Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Noise keeps spooks out of the loop (Developer claims it's better than quantum cryptography)
NewScientist ^ | 5/23/07 | D. Jason Palmer

Posted on 05/26/2007 6:26:09 PM PDT by LibWhacker

SPYING is big business, and avoiding being spied on an even bigger one. So imagine if someone came up with a simple, cheap way of encrypting messages that is almost impossible to hack into?

American computer engineer Laszlo Kish at Texas A&M University in College Station claims to have done just that. He says the thermal properties of a simple wire can be exploited to create a secure communications channel, one that outperforms quantum cryptography keys.

His cipher device, which he first proposed in 2005, exploits a property called thermal noise. Thermal noise is generated by the natural agitation of electrons within a conductor, which happens regardless of any voltage passed through it. But it does change depending on the conductor's resistance.

Kish and his collaborators at the University of Szeged in Hungary say this can be used to securely pass information, or an encryption key, down any wire, including a telephone line or network cable. In their device, both the sender Alice and the receiver Bob have an identical pair of resistors, one producing high resistance, the other low resistance. The higher the total resistance on the line, the greater the thermal noise.

Both Alice and Bob randomly choose which resistor to use. A quarter of the time they will both choose the high resistor, producing a lot of noise on the line, while a quarter of the time they will both choose the low resistor, producing little noise. If either detect a high or a low amount of noise in the line, they ignore any communication.

Half the time, however, they will choose differently, producing an intermediate level of thermal noise, and it is now that a message can be sent. If Bob turns on his high resistor, and records an intermediate level of noise, he instantly knows that Alice has chosen her low resistor, in essence sending a bit of information such as 1 or 0. Kish's cipher does this many times, sending a random series of 1s and 0s that can form the basis of an encryption key, the researchers say (http://www.arxiv.org/abs/physics/0612153).

That message is also secure. For a start, as Kish notes, it takes an "educated eavesdropper" to even realise information is being sent when there seems to be just low-level noise on the line. If they do try to eavesdrop, they can only tell a message is being sent, not what it is, because it's impossible to tell whether Alice has a high or low resistor turned on, and whether the bit of information is a 1 or a 0. What's more, eavesdropping on the line will naturally alter the level of thermal noise, so Alice and Bob will know that someone is listening in.

Kish and his team have now successfully built a device that can send a secure message down a wire 2000 kilometres long, much further than the best quantum key distribution (QKD) devices tried so far. Tests show a signal sent via Kish's device is received with 99.98 per cent accuracy, and that a maximum of just 0.19 per cent of the bits sent are vulnerable to eavesdropping. The error rate is down to the inherent resistance of the wire, and choosing a larger wire in future models should help reduce it further. "A secure message can be sent down a wire 2000 kilometres long"

However, this level of security already beats QKD. What's more, the system works with fixed lines, rather than the optical fibres used to carry photons of light at the heart of quantum encryption devices. It is also more robust, as QKD devices are vulnerable to corruption by dust, heat and vibration. It is also much cheaper. "I guess it's around a hundred dollars, at most," Kish says.

"This is a system that should be taken seriously," says security specialist Bruce Schneier, who founded network security firm BT Counterpane. He says he was seduced by the simplicity of the idea when it was first proposed by Kish, and now wants to see independent tests of the working model. "I desperately want someone to analyse it," he says. "Assuming it works, it's way better than quantum."


TOPICS: Miscellaneous; Technical
KEYWORDS: cipher; cryptography; noise; quantum
Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

1 posted on 05/26/2007 6:26:10 PM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies]

To: LibWhacker
Rut Roh!

Z Group won't like this.

Garde la Foi, mes amis! Nous nous sommes les sauveurs de la République! Maintenant et Toujours!
(Keep the Faith, my friends! We are the saviors of the Republic! Now and Forever!)

LonePalm, le Républicain du verre cassé (The Broken Glass Republican)

2 posted on 05/26/2007 6:29:02 PM PDT by LonePalm (Commander and Chef)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker
I'm working in Taiwan right now, and I'm going to get my resident visa tomorrow. I've worked in Taiwan before, but one thing they've added to the visa is now I must go down personally and give a thumb print.

Whoop dee doo, so low tech, but it guarantees I'm me. I couldn't help thinking how easy it is to secure ID's, and enforce immigration rules, and security rules, with low-to-no tech methods.

From this guy's name and his collaboration with a university in Hungary, I'm assuming he's originally Hungarian. That would make sense, a practical outsider seeing the powerful potential of simple processes, while we claim nothing can be secured without spending $10 billion dollars!
3 posted on 05/26/2007 6:49:08 PM PDT by starbase (Understanding Written Propaganda (click "starbase" to learn 22 manipulating tricks!!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

Amateurs. I just Planck my quantum foam through the pre-determined aperture and after delivery - it dissappears on its own. Nothing could be simpler. Hackproof.


