Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Quantum mechanics creates location-based cryptography

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Science Donate to DU
 
Forkboy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-28-10 10:08 AM
Original message
Quantum mechanics creates location-based cryptography
Imagine a form of encrypted communication so secure that it's physically impossible to access it unless you're actually at the location where you're supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver's location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that's just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it's impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they'd still need multiple transmitters to mimic the supposed location, but that's now physically impossible because the first adversary would need to both store the qubit's state and send it on to the next confederate, and quantum mechanics says that's impossible.

http://io9.com/5597728/quantum-mechanics-creates-location+based-cryptography
Printer Friendly | Permalink |  | Top
patrice Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-28-10 10:21 AM
Response to Original message
1. Where can I get one of these?
Thanks Forkboy!

:hi:
Printer Friendly | Permalink |  | Top
 
xchrom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-28-10 10:44 AM
Response to Original message
2. I wish I understood what you just said.
It's not dirty is it?

I'll be bummed if I don't understand it
And it's dirty.
Printer Friendly | Permalink |  | Top
 
dtexdem Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-28-10 11:50 AM
Response to Original message
3. Can you hear me now?
Then how about here?

;-)
Printer Friendly | Permalink |  | Top
 
Jim__ Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-28-10 02:43 PM
Response to Original message
4. "The basic idea is simple ..."
OK. Can someone explain the basic idea to me? I know what triangulation is, but I don't understand how this works. The sender sends out some qubits and they can't be both stored and cloned.

Is the fact that it's being transmitted to 2 different receivers integral to this process? Does it have to be transmitted to 2 different receivers due to the triangulation? How do the non-clonable qubits fit into this. The first receiver receives the qubits. But, since they can't be cloned, I assume the sender cannot retransmit them.

I don't get it.
Printer Friendly | Permalink |  | Top
 
TheMadMonk Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-29-10 03:10 AM
Response to Reply #4
5. Two or more transmitters can be modulated in such a way as to appear at a distance...
...to be one transmitter in between. Triangulation takes a bearing on a signal, to be sure if it's coming from the right direction. Two bearings can be plotted on a map and their intersection point should be the transmitter's location. A spoofed signal causes the triangulating receivers to mistakenly "average" the signals.

Quantum cryptography relies on signals that are destroyed when they are read. To spoof location based quantum cryptograpghy, you would have to be able to recreate the original signal at least twice, transmit it to your two separate spoof transmitters, somehow retransmit without destroying the quantum information and do it in such a way that two quantum "packets" become one.
Printer Friendly | Permalink |  | Top
 
Jim__ Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-29-10 07:46 AM
Response to Reply #5
6. Thanks. That helps.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue May 07th 2024, 01:13 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Science Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC