Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Sending secret messages over public internet lines can take place with new technique
Eurekalert ^ | 10-Oct-2006 | Colleen Morrison

Posted on 10/10/2006 11:15:52 AM PDT by Teflonic

WASHINGTON, Oct. 10 -- A new technique sends secret messages under other people's noses so cleverly that it would impress James Bond--yet the procedure is so firmly rooted in the real world that it can be instantly used with existing equipment and infrastructure. At this week's annual meeting of the Optical Society of America in Rochester, N.Y., Bernard Wu and Evgenii Narimanov of Princeton University will present a method for transmitting secret messages over existing public fiber-optic networks, such as those operated by Internet service providers. This technique could immediately allow inexpensive, widespread, and secure transmission of confidential and sensitive data by governments and businesses.

Wu and Narimanov's technique is not the usual form of encryption, in which computer software scrambles a message. Instead, it's a more hardware-oriented form of encryption--it uses the real-world properties of an optical-fiber network to cloak a message. The sender transmits an optical signal that is so faint that it is very hard to detect, let alone decode.

The method takes advantage of the fact that real-world fiber-optics systems inevitably have low levels of "noise," random jitters in the light waves that transmit information through the network. The new technique hides the secret message in this optical noise.

In the technique, the sender first translates the secret message into an ultrashort pulse of light. Then, a commercially available optical device (called an optical CDMA encoder) spreads the intense, short pulse into a long, faint stream of optical data, so that the optical message is fainter than the noisy jitters in the fiber-optic network. The intended recipient decodes the message by employing information on how the secret message was originally spread out and using an optical device to compress the message back to its original state. The method is very secure: even if eavesdroppers knew a secret transmission was taking place, any slight imperfection in their knowledge of how the secret signal was spread out would make it too hard to pick out amidst the more intense public signal.

Although the researchers have made public this transmission scheme, and the components for carrying it out are all available, lead author Bernard Wu does not think this technique is being used yet.

"As the method uses optical CDMA technology, which is still undergoing significant research, I don't think any government or corporation is implementing this technique yet," Wu says.

While Wu foresees that government and businesses would have the greatest use for this technique, consumer applications are possible, he says. For example, consumers may occasionally transmit sensitive data via fiber-optic lines for a banking transaction. "This would not be a primary transmission scheme one would employ 24/7, as the price for enhanced security is a lower transmission rate," says Wu. Yet, since consumers send encrypted information to banks only intermittently, "the stealth method is practical" for that purpose, he says.


TOPICS: Miscellaneous; Technical
KEYWORDS: cdma; fiberoptics; science
Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last
If interested, here's the pdf link to the full paper.
1 posted on 10/10/2006 11:15:53 AM PDT by Teflonic
[ Post Reply | Private Reply | View Replies]

To: Teflonic

You can be sure al-Qaeda is reading up on it.


2 posted on 10/10/2006 11:18:41 AM PDT by theDentist (Qwerty ergo typo : I type, therefore I misspelll.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Teflonic

It's is just spread-spectrum applied to optical.


3 posted on 10/10/2006 11:18:51 AM PDT by Dracian
[ Post Reply | Private Reply | To 1 | View Replies]

To: theDentist
You can be sure al-Qaeda is reading up on it.

Unless they own the electronics on both ends of the fiber, this knowledge wouldn't do anyone any good.

4 posted on 10/10/2006 11:19:57 AM PDT by Dracian
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dracian

Perhaps not immediately, but given time and breakthroughs...


5 posted on 10/10/2006 11:22:24 AM PDT by theDentist (Qwerty ergo typo : I type, therefore I misspelll.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Teflonic

Somewhere, somehow, this innovation will tie back to porn...it often seems to...


6 posted on 10/10/2006 11:24:35 AM PDT by beezdotcom
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dracian

Agreed. They will need fiber throughout the entire network in which the message travel. In my opinion, architecting a more appropriate public key infrastructure would make more sense.


7 posted on 10/10/2006 11:26:33 AM PDT by rit
[ Post Reply | Private Reply | To 4 | View Replies]

To: theDentist

I would think you would need the cooperation of the cable guy (company).
Most optical transmissions end up or start out as electrical signals that need conversion to optical and then back.


8 posted on 10/10/2006 11:27:13 AM PDT by Cold Heart
[ Post Reply | Private Reply | To 2 | View Replies]

To: Cold Heart

Uh huh.... all I'm saying is: for now. let's look again in 5 years or 10 years and see if it's commonplace.


9 posted on 10/10/2006 11:30:16 AM PDT by theDentist (Qwerty ergo typo : I type, therefore I misspelll.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Teflonic; All

Given the way message packets are transmitted over the Net today, I would guess it will be a while before this technology is universally applicable.


10 posted on 10/10/2006 11:32:04 AM PDT by econjack
[ Post Reply | Private Reply | To 1 | View Replies]

To: Teflonic
First paragraph of the paper says:


".... if appropriate filters are used"

In short, only works in the lab. No real world application unless you 1) have physical access to both ends of the fiber or 2) can control the equipment between the two end points.

All it would take to kill this would be ONE optical filter designed to block the "noise". It would also be interesting to see how resilient this is to chromatic dispersion.
11 posted on 10/10/2006 11:33:22 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: Teflonic
This is old stuff. For instance, properly trained observers can detect the tower in this picture:


12 posted on 10/10/2006 11:33:49 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Teflonic

Somewhere there is an NSA tech rolling on the floor laughing as he sits in his cube monitoring the seventh generation version of this hardware....


13 posted on 10/10/2006 11:34:15 AM PDT by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne

Dude, if that is a picture of your lady.... your are very blessed!


14 posted on 10/10/2006 11:39:57 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 12 | View Replies]

To: theDentist
Perhaps not immediately, but given time and breakthroughs...

Why would Islamics spend all those resources on such an esotric means of communication when they can just go to the Mosque and make their plans in plain language?

You have to give them some credit for ROI (return on investment.) I mean they brought down the WTC with a couple of razor blades.

15 posted on 10/10/2006 11:44:30 AM PDT by Dracian
[ Post Reply | Private Reply | To 5 | View Replies]

To: Izzy Dunne
Be nice and don't use too much of my bandwidth.......
16 posted on 10/10/2006 11:48:12 AM PDT by b4its2late (I'm not insensitive, I just don't care.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Izzy Dunne

I can't see the tower, the noise is too loud.


17 posted on 10/10/2006 11:49:00 AM PDT by Enterprise (Let's not enforce laws that are already on the books, let's just write new laws we won't enforce.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Dracian

Or just have multiple people log into the same email account, and leave messages in draft form for others to view?


18 posted on 10/10/2006 11:50:23 AM PDT by ContemptofCourt
[ Post Reply | Private Reply | To 15 | View Replies]

To: rit
Agreed. They will need fiber throughout the entire network in which the message travel. In my opinion, architecting a more appropriate public key infrastructure would make more sense.

Yeah, this type of technology is of interest to people who want secure links but rent their fiber from someone else. Since they can't be sure the fiber isn't being tapped if it is out of their control, they want end to end security. Hence this additional method, beyond encryption. It's stealth on top of encryption.

19 posted on 10/10/2006 11:50:33 AM PDT by Dracian
[ Post Reply | Private Reply | To 7 | View Replies]

To: Izzy Dunne

I'll bet them things keep her warm during those cold Canadian winters.


20 posted on 10/10/2006 11:52:37 AM PDT by CholeraJoe (USAF Air Rescue "That others may live.")
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-44 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson