. Military Space News .




.
CYBER WARS
Twists to quantum technique for secret messaging give unanticipated power
by Staff Writers
Singapore (SPX) Feb 24, 2012

From ancient Rome to the modern age, most classical schemes for cryptography have relied on the 'decoding' step involving some problem that is hard to solve - but hard, rather than impossible. That has left cryptographic schemes, including those in wide use today, vulnerable to clever people or advances in technology. Quantum cryptography, by contrast, offers security protected by the laws of physics.

Quantum cryptography is the ultimate secret message service. Now new research, to be presented at the 2012 AAAS Annual Meeting, shows it can counter even the ultimate paranoid scenario: when the equipment or even the operator is in the control of a malicious power.

Until now, quantum cryptography protocols have always assumed that an adversary would not have access to information about any choices that are made during the process of encryption. "We are challenging this assumption," says Artur Ekert, Director of the Centre for Quantum Technologies (CQT) at the National University of Singapore (NUS) and Professor at the University of Oxford, UK, who will present the research. "We are asking well, what if you are controlled?"

In a world of secrets, it pays to be paranoid. From ancient Rome to the modern age, most classical schemes for cryptography have relied on the 'decoding' step involving some problem that is hard to solve - but hard, rather than impossible. That has left cryptographic schemes, including those in wide use today, vulnerable to clever people or advances in technology.

Quantum cryptography, by contrast, offers security protected by the laws of physics. The technique provides a way for two parties to share a secret key - a random sequence of 1s and 0s - which can then be used to scramble a message. The security comes from quantum laws providing a built-in way to detect eavesdropping attempts. When the key is transmitted, using photons, say, any interception of the signal changes it in a way the legitimate parties can detect. Insecure keys can then be discarded.

But a "malicious manipulator" might have the ability to control the setup or influence the communicating parties' choice of settings in transmitting the key. The manipulation could even be something enshrined in fundamental physics - a limit on the amount of free will that humans can exercise.

It's a huge challenge to face, but the researchers believe quantum cryptography can still sometimes triumph. Ekert and his colleagues have worked out how to calculate, given the degree of manipulation, how much genuine 'randomness' remains in the key. This offers a measure of how much of the key has been left untouched and will, in turn, determine how much of the key can be guaranteed secret.

The breakthrough, which Ekert will present at AAAS on 18 February, builds on two recent twists that have given quantum cryptography a powerful boost against eavesdroppers.

The first came when researchers showed that one can design quantum cryptography setups such that devices of dubious provenance - such as those purchased from an untrusted supplier, or even an enemy - can still, with some care, be safely used for secure communication. This remarkable feat is known as 'device independent cryptography' and is on the edge of being technologically feasible.

The second twist was the realisation that device-independent schemes transcend the details of the underlying physics. Even if physicists discover new laws, such as a 'theory of everything' that replaces quantum mechanics, these schemes will continue to be secure.

The new work was led by Dax Koh, a scholar with Singapore's Agency for Science, Technology and Research (A*STAR) working at CQT, and Michael Hall of the Centre for Quantum Dynamics at Griffith University in Australia. Others involved in addition to Ekert are Valerio Scarani of CQT and NUS, Setiawan of NUS, Alastair Kay of CQT and the University of Oxford, and James Pope and Chiara Marletto of the University of Oxford. A paper is in preparation. A preprint is available on the physics preprint server arXiv.

Related Links
Centre for Quantum Technologies at the National University of Singapore
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
WikiLeaks suspect charged, declines to enter plea
Fort Meade (AFP) Maryland (AFP) Feb 23, 2012
WikiLeaks suspect Bradley Manning declined to enter a plea as the US Army private was formally charged on Thursday with turning over a cache of classified US documents to WikiLeaks. Manning, a 24-year-old former intelligence analyst, was charged with 22 counts, the most serious of which is "aiding the enemy," which could send him to prison for life. Dressed in a US Army uniform and flank ... read more


CYBER WARS
Israel deploys Iron Dome ABM battery

Tel Aviv to get missile interceptor system: army

India says missile shield test a success

Israel conducts 'final test' on Arrow anti-missile system

CYBER WARS
Raytheon Completes First Test of JSOW-ER Warhead

US Army Fires Raytheon Griffin Missile During Forward Operating Base Protection Test

Raytheon Engages Malaysian Industry for Missile Work

Third MEADS Battle Manager Arrives In Huntsville for Integration Testing

CYBER WARS
Innocon has received an order for its MiniFalcon II Tactical UAV

Pakistan tribesmen protest US drone strikes

Anglo-French UAV cooperation progresses

Raytheon demos fire-control system

CYBER WARS
Longbow Delivers First Production Block III Apache Data Link System to US Army

Cambridge Consultants unveils ModStar radio architecture for military communications

General Dynamics Demonstrates First MUOS-based Communications on JTRS HMS Radio

U.S. Navy satellite launch scrubbed again

CYBER WARS
Raytheon's JLENS Proves Tracking Capabilities During Test

Lockheed Martin Expands Facility For F-35 Component Manufacturing In Pinellas Park, Fla.

Chile-Peru border alert over land mines

Edwards F-35A Conducts First External Weapons Test Mission

CYBER WARS
US judge transfers Viktor Bout from solitary cell

Turkey plans to buy 100 US F-35 fighters: report

India eyes more Kazan Mi-17 V5 helicopters

Doubts over new Canadian hub in Germany

CYBER WARS
Chinese netizens flood Obama's Google+ page

China's Xi pleases crowd, gives little away on tour

India-US relations not aimed at China: Antony

China's Xi shows US new style but questions linger

CYBER WARS
Coaxing gold into nanowires

Children may have highest exposure to titanium dioxide nanoparticles

Dust from industrial-scale processing of nanomaterials carries high explosion risk

Researchers Find Strange New Nano-region Can Form in Quasicrystals


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement