Holographic Sonar Cryptography 182
Atomic Snarl writes: "New Scientist.com has this story on how to encrypt a underwater sonar message using multiple sound path timing.
By detecting and adapting for the current variations on underwater sound channels,
the transmitted message can be received intelligibly only at a single point.
This holographic approach suggests a method of web encryption using multiple
hop paths and ping times to create a message which can only be decoded when
received at a specific target node!"
Secrecy by Delocalization (Score:3, Interesting)
Further, Holocomm's "delocalization" feature can be seen also in SHA-1, where *all* output bits change when one changes a *single* input bit. However, SHA-1 hopelessly mixes and merges all the data (as it is intended to do), while Holocomm allows for reversible and selective delocalization.
Thus, in two contrast points to former pure holographic codes, Holocomm aims at (1) non-lossy reversible (2) selective delocalization -- which also allows interoperation with all known cryptography algorithms (that require exact data for decoding). The reliability feature is also further enhanced by the non-lossy aspect of it. As mentioned, Holocomm can also work in lossy modes, including lossy compression -- which can be quite useful.
Holocomm is the first example of a practical quantum mechanical communication and encoding system that affords privacy and reliability, to a high degree, while also offering compression and selective information delocalization.
As such, it naturally has many parallels in several things that are based on wave functions or on the Schroedinger equation
Re:Secrecy by Delocalization (Score:2, Funny)
Wouldn't that mean that if you changed two input bits, all output bits would stay the same?
Re:Secrecy by Delocalization (Score:1)
Re:Secrecy by Delocalization (Score:2)
however, to be precise, SHA has every output bit influenced by every input bit. As does every other block cipher that comes to mind.
Quantum communication coming? (Score:1)
This effect could be used for communication and would imply two things:
1. As stated above, the communication would be instant, regardless of distance.
2. It is impossible to intercept the message with affecting it as any measurement will affect the result.
If it could be made to work, then you would have instant, uninterceptable communications. The problem being how you separate entangled pairs and get them to each end of the line. It's only been tested with distances of about 10 feet so far.
Re:Quantum communication coming? (Score:1)
But the possibilities are countless - Imagine how much easier it would be to control a space probe on Mars with zero latency!
If this thing really works over such great distances this could be one major step ahead for space colonization and long-distance communication.
(About encryption - it might seem like a swell idea, but remember that the particles have to interact some time before separating them, and then it would be just as practical giving your trusted party a symmetric cipher key instead of a molecule.)
Re:Quantum communication coming? (Score:1)
Re:Quantum communication coming? (Score:1)
But it's even worse, because you won't even
solve the latency problem (not easily at least)
Because, even with thios scheme where you already
send "preloaded" Exabits of data for future use
when you instantly change their value,
you will still need to let them know you did so.
but if they measure somthing before you sent the message,
then the roles are inverted
So you would need (maybe) another load of boggus
data, whose purpose would be to be constantly chewcked
by your remote fellows to see appear "self obvious" messages
like "ok, we did it now, check the data !"
But, as you wish 0 latency, you'll have to check
the bogus triggers so often, that you'll have an interesting probability to have self-obvious
messages appear randomly now and then
(remember you can't have initialized data, their value is unknown at "entanglement creation"
It only become previsible at measuring time
and only by the one that is measuring against his own
data-stream, giving it the value of the actual data-stream.
Re:Quantum communication coming? Misinterpretation (Score:1)
Yes, you are correct that the reason it can't be intercepted is that because it would break the message. And, of course, it's totally impractical. Interesting though - and, as a lot of Quantam Physics things are - totally counter-intuitive.
Quantum but not communication (Score:2)
The snag is, the only way for them to know that we did it is for us to tell them by some other means. This system can't be used to transmit any information since there's absolutely no way for them to know that the polarization entanglement has colapsed without either 1) measuring it first (which would make them the sender) or 2) getting a regular old non-quantum message from the sender.
So unlike Ma Bell and church Bell's, etc. J. S. Bell doesn't help you get your message through.
-- MarkusQ
SHA-1 != XOR (Score:2)
<NITPICK>
Due to the nature of bits (being 0 or 1), changing a bit means flipping them from 0 to 1 of vice versa. Changing *all* bits, would mean flipping them all, i.e. a XOR operation.
Changing a single input bit will change *some* output bits, not all of them. Would be a pretty useless hash algorithm
</NITPICK>
Re:SHA-1 != XOR (Score:1)
And to think that all these years I've been under the assumption that bit flipping can be accomplished with a NOT ;-)
</NITPICK>
Re:SHA-1 != XOR (Score:2)
Damn!
I really meant "XOR with one input always 1"
</SLAP>
Technobabble! (Score:1)
That's some mighty fine technobabble you've assembled there. If you're not already there, I strongly recommend heading out west and becoming a Hollywood script writer. They need people like you, to make the characters seem smart without actually saying anything.
Seriously though, I should point out that in a hydrological holographic communications medium, the thermal dynamism will, while not affecting the message in, a, lossy way, will cause changes in the order, that, the binary components might be received. It is of course trivial to correct for this, current use of super string theory provides an elegant method for accounting for said brownian reverberations in the stream, but it's still important to XOR the bits into a checksum before sending, just to make sure you understand.
Speed of sound versus ping times (Score:5, Insightful)
Internet traffic is another matter. If I tried to use a ping time to measure the geographic distance to another server, I'd be about as scientific as the Slashdot poll.
Am I wrong, or could internet latency give or take 100 ms or so from a ping, rendering the encrypted message readable by.. no one?
Re:Speed of sound versus ping times (Score:2, Insightful)
To me, it seems as hazardous underwater as on the Internet.
--
Re:Speed of sound versus ping times (Score:2, Interesting)
t is in degrees C and c is in m/sec.
In Fresh water c = 1403 + 5t - 0.06t^2 + 0.0003t^3
Good for 0 to 60 degrees C.
In sea water
c = 1449 +4.6t - 0.055t^2 + 0.0003t^3 + (1.39 - 0.012t)(S - 35) + 0.017d
Where S is the salinity expressed in parts per thousand, and d is the depth below the surface in meters.
Re:Speed of sound versus ping times (Score:5, Interesting)
In optical holography, you are recording the interference patterns resulting from a reference beam and reflected light. When you shine a laser of the right wavelength through or off the hologram, the interference patterns are "replayed" thus reproducing the image.
Little if any information can be gleamed from a single intererence pattern.
In the case of sonar, you are recording audio interference patterns. However, unlike in an optical holographic environment, the conditions change drastically under water depending upon weather condition and seasonal (or even geophysical (i.e earthquakes and volcanos) variations.
In a controlled scenario as described in the article, it works because the replay occurs in a very short time period and the interference patterns may not change much. Without an initial reference signal, it may be very hard to get a good mapping of the sonar environment.
As for the security, I wonder if you recorded the signal eminating from a single transducer at short range if you could actually receive the message at a spot other than intended.
RD
Asymmetric routing makes this moot anyway (Score:5, Interesting)
Even if you could eliminate the problems with the latency, the asymmetric routing that exists in the internet will kill this technique. This communication technique depends on the forward and the reverse path being identical - something which is not true when asymmetric routing is used.
Re:Speed of sound versus ping times (Score:1)
Why does an encrypted message have to be sent all at the same time, and therefore by the same route? If you were to split a message into an arbitrary number of pieces, with each one getting to its destination through a slightly different route, it might be a little more difficult to intercept.
Re:Speed of sound versus ping times (Score:1)
Re:Speed of sound versus ping times (Score:1)
I can;t wait for Dug Song to release dsniff v3.0 [monkey.org] with an implementation of the Sub-in-the-Middle (sitm) attack.
Re:Speed of sound versus ping times (Score:2)
Not only that, but if the enemy had enough passive sonar out there listening they might be able to collect enough data on this message to determine where it was "focused", giving away the location of the sub.
That's refreshing... (Score:2, Insightful)
...which leaves the question...
Does this mean that they need more "big rocks" under the Great Lakes, or can they still use the same "big rock" to use this?
Radio? (Score:3, Interesting)
David
Re:Radio? (Score:1)
Re:Radio? (Score:2, Interesting)
Secure??? Who knows. What it should allow with radio is something I've been calling "Space Division Multiple Access". In effect, using scatterers in the environment (e.g. buildings, mountains, what have you) the "cell size" could be brought down to a few tens of meters using the same number of base-station transceivers as currently exist. Who needs more spectrum when you can focus the same bandwidth on multiple physical locations?
BTW, the New Scientist article is talking about kinda old work. NS had a blurb on this back in '97 or so.
Re:Radio? (Score:2, Informative)
Interesting, but too scientific? (Score:3, Insightful)
The web is not wet, and is there a risk here (Score:2, Interesting)
Also, in the sonar field, would it be possible to guess at the location of a recipient by catching some of the signals? One wouldn't want to give away the location of your subs, would one?
Doubt that it would be useful.. (Score:4, Interesting)
A well-seasoned network admin friend of mine and I once had a conversation over dinner about an idea I had brewing -- An application that would attempt to guesstimate where you were on earth based on triangulating distances from known servers by means of measuring ping time. A small network database that contained, say, a hundred servers nationwide that constantly maintained a list of ping times to a hundred other machines would provide enough coverage and enough data to allow a single machine to guesstimate where it is on earth based upon simple trig.
The only problem with this idea is that A) Network latency times can change erratically from moment to moment, and B) Some nodes may even drop out of the network due to upgrades or flaming death. Depending upon how fine-grained the mesh is, and depending how accurate you want the guesstimate to be, you could be reasonably certain of at least being able to determine your location within a couple hundred miles.
Not useful for you and I, I know.. But it would be kinda cool if people could buy PCs, set up them straight out of the box, and the box goes out on the mesh and figures out where it is in the U.S., and sets the time accordingly, suggests local IPs, other stuff.
Amazing what you can discuss over a bacon cheeseburger, eh?
Cheers, and yes, PROPAGANDA is still up,
Re:Doubt that it would be useful.. (Score:2)
adapting to the current situation it would be
definitely doable. The bandwidth may be poor
though.
Re:Doubt that it would be useful.. (Score:1)
> An application that would attempt to guesstimate where you were on earth based on triangulating distances from known servers by means of measuring ping time.
I can reliably locate Slashdotters in meatspace by observing the time it takes for them to accumulate three troll responses to their posts.
Re:Doubt that it would be useful.. (Score:2, Informative)
Re:Doubt that it would be useful.. (Score:1)
No, all they did was measure the time it took his packets to get from place to place, then performed a back-of-the-envelope calculation to guesstimate a distance. It was about as scientific as Dianetics, even if the final answer happened to be more or less correct (as in, within a couple of thousand miles, in some direction.)
Had the hacker been sitting on the end of a modem in France, but dialed into a machine in Germany, their "system" could have produced an even more bogus result.
Re:Doubt that it would be useful.. (Score:1)
or even whether it is in the US.
Finally, a way to get rid around the horrible US_orientated software!
Re:Doubt that it would be useful.. (Score:2, Interesting)
This has been quite useful for air based wireless-
The theory behind it is even a standard part of amateur packet radio. When your using typically 50 watts (or even 1500 watts, legally) you tend to connect to some interestingly distant stations that you'd have no idea where they were if they didn't leave a little identifying information in their 'hostname'
Ah, yes. Manual routing of packets. Really makes one appreciate all the neat tools we use now..
Re:Doubt that it would be useful.. (Score:1)
Re:Doubt that it would be useful.. (Score:1)
Re:Doubt that it would be useful.. (Score:2)
Re:Doubt that it would be useful.. (Score:1)
If I wanted to send email across the street, the email first went to the parent company in Cali, and then across the street. This was true of pings also.
So, any amount of probes that you had deployed would have thought that my network was about 2500 miles away from California, and none of them would have thought that I was in Houston.
$.02.
Re:Doubt that it would be useful.. (Score:2)
Sorry ya got beat to the punch, but you can go punch your friend because there is a company that is making a lot of money off that idea.
secure mobile phones? (Score:1)
It seems like an approach somewhere between the holographic approach, and the web 'node' approach could be applied to digital/PCS/cell/mobile phones. Does anyone know about research being done into voice privacy on mobile phones?
Re:secure mobile phones? (Score:1)
Sonar audio pollution more important (Score:2, Offtopic)
Re:Sonar audio pollution more important (Score:2, Insightful)
Re:Sonar audio pollution more important (Score:1)
Its quite well known really, I read about it in Scientific American, or New Scientist, one of those pop-sci mags anyway, about three years ago. It was related to global warming studies where they used extremely loud sounds to study the temperature of the ocean, but of course, this deafens whales - why would a deaf whale sing?
Re:Sonar audio pollution more important (Score:1)
Oh well, what can you do, guess
Exactly (Score:1, Funny)
Re:Sonar audio pollution more important (Score:1)
There's a huge amount of evidence supporting the fact that underwater sonar causes damage to Whales, causing beachings and deafness. Some evidence for this includes busted whale inner ear bones - cochlear damage.
Could a human withstand the levels of sound these things generate?
net encryption (Score:2, Interesting)
In communications across the net this kind of playing around with different routings and time delays would not be as effective since once intercepted the decoding would be assuming a descreet medium (only so many different pathways). It isn't clear whether the effort put in this kind of scheme would be worth it, ie. it could bne much more effective to refine the encryption algorithm.
One should note that in descreet systems, like electronic locks that open when a transmitting key is waved in front of it, the principle of asynchronous signaling is already in use. These systems use clockless processors to make the recording and decoding of the transmitted signals near impossible.
Re:net encryption (Score:2)
Re:net encryption (Score:2)
My question though is why not just steal the buoy?
--jeff
Impossible. (Score:4, Interesting)
This implies that all routes are static and no routers ever will go down. It also implies that pingtimes are constant between routers/hosts. Both with are false.
If the IP of all intermediate routers are used in the encryption (which isn't clear) a change of route will make the current 'key' unusable. Further, the ping-time between hosts/routers vary alot as the use of internet vary and will also make this system unusable. A simple DoS-attack will completly destroy any encrypted data in transit which will make it only more insecure.
--
Börnie
Re:Impossible. (Score:1)
The holographic system works, if I understand correctly, by integrating signal over many known paths, similar to a QED-style Langrangian. The number of possible paths for the sound to go must be large in order to 'encrypt' the message with sufficient complexity. One can integrate over many (i.e. an infinite) number of paths.
However, if done in net-space, you have only a small, integer number of paths.. perhaps 10 or 20 at most. This would just mean that you are breaking up your signal into 20 discrete packets that the listener can all find. Then the listener just needs to reconstruct the transmission times for all 20 paths to reconstruct the message. This might be difficult, but not impossible, if we make the necessary assumption that net-space transmission times are predictable.
Re:Impossible. (Score:1)
If one want omnidirectionality in net-space one has to exclusivly use broadcast-packets which in this case should be routed indeffinitly. This is not only against several RFCs but are also foolish and will break the net. This still makes it possibly for the uplink for end-hosts to decrypt the message, it is not hard for that computer to calculate the result of the last hop for all relevant packets.
I don't want to see those broadcaststorms if this is used in a large scale.
--
Börnie
Re:Impossible. (Score:1)
"This implies that all routes are static and no routers ever will go down. " and "If the IP of all intermediate routers are used in the encryption (which isn't clear) a change of route will make the current 'key' unusable."
--
Börnie
heh (Score:1)
Covert Operations (Score:2, Insightful)
I can see that going down a treat when a sub is trying to keep itself invisible.
YRU : Your rights under-water (Score:5, Funny)
One time pad (Score:1, Insightful)
Multiple hop routes (Score:1)
I'm pretty sure huge majority of systems on the net can only send packets to one gateway and don't have any control in the route those packets take.
Re:Multiple hop routes (Score:1)
I post this link every time something like this pops up. It's an idea I had last summer, I think, that's along these lines. One of these days, someone will actually read it:
It's Here. [digitech.org]
Ideas anyone? (Score:2, Interesting)
If you think in term of a small distributed network with all point to point secure connections established, how can this be utilized to verify the identity of a new participant?
am i missing something here? (Score:1)
tell the two waves apart? if they can then this is pretty hopeless
k
That's pretty cool. (Score:1)
It strikes me that this system is almost an 'obscurity' based encryption which we all know is never a good thing :-)
The technique reminds me of something I read a while back about a 'directional' loudspeaker that could target an individual person in a crowded area (e.g. an airport). It was sort of like 'laser' but using sound waves from different sources which created an interference sound at a certain point.
Is it really a good idea??? (Score:1)
Decrypting the msg will be hard, but finding out where the constructive/destructive interference zone s are should be much easier... Hopefully, the system won't become a sub location broadcaster.
Internet version probably not workable (Score:2, Interesting)
use a similar method for encrypting traffic on the present day
Internet.
The biggest show stopper will be the lack of reliable source
routing. Unless you can reliably specify the route the packet
takes (or alternatively, predict the route), the whole schema is
unworkable. IP/4 simply does not support source routing to any
usable degree. IP/6 does IIRC, but even then, I suspect the ping
times will not be consistant enough.
Secondly, a serious change will have to be made to the TCP stacks
as the time interval between the arrival of packets will be an
important factor in this system. Again, I don't see how you can
rely on the transit time given the infrastruture of the Internet.
Don't forget that this infrastructure is what gives the Internet
it's power.
Finally, in the Internet scenario (as opposed to the SONAR
version) this is as about as secure as private key encryption.
Unless my machine is multi-homed, there's likely to be at least
one router that sees every packet my machine sees. This is
fundamentally different to the SONAR version, where you have to
be a precise physical location to be be able to "hear" the
transmission.
Cute idea, but not feasible.
Under(sea)Net ? (Score:1)
Imagine it in 5 years.. Worldcom advertising "dark water" - buy your unused water now for $$$$, expect high latency!
I suppose you've got a lot of bandwidth (wetwidth?)
Only in the real world (Score:2, Insightful)
In effect the sea floor and positions of sender and reciever are acting as a secret key. They 'encrypt' the messages and you can only decrypt if you know the secret key in enough detail - i.e. you are the reciever, and the working with the sender. However the snooper in *theory* could decode the signal if he knew enough about the sender/reciever/sea bed, and could do some farily complex maths. How complex the maths is says if it will work in practice. But given that computer can model huricanes, I would guess that modeling the sea bed is plauible.
In the virtual world though all bets are off. The terrain is very mappable, and fairly simple. So if the problems of varing ping times can be worked out the encryption is very easily broken.
I wonder if the sea bed version stops working if the tide changes.
Why Chaos makes this impossible... (Score:1)
Large amounts of packet loss would occur anytime a fish swims through the line of sight. My question is how sensitive is it to such things. My guess is that a minnow could render a message totally useless. I imagine that is what has kept the Navy from adopting such technology.
Re:Why Chaos makes this impossible... (Score:1)
Re:Why Chaos makes this impossible... (Score:1)
a SINGLE minnow has no effect -- however, schools of minnows can have a conglomerated effect which _is_ significant. Other temporary environmental factors can also interfere -- entrained air in the water column (air bubbles), sea creatures that contain gaseous air in their bodies (i.e. "popping" shrimp).
