Skip to comments.
Encryption Promises Unbreakable Codes
AP ^
| Nov. 16, 2003
| BRIAN BERGSTEIN
Posted on 11/17/2003 11:36:17 AM PST by Cultural Jihad
Encryption Promises Unbreakable Codes
BRIAN BERGSTEIN
Associated Press
NEW YORK - Code-makers could be on the verge of winning their ancient arms race with code-breakers.
After 20 years of research, an encryption process is emerging that is considered unbreakable because it employs the mind-blowing laws of quantum physics.
This month, a small startup called MagiQ Technologies Inc. began selling what appears to be the first commercially available system that uses individual photons to transfer the numeric keys that are widely used to encode and read secret documents.
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code.
"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ.
Called Navajo - a nod to the American Indian code specialists of World War II - MagiQ's system consists of 19-inch black boxes that generate and read the signals over a fiber-optic line.
MagiQ (pronounced "magic," with the "Q" for "quantum") expects that with a cost of $50,000 to $100,000, Navajo will appeal to banks, insurers, government agencies, pharmaceutical companies and other organizations that transmit sensitive information.
"We think this is going to have a huge, positive impact on the world," said Bob Gelfond, MagiQ's founder and chief executive.
Encryption schemes commonly used now are considered safe, though they theoretically could be broken someday.
But even before that day arrives, Gelfond believes quantum encryption is superior in one important way. In some super-high-security settings, people sharing passwords and other information must have the same key, a massive string of digits used to encode data. Sometimes the keys will be transferred by imperfect means - via courier or special software. They are not changed very often and can be susceptible to interception.
"Even if you have the perfect encryption algorithm, if someone gets your key, you're in trouble," Gelfond said.
The Navajo system not only transmits the keys on snoop-proof photons, it also changes them 10 times a second. "Even if somebody could get a copy of the key, it wouldn't do them any good," Gelfond said.
Of course, unbreakable codes would neutralize the ability of intelligence agents to intercept and read messages. That would necessitate greater reliance on human intelligence.
So does the world's foremost code-making and code-breaking organization, the U.S. National Security Agency, worry about the spread of quantum encryption? Better yet, is the NSA using the technology itself? Like most things about the NSA, those answers remain secret.
MagiQ is seeking the government's approval to sell Navajo boxes overseas. Gelfond hopes officials have realized - after trying and failing to restrict encryption exports in the 1990s - that there's little point in trying to "put the genie back in the bottle" once encryption methods have been invented. After all, he said, researchers in China are known to have experimented with quantum encryption.
(Excerpt) Read more at siliconvalley.com ...
TOPICS: Business/Economy; Miscellaneous; News/Current Events; Technical
KEYWORDS: computersecurity; encryption; privacy
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-42 next last
To: msdrby
ping
2
posted on
11/17/2003 11:42:24 AM PST
by
Prof Engineer
(This is NOT the government the Founders intended. ~ Golden Corral supports troops and veterans)
To: Cultural Jihad
In some super-high-security settings, people sharing passwords and other information must have the same key . . . WRONG! The AP screws up again.
To: Mitchell
Ping
4
posted on
11/17/2003 11:46:06 AM PST
by
Allan
To: Cultural Jihad
"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ. Silently, the cracker smirks, and begins his work.
5
posted on
11/17/2003 11:47:32 AM PST
by
per loin
To: Cultural Jihad
Any guesses on how long it will be before someone breaks these codes. If you build a better mouse trap the world builds a better mouse. All codes are breakable.
6
posted on
11/17/2003 11:47:43 AM PST
by
RiflemanSharpe
(An American for a more socially and fiscally conservation America!)
To: RiflemanSharpe
Not Enigma!
Herman Goering
To: RiflemanSharpe
They won't be broken until new laws of the physical universe are discovered. Quantum mechanics has been verified to exacting detail.
8
posted on
11/17/2003 11:52:08 AM PST
by
glorgau
To: per loin
The weakest point of any, and I do mean ANY encryption scheme is the humans at each end.
Enigma was broken because the transmission format used by the Germans had each station use their 3 digit call sign to start the message.
9
posted on
11/17/2003 11:52:48 AM PST
by
taxcontrol
(People are entitled to their opinion - no matter how wrong it is.)
To: Cultural Jihad
Sigh. The title should be:
"Cracker and Hackers Rejoice, something new to figure out! first one wins a prize!"
10
posted on
11/17/2003 11:54:23 AM PST
by
whattajoke
(Neutiquam erro.)
To: Cultural Jihad
Any encryption key that is used more than once is breakable, without exception. It could take an extremely long time to get broken, but it is doable.
11
posted on
11/17/2003 11:56:28 AM PST
by
jpl
To: per loin
uh - silently the NSA smirks because they know the backdoors to anything like this in case it becomes a Tool for Allah.
To: Cultural Jihad
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code. OK.... So basically they're claiming that if I put a splitter in the line, and hook up the alternate line to my stolen box, the photon will be altered and I can't read the message? Somehow I doubt it.
Also, any fiber-optic line losses would undoubtedly include the occasional encryption photon -- so clearly there's gonna have to be some sort of error detection/correction algorithm involved.
(sniff sniff) Is that marketing I smell....?
13
posted on
11/17/2003 12:00:33 PM PST
by
r9etb
To: RiflemanSharpe
I note that this seems to rely on the fact that any attempt to copy a message will destroy the message to the originally designated recipient. Thus the seemingly best strategy is to intercept and make to copies doing a retransmission to the original designated recipient.
14
posted on
11/17/2003 12:02:20 PM PST
by
harpseal
(stay well - Stay safe - Stay armed - Yorktown)
To: LibWhacker
Same public key, not private key.
To: Cultural Jihad
Man made it, man can crack it.
To: Cultural Jihad
The theory follows the Heisenberg Uncertainty Principle. Of course, adding relay points along the way can interrupt signals. Also, as any computer hacker can tell you, social engineering and compromising the box are methods that work quite well.
So what if you can't listen-in on the conversation. Attack the end point boxes and you should get plain-text copy. Also, exploit the fragility of the system by purposely messing with it so that it becomes "unreliable". If you can consistently or even inconsistently disrupt the "secure" channel, then the black boxes become unreliable and will need to be replaced.
17
posted on
11/17/2003 12:08:27 PM PST
by
yevgenie
(Byte me. Or is that yBetm .e ? Which end of the egg do you break first?)
To: sourcery
ping
To: Cultural Jihad
There have always been unbreakable codes, and 98C T9's to break them.
19
posted on
11/17/2003 12:13:20 PM PST
by
ASA Vet
("Right-wing Internet wacko")
To: epluribus_2
There is No Such Agency.
20
posted on
11/17/2003 12:16:46 PM PST
by
ASA Vet
("Right-wing Internet wacko")
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-42 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson