Your secrets are safe with quasar encryption
Sean McGrath
sean at manybits.net
Wed Mar 29 21:20:33 EST 2006
http://www.newscientisttech.com/article.ns?id=dn8913&print=true
Your secrets are safe with quasar encryption
* 16:00 29 March 2006
* NewScientist.com news service
* Will Knight
Intergalactic radio signals from quasars could emerge as an exotic but
effective new tool for securing terrestrial communications against
eavesdropping.
Japanese scientists have come up with a method for encrypting messages
using the distant astronomical objects, which emit radio waves and are
thought to be powered by black holes.
Ken Umeno and colleagues at the National Institute of Information and
Communications Technology in Tokyo propose using the powerful radio
signals emitted by quasars to lock and unlock digital communications in
a secure fashion.
The researchers believe quasars could make an ideal cryptographic tool
because the strength and frequency of the radio pulses they emit is
impossible to predict. "Quasar-based cryptography is based on a physical
fact that such a space signal is random and has a very broad frequency
spectrum," Umeno told New Scientist.
One-time pad
Randomness provides a simple means of high-security information
encryption, providing two communicating parties have access to the same
source of random information. For example, a randomly generated
"one-time pad" shared by two parties can be used to encrypt and decrypt
a message by simply transposing each individual bit of a message for
bits on the pad.
Genuine randomness is hard to generate artificially and the
“pseudo-randomness” which most computers use is unsuitable for use in
cryptography as patterns will be revealed over time. In addition, it is
also tricky for two parties to share a source of randomness securely.
Umeno and his colleagues suggest using an agreed quasar radio signal to
add randomness to a stream cipher - a method of encrypting information
at high speed.
Each communicating party would only need to know which quasar to monitor
and when to start in order to encrypt and decrypt a message. Without
knowing the target quasar and time an eavesdropper should be unable to
decrypt the message.
Umeno believes astronomical cryptography could appeal to anyone who
requires high-security communications. He adds that the method does not
require a large radio antenna or that the communicating parties be
located in the same hemisphere, as radio signals can be broadcast over
the internet at high speed.
"Concerning potential users, I suggest international financial
institutions, governments and embassies," Umeno says.
The researchers used quasar signals collected by Very Long Baseline
Interferometry antenna at the institute to encrypt messages and have
filed two patents covering quasar-based cryptography: one for locking
and unlocking messages and another for generating digital signatures
that can be used to match messages or files to a person.
However, some cryptography researchers question the need for such an
unusual means of securing messages.
"This is interesting research, but there's no reason for anyone to use
it in a practical application," says Bruce Schneier of Counterpane
Security. "Furthermore, this is a brand new idea. Why would anyone want
to use something new and untested when we've already got lots of good
cryptography?"
Markus Kuhn from the University of Cambridge, UK, adds that the physical
set-up could have potential weaknesses. "It is easy to play tricks with
reception antennas," he says. For example, he suggests that an attacker
could mimic a radio signal and "gain a lot of control over the signal
that the receiver can see."
Related Articles
* Photon detector is precursor to broadband in space
* http://www.newscientisttechnology.com/article/dn8877
* 21 March 2006
* Busted! A crisis in cryptography
* http://www.newscientisttechnology.com/article/mg18825301.600
* 17 December 2005
* Let chaos keep your secrets safe
* http://www.newscientisttechnology.com/article/mg18825262.000
* 19 November 2005
Weblinks
* National Institute of Information and Communications Technology
* http://www.nict.go.jp/
* Quasar Encryption patent
*
http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20050242987&OS=20050242987&RS=20050242987
* Quasar Authentication patent
*
http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20030145202&OS=20030145202&RS=20030145202
Close this window
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list