4 posted on 05/26/2007 6:52:14 PM PDT by BipolarBob (Yes I backed over the vampire, but I swear I didn't see it in my rear view mirror.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Interesting.


5 posted on 05/26/2007 6:57:12 PM PDT by KoRn (Just Say NO ....To Liberal Republicans - FRED THOMPSON FOR PRESIDENT!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Bookmarked


6 posted on 05/26/2007 7:01:40 PM PDT by chaosagent (Remember, no matter how you slice it, forbidden fruit still tastes the sweetest!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Interesting.

The article doesn’t mention if this will work over a routed network. If it does, once authentication is performed, it seems to me to be extremely secure.

I don’t see how it would work over a router though if the packets are secured by noise.


7 posted on 05/26/2007 7:10:28 PM PDT by American_Centurion (No, I don't trust the government to automatically do the right thing.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

**** Secure Bookmark ****



8 posted on 05/26/2007 7:12:27 PM PDT by NonLinear (This is something almost unknown within Washington. It's called leadership.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BipolarBob

Hackresistant...


9 posted on 05/26/2007 7:13:22 PM PDT by null and void (Carter calling Bush worst president in U.S. history is like Michael Moore calling Ann Coulter fat...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: LibWhacker

This seems to have a fundamental problem to me. It seems to depend on two users sharing a common direct hardwired connection. That way they both see the same thermal noise on the line. But suppose each connects to the other through a series of intermediate stops, such as you see on the internet. Then you simply dont see the same line noise and this system would seem to fall apart. What am I missing?


10 posted on 05/26/2007 7:14:22 PM PDT by pepsi_junkie (Often wrong, but never in doubt!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NonLinear
Oh? Not as secure as you think!

Tag! you're it...

11 posted on 05/26/2007 7:15:15 PM PDT by null and void (Carter calling Bush worst president in U.S. history is like Michael Moore calling Ann Coulter fat...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: LibWhacker

I thought this was an article about housing discrimination in Chicago.


12 posted on 05/26/2007 7:15:32 PM PDT by Krankor (kROGER)
[ Post Reply | Private Reply | To 1 | View Replies]

To: starbase
It's a good idea to start writing software to deploy to servers / workstations that can leverage this super encryption technology. This is outstanding research -- an impressive combination of computer science and electronic engineering. Very impressive.

The pure randomness of electronic noise patterns would be orders of magnitude more difficult to crack than 128bit encryption is today. Check it out -- why don't we just encrypt all TCP/IP packets on all overseas routed fiber multiplexes - it would prevent terrorists in countries outside the encrypted networks from easily abusing the open internet to plan and execute attack missions.

13 posted on 05/26/2007 7:18:14 PM PDT by gcraig
[ Post Reply | Private Reply | To 3 | View Replies]

To: LibWhacker; ShadowAce

BTTT


14 posted on 05/26/2007 7:18:25 PM PDT by Fiddlstix (Warning! This Is A Subliminal Tagline! Read it at your own risk!(Presented by TagLines R US))
[ Post Reply | Private Reply | To 1 | View Replies]

To: starbase

Instead of transmitting anything, it sounds like he’s exploiting a physical property of the line to communicate a passkey. (?)

Still, a signal is a signal. I could wave across the street to my neighbor while on the telephone, or tell him to dial the initial call that way. Nobody tapping our telephone line would hear us waving.


15 posted on 05/26/2007 7:20:27 PM PDT by SteveMcKing
[ Post Reply | Private Reply | To 3 | View Replies]

To: Alas Babylon!; American_Centurion; An.American.Expatriate; ASA.Ranger; ASA Vet; Atigun; Ax; ...
MI Ping

ATTN: SIGINT SECTION

16 posted on 05/26/2007 7:22:15 PM PDT by ASA Vet (W)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void
Keeping us spooks out? is more difficult than that.
17 posted on 05/26/2007 7:27:08 PM PDT by ASA Vet (W)
[ Post Reply | Private Reply | To 11 | View Replies]

To: LibWhacker

Very good post. I enjoyed that. thanks.


18 posted on 05/26/2007 7:34:49 PM PDT by DanielLongo (Don't tread on me)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Krankor

LOL


19 posted on 05/26/2007 7:39:21 PM PDT by toddlintown (Six bullets and Lennon goes down. Yet not one hit Yoko. Discuss.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: null and void
Sure.
Nice catch!

But of course, since you know the secret handshake,you're clearly authorized to see the secure bookmark!

How long do you think it will be untill folks start wonder about the almost meaningless 'posts' that surround the secret ones?

20 posted on 05/26/2007 8:26:50 PM PDT by NonLinear (This is something almost unknown within Washington. It's called leadership.)
[ Post Reply | Private Reply | To 11 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson