Using Diamonds to Create Unhackable Code 363
IAmTheDave writes "Researchers at Melbourne University have grown diamond particles 1/1000 of a millimetre on optical fibres which they can use to transmit single photons of light at a time. The diamonds are grown on the optical fiber by raining carbon molecules onto the tip of the fiber. They claim that by transmitting information in single photons, any interception of transmitted photons will be useless to the interceptor, and thus the message will be completely unhackable. Transmission speeds are currently slow - 120km/h, but are expected to speed up."
That's unhackable TRANSMISSIONS, not code (Score:5, Informative)
Re:That's unhackable TRANSMISSIONS, not code (Score:3, Informative)
Re:That's unhackable TRANSMISSIONS, not code (Score:3, Insightful)
time and time again we've been shown this to be false.
it may take time/energy/effort etc but it's clearly possible. always.
Re:You are correct. (Score:3, Informative)
The encryption can be broken, sure, if you know the message. The real beauty in quantum cryptography lies in the fact that intercepting the message (a man in the middle attack) is impossible due to Heisenberg's uncertainty principle.
The January 2005 Scientific American has a good article on it (the cover story, actually).
The next time yo
Re:You are correct. (Score:3, Informative)
Re:That's unhackable TRANSMISSIONS, not code (Score:5, Insightful)
In light of the fact that we just found the "biggest compromise in history" of secure data was perpetrated by idiot employees selling peoples profiles for $10 (USD) a pop, I'm less worried about unhackable transmissions and more worried about the people at each end.
Lets remember to call our banks.
Re:That's unhackable TRANSMISSIONS, not code (Score:3, Informative)
Re:That's unhackable TRANSMISSIONS, not code (Score:2, Insightful)
Now for my master plan... (Score:5, Funny)
"Unhackable Code"? (Score:5, Informative)
Re:"Unhackable Code"? (Score:5, Informative)
There is nothing unhackable.
Re:"Unhackable Code"? (Score:5, Informative)
Re:"Unhackable Code"? (Score:5, Interesting)
and if it's difficult to hack the transmission media, there is probably cleartext versions of the transmission at either end.
"un-crackable" transmission will just change the point of attack...
Re:"Unhackable Code"? (Score:4, Informative)
Re:"Unhackable Code"? (Score:5, Insightful)
Perhaps, but information encrypted with quantum cryptography is un-interceptable. Because of the way a one time pad works, you have no way to verify that you've cracked a message -- any "decrypted" result is the same as any other.
This is distinct from other encryption methods, which use complicated math to encrypt and decrypt things.
A one-time pad is merely a block of random data. You XOR your pad with your plaintext to get ciphertext. With a given ciphertext block, you have no way to verify what the correct plaintext is. For example, if I have a ciphertext message: ABCD, that could just as equally be the plaintext HELO as ROFL.
Quantum cryptography is the usage of quantum mechanisms to generate the same random data at two different locations. Because of properties of quantum physics that I don't personally understand, interception of that quantum data is impossible.
But no, quantum cryptography is not breakable because it's impossible to know whether you have the correct plaintext, and it's impossible to get the one-time pad from the quantum transmission line (physics guarantees it). In other encryption systems, you know mathematically whether you have discovered the "key". The ciphertext of a one-time-pad, according to information theory (and the assumption that your pad is made of truly random data), provides you absolutely no information about the pad or the plaintext.
See more here: http://en.wikipedia.org/wiki/Quantum_cryptography [wikipedia.org]
Re:"Unhackable Code"? (Score:2, Insightful)
Re:"Unhackable Code"? (Score:4, Informative)
Long version:
First, let's clarify what it means to say that "physics" guarantees that your quantum key distribution (QKD) system is unbreakable. Given a perfect implementation of the QKD protocol, or at least an implementation where the errors are within certain bounds and you haven't done anything stupid like reusing your OTP, you are guaranteed security if quantum mechanics is correct.
What do I mean by correct? I mean that quantum mechanics correctly describes the relevant systems--systems to which it is currently considered applicable.
We have many good reasons to believe quantum mechanics is correct. Its relativistic extension, QED, has given us some of the most accurately-verified theoretical predictions ever. Notable objections to the theory (such as the famous paper by Einstein, Podolsky, and Rosen, or "EPR") have proven false (google the Bell inequality and the Aspect experiment).
More specifically, some of the particular variations in quantum mechanics that one would imagine could be useful for defeating a QKD system, such as nonlinearity, would give rise to highly unphysical effects (superluminal signaling), which we have not observed.
It seems that quantum mechanics is an island in theory space [pitt.edu]--that is, any perturbation from the accepted theory seems to give something obviously unphysical, or at least something that does not agree with experiment.
In other words, this is as close to proof as it gets in science. Clearly, quantum mechanics isn't the final word on, say, quantum gravity, but we're not going to be throwing out the undergrad quantum mechanics books any time soon.
Yes, it would be nice to have information-theoretic security, but that doesn't seem to be possible for a key distribution protocol. Still, security predicated on the laws of physics is a hell of a lot better than security-based-upon-the-fact-that-we-haven't-hear
Re:"Unhackable Code"? (Score:5, Informative)
Not long ago, I took a graduate course in quantum computing from a researcher in the field. I wrote a paper for that class specifically on quantum cryptography. In 2001, I worked in the same lab as a physicist building a quantum cryptography device (we had lunch almost every day). I've also studied quite a bit of conventional cryptography. Trust me when I say this:
Quantum cryptography has nothing to do with encryption, and barely anything to do with cryptography. It's an authentic channel with eavesdropping detection (but not prevention). In other words, QC is just a bootstrapping phase to distribute key material (random data) to two parties. Everything you do from that point forward, including everything involving your actual data, is classical crypto on classical channels.
QC has nothing to do with one-time pads. You could use the key material for OTPs, if you're deranged. More likely you'll use something like CBC-AES, CTR-AES, CBC-3DES for encryption, which are much faster (less key material, not limited by QC data rate), simpler, and safer (unless you have the resources of a major world government to oversee proper handling of the data and key material at every point from creation to destruction). At any rate, you'll still need integrity even with a OTP or your data is worthless. That means SHA1-HMAC, CBC-MAC-AES, etc.
Cryptography proper punts on the key distribution issue as it's not solvable mathematically. It's an administrative not an algorithmic problem, putting it outside the domain of modern cryptography. This applies equally to asymmetric crypto; public key databases and root certificates require proper oversight and maintenance. Hence the one problem QC solves, key distribution, is really external (but related) to the field of cryptography. That's why I say the two are orthogonal.
The funny part is, QC isn't even a good solution to key distribution. Its physical requirements are costly, stringent, and limiting. Unless you're an ultra-cautious damn-the-expense client like the US govt, there are more cost effective ways to exchange keys, and much better ways to improve your data's security. QC is a problem in search of a solution.
Re:"Unhackable Code"? (Score:2)
QC has nothing to do with one-time pads. You could use the key material for OTPs, if you're deranged. More likely you'll use something like CBC-AES, CTR-AES, CBC-3DES for encryption, which are much faster (less key material, not limited by QC data rate), simpler, and safer (unless you have the resources of a major world government to oversee proper handling of the data and key material at every point from creation to destruction). At any rate, you'll still need integrity even with a OTP or your data is wor
Re:"Unhackable Code"? (Score:3, Informative)
Furthermore, to use QC for key distribution, you already need to have distributed a shared key beforehand! Search for "secret bit string is agreed to" or "a public, but authenticated, channel" in the QC wikipedia page [wikipedia.org] to see what I mean.
Using QC to make an untamperable communication requires you to already have some other comm channel which is already trusted as untamperable- and if you had that, why not just send the keys on it in the
Re:"Unhackable Code"? - 2 things (Score:3, Insightful)
Except for.. well, bloody everything at the quantum level. Unentangled particles store "one bit" - if you read say, the position, the velocity is truly random (within certain bounds, on a given distribution function). Entangled particle pairs store "two bits" - you can measure two velocities, a velocity and a position, or two positions - but everything else that you measure will be random (as described before)
Re:"Unhackable Code"? (Score:2)
Re:Good old rubber hose still works. (Score:2)
Re:"Unhackable Code"? (Score:2)
Eh... sorta. The article talks about interception of the data not being terribly useful. I imagine they had to come up with some sort of code to make that work.
Okay, it's a stretch, but technically they would need a form of code to make this work.
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:2)
Not unhackable by a long shot, but you'd discover every hack. That is, until someone can perform a man-in-the-middle attack, assuming such a feat would be possible.
Re:"Unhackable Code"? (Score:2, Interesting)
Re:"Unhackable Code"? (Score:2)
If you nab the data from either end without the parties knowing, you could crack it without them knowing.
What you can't do without alerting the others, is intercept the message in transmission.
Re:"Unhackable Code"? (Score:3, Interesting)
Denial of service.
False positive intrusions.
Reliability without retransmission.
Is the idea to use wavelengths that are not readily absorbable by common atoms? If so, how would they theoretically be generated? Does the answer lie in the manufacture of "perfect" materials (assuming that such a material could exist)? How would impurities not eventually tunne
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:3, Insightful)
It is possible, but not easy. The whole point is that each photon carries 2 bits of those data, and only one bit can be measured before the photon is destroyed. A middleman wouldn't know which of those two bits he needs to transmit. So he must guess, and half the time he gets it wrong, so the data is 50% corrupted, and the reciever knows something is very wrong.
However, if the middleman had previously broken into the reciever's office, he could've copied down the
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:5, Informative)
That depends completely on how it is used. If I simply send a message in 1s and 0s over the photon stream, it isn't encrypted. I can only be certain that it either got there or it didn't get there.
Cryptography comes in when you encode a message using a photon stream. The mechanics of doing this are old hat by now. It is done in the following steps:
This is commonly said to be 'mostly secure' because it is vulnerable to a man-in-the-middle attack. However, it is tamper-proof once it begins. If anyone attempts to read any of the photons as they travel down the stream, they alter the photons. So, you get a scrambled message at the other end and the hack is immediately known.
Because it cannot be copied enroute without giving away that it is being copied, it is commonly called unhackable. You cannot make a copy of it and send it along while you try and hack it. I know, you are thinking you can just copy the photons and resend new ones with the same message. Nope - you have to know the spin orientation of the photons BEFORE you can read them for a 1 or a 0. If you read it with the wrong spin orientation, you will force it to the orientation you read it as and get an errant 1 or 0 that you incorrectly send down the line. So, you could say it is doubly-encrypted and doubly-protected from in-line hacking.
What about routers? (Score:4, Interesting)
This will secure transmissions between banks and internally at banks, but a secure system is only as secure as it's weakest link, and this doesn't improve security on the internet.
Since the internet uses routers, switches, and hubs someone could always gain access to the router or pickup the broadcast from a hub through some other means and cause that system to log packets or duplicate them elsewhere, etc.
Or is there a way to incorporate this into a system similar to the internet as we know it and make my home connection to my bank/paypal/yahoo shopping more secure?
Re:What about routers? (Score:2)
Re:"Unhackable Code"? (Score:3, Informative)
1. Make a photon stream connection to the other user.
I'm beginning to feel that those typing tapes I bought on late night television aren't working as well as the busom blonde and the short guy with the toupe promised they would.
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:2)
Re:"Unhackable Code"? (Score:3, Insightful)
Re:"Unhackable Code"? (Score:3, Insightful)
Yeah? (Score:4, Insightful)
Re:Yeah? (Score:2, Funny)
I was thinking about a hundred slashdotters screaming nothing is unhackable.
Wow! (Score:3, Funny)
Diamond (encryptions) are forever!!
Buh wump dump.
(thanks. I will be here all week.)
Transmission speed? (Score:2, Insightful)
Don't the photons travel at the speed of light in the fiber? Perhaps it is some other unit?
Re:Transmission speed? (Score:2, Informative)
Re:Transmission speed? (Score:2, Interesting)
Ummmm.... (Score:3)
Re:Ummmm.... (Score:3, Interesting)
Many people don't realize that C is the speed at which an electromagnetic wave propagates, not necessarily the charge carriers themselves. The electrons in a copper wire, for instance, move pretty slowly, on the order of several seconds per millimeter.
I didn't realize that drift velocity applies to photons in a medium, but it sounds like it may.
Re:Ummmm.... (Score:2)
In this case, yes, we are talking about light. So, it would follow that photons move at the speed of light. It would be kind of impossible for them to not move at the speed of light (yes, humor for the physics / philosophy minded).
As an aside, with the advent of AC electricity, it's the oscillation of electrons that gets probagated through the line, and half of that oscillation is the
Re:Ummmm.... (Score:2)
Yeah, but what most people (I'm not saying you specifically don't know this) seem to miss is that light travels at different speeds. Usually, when someone refers to "the speed of light" as some sort of constant, the really mean "the speed of light in a vacuum", which is a speed very rarely actually attained by light, since ev
Re:Ummmm.... (Score:2)
I remember reading about Cerenkov Radiation back in school. Facinating stuff, but again, only possible when NOT in a vacuum. Google to the rescue, look at this readable description of Cerenkov Radiation [physlink.com] if you are so inclined.
Re:Ummmm.... (Score:2, Funny)
I've always heard that certain languages were faster than others, but I didn't know that the speeds of languages can be measured in kilometers an hour? C must be pretty fast then.
Re:Ummmm.... (Score:2)
When an electron settles down from an excited position, a photon is emitted at C (which may vary depending on the medium, but is constant for that medium). It doesn't matter what speed the atom was at, because the speed light travels at is a CONSTANT (within the limits of our ability to meaure).
The duality principle is that light can be percieved as either a wave or a particle, but there's never been a discrepancy
Curious (Score:5, Insightful)
Slashdot and the www.news.com.au couldn't have both made the same screamingly stupid mistake and meant 120 kilobits per hour, right? Right?
Re:Curious (Score:5, Funny)
I think they did it by forming the photons into committees. They spend more time forming action plans and holding meetings than actually moving. Some of them actually go backwards...
Re:Curious (Score:5, Funny)
Question (Score:5, Insightful)
TFA says How? What keeps a third party between the two friends from receiving the photons transmitted by one friend and retransmitting exactly the same sequence of photons to the other while keeping a record, and therefore, a copy of the message?
I'm pretty sure there's more to it than appeared in TFA, and that there is a way to be sure there isn't an eavesdropper between the two friends, but I don't know what it is.
Re:Question (Score:4, Informative)
Re:Question (Score:3, Interesting)
It's so wrong, it's not even reliably wrong, like [people who oppose you politically]; you almost don't need to know what's right, just wait for [those idiots] to spout off and do the opposite. Unlike that, your real world intuition is so wrong it's not even on the same playing field, not a matter of "true vs. false" but "true vs. blue speckled porcupines."
In conclusion, the answer is "a bathtub f
Re:Question (Score:2)
Yes I know odd but (I think in this case) true..
Where's the security? (Score:2, Informative)
Re:Where's the security? (Score:2, Informative)
Re:Where's the security? (Score:2)
Re:Where's the security? (Score:2)
I'm no physicist, but I think this is different.. It's closer to current fiber transmission technology, but instead of sending a burst of photons for a short, fixed duration you only send a single one.
Re:Where's the security? (Score:2)
Yeah I'd assume that's one of the reasons they're working on improving the speed. If they can get it closer to the speed of light (which they're a LONG way from), and the endpoints can measure the round-trip time precisely enough, it'll be nearly impervious to repeaters.
There are alw
Unusable (Score:2, Interesting)
120km/h, just imagine the ping!!
That technology could be "secure" assuming there is a direct link, that means no routing at all. If there is any routing involved then you just killed the concept. There is always the chance that someone will just cut the cable and "snif" it.
Not a bad idea but right now it's far from promising...
I'll stick with my encryption...
Anyone.. (Score:5, Funny)
huh? (Score:2)
I mean, if they managed to slow light down to 120km/h i'm damn impressed and I think a nobel prize would be in order for these people.....
Re:huh? (Score:2)
Well, people have slowed it down to 0 Km/h (or close to that) - http://www.deas.harvard.edu/haulab/ [harvard.edu]link
Finally! (Score:2)
If you're driving faster that the speed of light, and you turn you headlights on, what happens?
misleading (Score:5, Insightful)
Re:misleading (Score:2)
Yes and no. (Score:5, Informative)
Once you have as many bits of key as you have bits of data, you can treat it as a one-time pad. And that would be a perfectly secure transmission, as long as both sides make sure they destroy the key once it's been used to do an encryption or decryption operation.
In other words, QKE leads quite directly to (a) a cipher and (b) a traditional cryptographic system.
IAAGSSTS (I Am A Grad Student Studying This Shit).
Slower! Slower! (Score:5, Interesting)
I hope they don't speed the connection up, I hope they're able to slow it down! Think ultimate storage medium, the only limit being the number of photons you can put in the length of a pipe.
Running out of storage space? Hello sweet superposition! Yeah, my iPod stores 4.02 * 10^18 songs, but have to listen to them all in order.
Re:Slower! Slower! (Score:3, Interesting)
Re:Slower! Slower! (Score:2)
DRAM chips use a grid pattern where a memory address simply specifies which column/row to read/write. This grid is built off tiny capacitors which slowly self-discharge by leakage currents, this is why DRAM requires refresh cycles. Also, the DRAM cells are read by connecting these femto-capacitors to internal bus lines. Those bus lines have capacitance of roug
120km/h?? (Score:2)
Re:120km/h?? (Score:2)
Then again, I didn't read the article either, so perhaps it was transfered to the summary incorrectly...
~Rusty
120 km/h (Score:3, Funny)
So these are Canadian electrons, eh ?
let me get this straight (Score:3, Insightful)
Hmm.. let me get this straight. So if I burn a DVD and send it to California from New York using FedEx 2Day service for $14.59, could I name this post as "Unhackable Transmission Medium for only $14.59"?
Re:let me get this straight (Score:2)
Do people understand that this will only work between two systems directly linked together, you can't use a routing system like the internet? Or am I missing something?
So... (Score:2, Funny)
What prevents a man-in-the-middle attack? (Score:2)
its not foolproof (Score:2, Interesting)
Unhackable... Unnecessary! (Score:5, Funny)
Calling sceptics! (Score:2)
I'll stop reading right about there.
120 km/h? (Score:3, Interesting)
Re:120 km/h? (Score:2)
Re:120 km/h? (Score:2)
University Press Release [uconn.edu]
Ronald Mallet's Reasearch Summary [uconn.edu]
This unhackable/ya right (Score:3, Funny)
"All your diamond are belong to us" -- lopht
I've already diagramed a system of unhackable code (Score:3, Funny)
Good challenger for most misleadinfg SD article. (Score:3, Informative)
Re:Not the man in the boat, the man in the ... (Score:2)
Ok that was bad.
bad.
really really bad
Ok, I swear I'm going to quit now.
Re:Diamonds (Score:2)
Re:But what if... (Score:2)
smash.
Re:Pretty big statement there, Chief. (Score:2)
Quantum encryption is safe to call unhackable because to break it would literally require violating physical laws.
MITM attack on a DVD in a mail sack... (Score:3)
Copying data from a DVD that you've intercepted or otherwise gained access to isn't hard. Once you've done that you can not only read any new messages they send, you can decode all the old messages you've already intercepted. And they have no way of knowing you've stolen the pad.
Re:No approximation... (Score:3, Informative)
No. Because there is no "the signal". With QC you have two signals on the fiber and you can pick up only one, thereby destoying the other.
I'm not talking about observing the bits that go down the line. I'm talking about impersonating both sides to each other. That is a man in the middle.
Yes. And that wont work.
The other way to make MitM harder is to have a big enough shared secret. You could have secret p