. 24/7 Space News .
CYBER WARS
The enigma machine takes a quantum leap
by Staff Writers
Rochester NY (SPX) Sep 07, 2016


The quantum enigma machine developed by researchers at the University of Rochester, MIT, and the National Institute of Standards and Technology. Image courtesy Daniel Lum/University of Rochester.

Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that's far shorter than the message - the first time that has ever been done. Until now, unbreakable encrypted messages were transmitted via a system envisioned by American mathematician Claude Shannon, considered the "father of information theory."

Shannon combined his knowledge of algebra and electrical circuitry to come up with a binary system of transmitting messages that are secure, under three conditions: the key is random, used only once, and is at least as long as the message itself. The findings by Daniel Lum, a graduate student in physics, and John Howell, a professor of physics, have been published in the journal Physical Review A.

"Daniel's research amounts to an important step forward, not just for encryption, but for the field of quantum data locking," said Howell.

Quantum data locking is a method of encryption advanced by Seth Lloyd, a professor of quantum information at Massachusetts Institute of Technology, that uses photons - the smallest particles associated with light - to carry a message. Quantum data locking was thought to have limitations for securely encrypting messages, but Lloyd figured out how to make additional assumptions - namely those involving the boundary between light and matter--to make it a more secure method of sending data.

While a binary system allows for only an on or off position with each bit of information, photon waves can be altered in many more ways: the angle of tilt can be changed, the wavelength can be made longer or shorter, and the size of the amplitude can be modified. Since a photon has more variables - and there are fundamental uncertainties when it comes to quantum measurements - the quantum key for encrypting and deciphering a message can be shorter that the message itself.

Lloyd's system remained theoretical until this year, when Lum and his team developed a device - a quantum enigma machine - that would put the theory into practice. The device takes its name from the encryption machine used by Germany during World War II, which employed a coding method that the British and Polish intelligence agencies were secretly able to crack.

Let's assume that Alice wants to send an encrypted message to Bob. She uses the machine to generate photons that travel through free space and into a spatial light modulator (SLM) that alters the properties of the individual photons (e.g. amplitude, tilt) to properly encode the message into flat but tilted wavefronts that can be focused to unique points dictated by the tilt.

But the SLM does one more thing: it distorts the shapes of the photons into random patterns, such that the wavefront is no longer flat which means it no longer has a well-defined focus. Alice and Bob both know the keys which identify the implemented scrambling operations, so Bob is able to use his own SLM to flatten the wavefront, re-focus the photons, and translate the altered properties into the distinct elements of the message.

Along with modifying the shape of the photons, Lum and the team made use of the uncertainty principle, which states that the more we know about one property of a particle, the less we know about another of its properties. Because of that, the researchers were able to securely lock in six bits of classical information using only one bit of an encryption key--an operation called data locking.

"While our device is not 100 percent secure, due to photon loss," said Lum, "it does show that data locking in message encryption is far more than a theory."

The ultimate goal of the quantum enigma machine is to prevent a third party - for example, someone named Eve - from intercepting and deciphering the message. A crucial principle of quantum theory is that the mere act of measuring a quantum system changes the system. As a result, Eve has only one shot at obtaining and translating the encrypted message - something that is virtually impossible, given the nearly limitless number of patterns that exist for each photon.

The paper by Lum and Howell was one of two papers published simultaneously on the same topic. The other paper, "Quantum data locking," was from a team led by Chinese physicist Jian-Wei Pan.

"It's highly unlikely that our free-space implementation will be useful through atmospheric conditions," said Lum. "Instead, we have identified the use of optic fiber as a more practical route for data locking, a path Pan's group actually started with. Regardless, the field is still in its infancy with a great deal more research needed."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Rochester
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Apple issues update after cyber weapon captured
San Francisco (AFP) Aug 26, 2016
Apple iPhone owners on Friday were urged to install a quickly released security update after a sophisticated attack on an Emirati dissident exposed vulnerabilities targeted by cyber arms dealers. Researchers at Lookout mobile security firm and Citizen Lab at the University of Toronto said they uncovered a fierce, three-pronged cyber attack targeting a dissident's iPhone "that subverts even A ... read more


CYBER WARS
Space tourists eye $150mln Soyuz lunar flyby

Roscosmos to spend $7.5Mln studying issues of manned lunar missions

Lockheed Martin, NASA Ink Deal for SkyFire Infrared Lunar Discovery Satellite

As dry as the moon

CYBER WARS
Opportunity departs Marathon Valley to head deeper into Endeavour Crater

Mars Rover Views Spectacular Layered Rock Formations

Storm Reduces Available Solar Energy on Opportunity

NASA Approves 2018 Launch of Mars InSight Mission

CYBER WARS
Astronaut returns home after logging record-breaking 534 days in space

'Star Trek' 50-year mission: to show the best of humanity

Vietnam's 'Silicon Valley' sparks startup boom

Taiwan tourism industry hit by drop in Chinese visitors

CYBER WARS
China's second space lab Tiangong-2 to be launched

Tiangong 2 is coming soon, real soon

Vigil for Tiangong 2

Kuang-Chi near space test flight set for 2016

CYBER WARS
US astronauts complete spacewalk for ISS maintenance

Space Station's orbit adjusted Wednesday

Astronauts Relaxing Before Pair of Spaceships Leave

'New port of call' installed at space station

CYBER WARS
What Happened to Sea Launch

SpaceX scours data to try to pin down cause rocket explosion on launch pad

India To Launch 5 Satellites In September

With operational acceptance complete, Western Range is ready for launch

CYBER WARS
New light on the complex nature of 'hot Jupiter' atmospheres

Discovery one-ups Tatooine, finds twin stars hosting three giant exoplanets

Could Proxima Centauri b Really Be Habitable

Rocky planet found orbiting habitable zone of nearest star

CYBER WARS
RapidScat Team Investigating Power System Anomaly

Researchers peel back another layer of chemistry with 'tender' X-rays

NASA Searches for Big Idea from Students for In-Space Assembly of Spacecraft

Ceramic Composites Revolutionize Engine Efficiency









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.