Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

World's First Covert Communications System with Camouflage Guaranteed
MIT Technology Review ^ | 5-8-2014

Posted on 05/08/2014 10:33:56 AM PDT by markomalley

The world of cryptography has undergone a quiet revolution in recent years. That’s largely because of the advent of techniques that exploit the laws of quantum mechanics to send messages with perfect privacy. So-called quantum cryptography ensures that an eavesdropper cannot decode a message under guarantee by the laws of physics.

But sometimes perfect privacy isn’t enough. Sometimes the knowledge that a message has been sent is all that an adversary needs. So the question arises of how to hide a message so that an eavesdropper cannot tell whether it has been sent or not.

The discipline, known as steganography or covert communication, is as old as its cryptographic cousin but has received much less attention in recent years. But that changes today thanks to the work of Boulat Bash at the University of Massachusetts in Amherst and a few pals who have worked out how to camouflage messages in a way that is guaranteed mathematically.

And they’ve put their ideas into practice with a proof-of-principle demonstration. “We have built the first operational system that provides mathematically proven covert communication over a physical channel,” they say.

The technique is relatively straightforward, relying on a method of communication known as pulse position modulation. This divides each second (or other unit of time) into a number of time bands which each correspond to a symbol. Alice sends a message to Bob by transmitting pulses during bands that correspond to the required symbol, which Bob then looks up in the order he receives them.

There’s an important caveat, of course. This system requires the sender and receiver to agree on the band structure and the symbols they refer to. And this must be done in advance in secret.

This allows Alice and Bob to send encrypted messages (the length of which depend on the length of the information shared in advance).

The question is how to hide this information. And the answer is in plain view. Bash and co assume that the message is sent using photons and that the environment supplies a certain amount of noise against which their signal is camouflaged. For example, they assume that photon detectors are not perfect and so always produce a certain number of dark counts in which they register a photon without receiving one.

Bash and co’s focus is on calculating the number of signaling photons that can be sent in this noisy environment while guaranteeing that an eavesdropper cannot distinguish them from the background. This is possible because the watcher (Willie, as Bash and co call him) does not know when the signaling pulses are sent and always detects additional noisy photons that further confuse matters.

The breakthrough is in showing that the message can always be camouflaged with an arbitrary probability of detection, provided noise is within certain limits. Bash and co show this is true even when Willie collects all the photons that Bob does not receive.

In other words, Alice and Bob can choose the secrecy of their message in advance. And although they can’t choose perfect secrecy, they can get as close as they like to it. So Alice and Bob might choose a lower bit rate for messages for which they want a lower chance of detection.

To prove the viability of their scheme, Bash and co have built and tested a prototype that sends messages via an optical fiber. Alice transmits the pulses and a beam splitter at the other end ensures that Willie collects all the photons that do no travel to Bob.

And the experiment works well. “We demonstrated that provably covert optical communication is practically achievable,” say Bash and co.

That should have some interesting applications. But just who might be interested in such covert communications, Bash and co do not say. Suggestions please in the comments section.

TOPICS: Computers/Internet

1 posted on 05/08/2014 10:33:56 AM PDT by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley

Arguably, Jefferson and Madison would have wanted one - but Halitlon would have objected, as would have King George.

Hmmn, guess I like one for the principle of it.

2 posted on 05/08/2014 10:39:12 AM PDT by GladesGuru (Islam Delenda Est - because of what Islam is and because of what Muslims do.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GladesGuru

“Hamilton”, not “Haliton”.

3 posted on 05/08/2014 10:40:53 AM PDT by GladesGuru (Islam Delenda Est - because of what Islam is and because of what Muslims do.)
[ Post Reply | Private Reply | To 2 | View Replies]

4 posted on 05/08/2014 10:41:51 AM PDT by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GladesGuru

Haliton is a quantum of bad breath.

5 posted on 05/08/2014 10:49:28 AM PDT by caddie
[ Post Reply | Private Reply | To 3 | View Replies]

To: markomalley

Yep. Wonderful. Marvelous. And for $50,000 you buy the person sending or receiving the message.

6 posted on 05/08/2014 10:59:58 AM PDT by blueunicorn6 ("A crack shot and a good dancer")
[ Post Reply | Private Reply | To 1 | View Replies]

To: blueunicorn6

we give our Guys Clickers ,,,,
One click for Yes and,,,,

7 posted on 05/08/2014 11:16:41 AM PDT by Big Red Badger ( - William Diamonds Drum - can You Hear it G man?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: markomalley

I betcha the NSA had people involved in development.

8 posted on 05/08/2014 11:29:44 AM PDT by Dalberg-Acton
[ Post Reply | Private Reply | To 1 | View Replies]

To: caddie

Is it possible to measure a Haliton?

9 posted on 05/08/2014 11:31:06 AM PDT by ThirdMate
[ Post Reply | Private Reply | To 5 | View Replies]

To: markomalley

Probably the best current form of encryption could be called “a piece of hay in a haystack.” It requires a whole bunch of mundane and routine correspondence, like millions of business traffic letters, to hide in.

The key is an odd one: sentence composition.

Experienced writers know that the basic parts of a sentence can be combined and arranged in countless ways. But if you assign a numerical value to how sentences are constructed, all of that correspondence can be sorted by just those sentences with the previously agreed on construction, even though it looks like an ordinary business letter.

From that point it can get complicated. For example, one letter might only contain nouns and where in the sentence they fit. Others only verbs.

10 posted on 05/08/2014 11:31:07 AM PDT by yefragetuwrabrumuy (WoT News:
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

This is not a bump

11 posted on 05/08/2014 11:38:45 AM PDT by palmer (There's someone in my lead but it's not me)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson