Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Encryption Promises Unbreakable Codes
AP ^ | Nov. 16, 2003 | BRIAN BERGSTEIN

Posted on 11/17/2003 11:36:17 AM PST by Cultural Jihad

Encryption Promises Unbreakable Codes
BRIAN BERGSTEIN
Associated Press

NEW YORK - Code-makers could be on the verge of winning their ancient arms race with code-breakers.

After 20 years of research, an encryption process is emerging that is considered unbreakable because it employs the mind-blowing laws of quantum physics.

This month, a small startup called MagiQ Technologies Inc. began selling what appears to be the first commercially available system that uses individual photons to transfer the numeric keys that are widely used to encode and read secret documents.

Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code.

"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ.

Called Navajo - a nod to the American Indian code specialists of World War II - MagiQ's system consists of 19-inch black boxes that generate and read the signals over a fiber-optic line.

MagiQ (pronounced "magic," with the "Q" for "quantum") expects that with a cost of $50,000 to $100,000, Navajo will appeal to banks, insurers, government agencies, pharmaceutical companies and other organizations that transmit sensitive information.

"We think this is going to have a huge, positive impact on the world," said Bob Gelfond, MagiQ's founder and chief executive.

Encryption schemes commonly used now are considered safe, though they theoretically could be broken someday.

But even before that day arrives, Gelfond believes quantum encryption is superior in one important way. In some super-high-security settings, people sharing passwords and other information must have the same key, a massive string of digits used to encode data. Sometimes the keys will be transferred by imperfect means - via courier or special software. They are not changed very often and can be susceptible to interception.

"Even if you have the perfect encryption algorithm, if someone gets your key, you're in trouble," Gelfond said.

The Navajo system not only transmits the keys on snoop-proof photons, it also changes them 10 times a second. "Even if somebody could get a copy of the key, it wouldn't do them any good," Gelfond said.

Of course, unbreakable codes would neutralize the ability of intelligence agents to intercept and read messages. That would necessitate greater reliance on human intelligence.

So does the world's foremost code-making and code-breaking organization, the U.S. National Security Agency, worry about the spread of quantum encryption? Better yet, is the NSA using the technology itself? Like most things about the NSA, those answers remain secret.

MagiQ is seeking the government's approval to sell Navajo boxes overseas. Gelfond hopes officials have realized - after trying and failing to restrict encryption exports in the 1990s - that there's little point in trying to "put the genie back in the bottle" once encryption methods have been invented. After all, he said, researchers in China are known to have experimented with quantum encryption.

(Excerpt) Read more at siliconvalley.com ...


TOPICS: Business/Economy; Miscellaneous; News/Current Events; Technical
KEYWORDS: computersecurity; encryption; privacy
Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last

1 posted on 11/17/2003 11:36:18 AM PST by Cultural Jihad
[ Post Reply | Private Reply | View Replies]

To: msdrby
ping
2 posted on 11/17/2003 11:42:24 AM PST by Prof Engineer (This is NOT the government the Founders intended. ~ Golden Corral supports troops and veterans)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
In some super-high-security settings, people sharing passwords and other information must have the same key . . .

WRONG! The AP screws up again.

3 posted on 11/17/2003 11:45:08 AM PST by LibWhacker
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mitchell
Ping
4 posted on 11/17/2003 11:46:06 AM PST by Allan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ.

Silently, the cracker smirks, and begins his work.

5 posted on 11/17/2003 11:47:32 AM PST by per loin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
Any guesses on how long it will be before someone breaks these codes. If you build a better mouse trap the world builds a better mouse. All codes are breakable.
6 posted on 11/17/2003 11:47:43 AM PST by RiflemanSharpe (An American for a more socially and fiscally conservation America!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RiflemanSharpe
Not Enigma!

Herman Goering
7 posted on 11/17/2003 11:51:03 AM PST by don'tbedenied
[ Post Reply | Private Reply | To 6 | View Replies]

To: RiflemanSharpe
They won't be broken until new laws of the physical universe are discovered. Quantum mechanics has been verified to exacting detail.
8 posted on 11/17/2003 11:52:08 AM PST by glorgau
[ Post Reply | Private Reply | To 6 | View Replies]

To: per loin
The weakest point of any, and I do mean ANY encryption scheme is the humans at each end.

Enigma was broken because the transmission format used by the Germans had each station use their 3 digit call sign to start the message.
9 posted on 11/17/2003 11:52:48 AM PST by taxcontrol (People are entitled to their opinion - no matter how wrong it is.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Cultural Jihad
Sigh. The title should be:

"Cracker and Hackers Rejoice, something new to figure out! first one wins a prize!"

10 posted on 11/17/2003 11:54:23 AM PST by whattajoke (Neutiquam erro.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
Any encryption key that is used more than once is breakable, without exception. It could take an extremely long time to get broken, but it is doable.
11 posted on 11/17/2003 11:56:28 AM PST by jpl
[ Post Reply | Private Reply | To 1 | View Replies]

To: per loin
uh - silently the NSA smirks because they know the backdoors to anything like this in case it becomes a Tool for Allah.
12 posted on 11/17/2003 11:57:08 AM PST by epluribus_2
[ Post Reply | Private Reply | To 5 | View Replies]

To: Cultural Jihad
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code.

OK.... So basically they're claiming that if I put a splitter in the line, and hook up the alternate line to my stolen box, the photon will be altered and I can't read the message? Somehow I doubt it.

Also, any fiber-optic line losses would undoubtedly include the occasional encryption photon -- so clearly there's gonna have to be some sort of error detection/correction algorithm involved.

(sniff sniff) Is that marketing I smell....?

13 posted on 11/17/2003 12:00:33 PM PST by r9etb
[ Post Reply | Private Reply | To 1 | View Replies]

To: RiflemanSharpe
I note that this seems to rely on the fact that any attempt to copy a message will destroy the message to the originally designated recipient. Thus the seemingly best strategy is to intercept and make to copies doing a retransmission to the original designated recipient.
14 posted on 11/17/2003 12:02:20 PM PST by harpseal (stay well - Stay safe - Stay armed - Yorktown)
[ Post Reply | Private Reply | To 6 | View Replies]

To: LibWhacker
Same public key, not private key.
15 posted on 11/17/2003 12:03:47 PM PST by stainlessbanner
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cultural Jihad
Man made it, man can crack it.
16 posted on 11/17/2003 12:06:01 PM PST by mtbopfuyn
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
The theory follows the Heisenberg Uncertainty Principle. Of course, adding relay points along the way can interrupt signals. Also, as any computer hacker can tell you, social engineering and compromising the box are methods that work quite well.
So what if you can't listen-in on the conversation. Attack the end point boxes and you should get plain-text copy. Also, exploit the fragility of the system by purposely messing with it so that it becomes "unreliable". If you can consistently or even inconsistently disrupt the "secure" channel, then the black boxes become unreliable and will need to be replaced.
17 posted on 11/17/2003 12:08:27 PM PST by yevgenie (Byte me. Or is that yBetm .e ? Which end of the egg do you break first?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sourcery
ping
18 posted on 11/17/2003 12:10:16 PM PST by Libertarianize the GOP (Ideas have consequences)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Cultural Jihad
There have always been unbreakable codes, and 98C T9's to break them.
19 posted on 11/17/2003 12:13:20 PM PST by ASA Vet ("Right-wing Internet wacko")
[ Post Reply | Private Reply | To 1 | View Replies]

To: epluribus_2
There is No Such Agency.
20 posted on 11/17/2003 12:16:46 PM PST by ASA Vet ("Right-wing Internet wacko")
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson