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they’d still need multiple transmitters to mimic the supposed location, but that’s now physically impossible because the first adversary would need to both store the qubit’s state and send it on to the next confederate, and quantum mechanics says that’s impossible.
As the authors note in their abstract:
Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
Article from: io9.com
Also tune into:
Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers
Nick Pelling - Deciphering of the Mysterious Voynich Manuscript
Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Can’t Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)
Latest News from our Front Page
UK hospital accused of selling body parts for booze
2014 07 31
A leading cancer hospital is to be investigated following allegations that one of its staff members exchanged human body samples for whisky and cash.
The calls to investigate Christies NHS foundation trust came after the accusation was made by an anonymous whistleblower, prompting British MP Rosie Cooper to contact the watchdog, the Human Tissue Authority (HTA), the Manchester Evening News reports.
15 dead, over 220 injured as multiple gas explosions hit Taiwan city
2014 07 31
Several blasts have ripped through Kaohsiung, a city in south-western Taiwan, killing 15, injuring over 220 and overturning the cars in the street, the Fire Agency said. The cause is thought to be gas leaks in the sewage system.
The number of those injured is expected to rise, the Fire Department said. Many were also taken to schools across the city ...
TYPOGRAPHICAL ERROR on front page of alleged U.S. criteria for terrorist list
2014 07 31
We highlighted the recent report from Glenn Greenwald’s site, The Intercept, about the United States administration’s ’Terror Watch List’, and how "a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database".
Read: BLACKLISTED: The Secret Government Rulebook For Labeling You a Terrorist
A reader with a sharp ...
Why is the State so obsessed by, and careless with, deadly pathogens?
2014 07 31
Earlier this month, we ran a report on the CDC anthrax blunder. As if that weren’t bad enough, there have been additional exposures since we posted that report. This time, it involved the shipment of live, highly contagious, and deadly H5N1 avian influenza samples.
As previously reported, as many as 841 scientists and staff members at a US Centers for Disease ...
‘Catastrophic’: Hedge fund billionaire Paul Singer warns of EMP
2014 07 31
Imminent: ‘Only a matter of time’ until entire electric grid destroyed by natural or man-made event…
Billionaire hedge fund manager Paul Singer is warning investors – and more broadly, lawmakers and leaders – about the potential destructive power of an electromagnetic pulse, or EMP, which could be triggered by solar events or artificially, via blasts in the atmosphere.
According to Singer, research ...
|More News » |