Re:Why Chaos makes this impossible... (Score:1)
1. Certainly, the equations governing fluid dynamics are highly non-linear, and predicting currents may be hampered by chaotic behavior, but schools of fish are pretty far outside the conventional definition of chaos.. they're more like interference.
2. There is no packet loss, as there is no routing/no packets.
Sorry, I hate being an jerk on semantics.
Better article: Scientific American Nov 1999 (Score:5, Interesting)
I pasted the summary below, but here's a link [sciam.com] to the summary just to make it official.
Time-Reversed Acoustics
Mathias Fink
Record sound waves, then replay them in reverse from a speaker array, and the waves will naturally travel back to the original sound source as if time had been running backward. That process can be used to destroy kidney stones, locate defects in materials and communicate with submarines.
I thought it was so cool that I wrote a program to simulate the effect. It simulates 1 or more waves emitted by 1 or more sources, and records the waves at 1 or more "microphones". It then treats the "microphones" as "speakers" and plays back the time reversal of the recording. At first the screen is filled with chatoic expanding circles, but after a while the expanding (and fading) circles combine to create a CONTRACTING and STRENGTHENING circle!
I wrote it for my own curiosity, and the code is "dirty". If there's some real intrest here I could dig it out and clean it up a bit.
Re:Better article: Scientific American Nov 1999 (Score:2)
d^2 u / dx^2 = d^2 u / dt^2
but also a small diffusion term (size mu)
d^2 u / dx^2 = d^2 u / dt^2 + mu du/dt
This cannot be run backwards in the way the wave equation can. Essentially, it loses information, which will be evidenced by instability of your numerical scheme.
Brian
Difference between water and the Internet (Score:1)
It suggests no such thing (Score:2)
"This holographic approach suggests a method of web encryption using multiple hop paths and ping times to create a message which can only be decoded when received at a specific target node!"
It suggests no such thing, and the post should be updated to reflect this. The way a sonar wave travels through water is so fundamentally different from the way packets move through the net that the comparison is in fact quite absurd. Indeed, the IP protocol in no way supports the kind of controlled packet delivery the poster is assuming.
All I want to know is... (Score:2)
This might be a stupid question, but (Score:1)
Waves and Particals (Score:1)
This holographic sonar communications system relies on the interference patterns of pressure waves in water (sound). Internet packets do not behave like waves, they behave like particles. There is no interference between them, nor are multiple packets ever combined into one packet.
Quantum effects allow the merging of particle and wave features, but we don't have that sort of technology in place in the internet at this time.
(Though such things ARE being researched [berkeley.edu].)
~ Chris
But that's not the point. (Score:1)
Even if distances don't go much beyond 10 kilometers, you can still create a buouy that a sub launches, and uses as a message relay. Or launch a few while enroute and leave a relay network behind.
Now, if and when this becomes a real world application *nobody* will be sending uncompressed, non-encrypted information over the link. The regular public and symmetric cryptography has a very calculatable 'risk' of decryption in it.
Btw, Like so many others said: the Internet idea is totally bonkers. That won't work.
Re:But that's not the point. (Score:1)
I think that's the problem: sending the initial ping will almost guarantee detection, both in water and on the internet; the other problems, the changing (non-static) conditions only come to make this worse, 'cause you have to send additional 'pings' when the environment changes enough to make the transmissino incomprehensible.
Encryption not possible. (Score:2)
What makes this a viable option for underwater encryption, is that nobody can sample a big area of ocean entirely to be able to reconstruct the "holographic signal".
But in the internet, it just only obscures your data. Anyone can read it provided it has backdoors in routers in every path you are using. Yeah, it's harder than monitoring a single router, but still possible, so this approach wouldn't give Real Security[tm]
Timing problem? (Score:1)
TCP/IP Ping != Sonar Ping (Score:2)
I don't think so. Sound travelling through water conforms to well-understood, consistant physical laws. You can accurately predict how long it will take a sound wave to reach a given destination. However, packet transmission time varies unpredictably based on current load, which changes from millisecond to millisecond. With sonar, if a stationary source pings a stationary target, the ping time will remain constant. With TCP/IP, pinging the same address will give highly variable ping times. Since it appears that this technique is highly dependent on timing, an analogous technique isn't possible on a TCP/IP network.
shouldn't even work in real world (Score:1)
They say the problem with normal transmissions is that they go in all directions. This means they're also bouncing off of lots of surfaces and echoing back at different times, which is why the sonar ping works.
However, to play sounds back in reverse as claimed in the article, you'd need to be able to send each piece of the signal directionally, towards the area it came from. If you're broadcasting each piece in all directions, then you're still going to get weird echos off of everything else, and thus end up with weird interference. For the first piece of the transmission this might be OK (since you assume non echo'd transmission will arrive first). But then the echos of prior transmissions will interfere with the actual signal in the parts of the transmission that take longer to arrive. Maybe you could try to subtract these out afterwards? But I suspect its not that simple.
of course this wouldn't be a problem if they could send each piece of the signal directionally, but then if they could do that they wouldn't need this in the first place...
am i missing something?
It won't work for the Net (Score:1, Informative)
However, You can not use wave interference on the net because the information is received as a digital signal. The communication devices have no control over the way the data is encoded on a fiber or copper connection, so its impossible to implement this technology for net traffic. At best if you have control access at both end and you create custom hardware between two points you could use this to encode traffic.
Suggests? (Score:1)
Wrong (surprise) (Score:1)
Some problems. (Score:1)
Derek L.
USN Submarine Service 1981-1991
Meteor Burst Communications (Score:1)
High atmosphere ionization trails from micrometeors (of which there are a surprisingly large number every hour) alter the transmission properties of the atmosphere. Given two stations, you do some geometry, and then wait around for a suitable ionization event. When such an event occurs, transmissions will be symmetrically reflected between the two stations as long as the ionization trail has not dispersed too much.
This fact is exploited by broadcasting a pseudo-random (like a DS/SS chip) signal from a master station. When transmission sites that know the chip happen to pick up an ion-trail reflection of the master signal, then there exists for a short time a symmetric path back to the master, during which buffered data can be burst transmitted. If the trail lasts long enough, bi-directional communications may be possible. The system as a whole exhibits classic spread spectrum properties, including low probability of intercept, resistance to interference, and channel sharing.
Meteor burst communication is, however, very low bandwidth, but thats OK - most people using LPI communications aren't exactly streaming MP3s; you can get some pretty good milage with a few dozen bytes of text.
I don't know anything about the power requirements here... anybody have any usefull info, or corrections to my description? Its been a while since I've looked at this stuff.
I dispute the premise (Score:3, Interesting)
Their logic seems similar to that of "whisper" chambers, but they break one of the assumptions when they start sending a steady stream of phase encoded ones and zeros. Now instead of having to reconstruct a complex wave form, all an eavesdropper has to do is:
1) Listen for pink-noise with a strong 1kHz component.
2) Play with the (recorded) signal a bit (e.g. adding 1us delayed copies to the original) until you can decompose it into two types of 1us segments--call them A & B.
3) Now you have a stream of As and Bs, and two possibilities; either A=0 and B=1, or visa versa. Test both.
-- MarkusQ
Oh yes you CAN intercept it along the way (Score:4, Insightful)
In astronomy, the coolest research is in adaptive optics (do a Google search and you will be reading in fascination all day). Here it is in a nutshell, step by step:
1) The earth's atmosphere is turbulent. That turbulence causes the images of stars to dance around in telescopes, making the image all fuzzy. This is what causes the stars to twinkle when you look at them. Avoiding this problem is the big reason why the Hubble Space Telescope gets such amazing photos when it is much smaller than the largest telescopes on the Earth.
2) How to fix this problem without launching telescopes into space? Adaptive optics, of course. If you can flex a telescope mirror into exactly the right shape, you can compensate exactly for the distortion that turbulence introduces into the image, removing the majority of the noise from the signal. Suddenly the image becomes almost perfectly clear and steady, not fuzzy.
3) We know that stars look like points of light, even through the largest telescopes. When we receive a fuzzy image, a very fast computer figures out what shape a mirror would have to be to focus that fuzzy image back into a single point of light. That star is called a reference star. Any interesting objects close to that star are also therefore made clear.
4) Commands are sent to mechanical actuators on the back of a mirror that deform it to the correct shape to focus the reference star. This happens very quickly, so the resulting image is steady and sharp, despite all the turbulence in the atmosphere. Neat trick.
OK, so that's how it works.
You can do the same thing to submarines too, if you know what they sound like. The submarine's sound becomes the "reference star" in this case. When you receive the garbled signal, you might be able to correct it based on the sub's sound. If you apply that correction to the message as well, you might be able to hear the message.
This has a lot of problems, so practically it wouldn't work. For example, the easiest way to defeat the intercept is to change the noise that your sub makes, maybe with a random noisemaker. But that makes your sub less quiet. Also, the person trying to make the intercept would have to be listening to the sub before the message is sent, because once the message is sending, that would make the sub a random noise and you couldn't focus the sound. And, since the turbulence conditions change (I don't know how fast), over time your ability to focus the sound into a message would steadily degrade. The sending submarine would only have to figure out how fast the sea conditions are changing, and only start sending the good parts of the message after you've lost your ability to focus the sound.
Re:Oh yes you CAN intercept it along the way (Score:2)
I see a significant problem in using the sub's sonar signature as a baseline, it's sort of obvious actually. The boats are damn quiet. Or at least can and should be. Missle boats, the russian akula, and the Seawolf class are so quiet that the best way to look for them in the open ocean is to look for a "hole of no sound" where you think ambient ocean sound should be.
ping sonar xscreensaver (Score:1)
man sonar:
The sonar program displays a sonar scope on the computer's screen. This scope
polls a sensor as the sweep goes around the scope and displays what it finds as
bogies on the screen. The program is designed to support different modes repre-
senting different types of sensors. Currently the only implemented sensors are a
simulator, and a network ping function that pings hosts and plots the results on
the scope.
Submarines move (Score:1)
This wouldn't quite work on the web. (Score:3, Insightful)
There is no analogy for web traffic which travels over IP which is sent as discrete packets of bytes. They resulting packets cannot be made to interfere with each other at the destination to produce plaintext, nor do they interfere and reflect and become distorted in transit!
The closest analogy would be to split a message into many small parts and send them along different paths in the hopes that no one could catch them all in transit, but then timing isn't really an issue at all as others have suggested. Also, anyone bugging your connection to the internet (your ISP for instance) could still catch all the packets, ditto for the source. Some have suggested splitting keys and sending some parts by snail-mail, others by FedEx, others by e-mail to different accounts which you read on different machines, and that is really a form of security through obscurity, not encryption, whereas the sonar technique is more like encryption in that even if an adversary knew that information was being send and knew from where, they could't recover the plaintext unless they were at the target location.
Perhaps quantum cryptography is a better analogy to what's going on, but it's not a perfect one either as there are fundamental differences between accoustical waves and quantum wavepackets.
Re:timing is everything (Score:1)
Slashdot requires you to wait 20 seconds between hitting 'reply' and submitting a comment.
It's been 9 seconds since you hit 'reply'!
If you this error seems to be incorrect, please provide the following in your report to SourceForge:
Browser type
User ID/Nickname or AC
What steps caused this error
Whether or not you know your ISP to be using a proxy or some sort of service that gives you an IP that others are using simultaneously.
How many posts to this form you successfully submitted during the day
Re:use 'an' not 'a' with underwater (Score:1)