Crypto with Epoxy Tokens, Glass Balls and Lasers 265
Anonymous Coward writes "Scientists from MIT and ThingMagic have collaborated and developed an innovative crypto mechanism using epoxy tokens, glass spheres and lasers. They have actually created a physical one-way function that cannot be tampered, copied or faked! The full scoop can be found at MSNBC, and also at Nature, & TOI."
Remember the SGI Patent? #@ +1; Informative @# (Score:3, Interesting)
Lava Lamps? Now there is Lava lamp cryptography.
Read about it at:
LavaLamp [lavarnd.org]
Thanks and have a weekend !
Re:Remember the SGI Patent? #@ +1; Informative @# (Score:2, Interesting)
There was talk of pointing a web cam out a window onto a busy street or point it at a lava lamp in order to generate a constant stream of seed data for encryption.
Re:Remember the SGI Patent? #@ +1; Informative @# (Score:2)
They did this, it used to be on lavarand.sgi.com, but that server is no more. It baically would have a digital image of multiple lava lamps, take the numbers from the digital image, run it rhough some hash like MD5 and then use those as random numbers. Lavarnd.org [lavarnd.org] seems to be the closes spiritual successor.
Re:Remember the SGI Patent? #@ +1; Informative @# (Score:2, Informative)
from the site:
AAlib is an portable ascii art GFX library. If you wish to see some examples of AAlib technology, please browse AA-project homepage.
and here are some *pics [sourceforge.net]* generated from the library.
i think it was intended to play doom over a network on a console, but what lukegalea1234 sad, is equally valid.
Re:Remember the SGI Patent? #@ +1; Informative @# (Score:5, Funny)
Yeah, I agree. That band sucks.
Old Technology, new twist (Score:5, Interesting)
I think the process involved mixing a bunch of little tinfoil sparkles into a clear epoxy resin, applying the resulting glue as a seal, and photographing it from several angles. Simple to create, yet darn near impossible to duplicate a second time. If the blob is missing or different, something fishy is going on.
Re:Old Technology, new twist (Score:5, Funny)
Re:Old Technology, new twist (Score:4, Interesting)
Re:Old Technology, new twist (Score:3, Insightful)
Because the manufacturers are not trying to create pseudo-randomness themselves (invariably according to some algorithm, like creditcard numbers), it really is much harder for blackhats to reverse the one-way function. However, because there are no rules governing what a "valid" key looks like (they're just supposed to be unique), someone could very carefully create a number of these token that are, instead of random, very similar. Because practical implementations of this scheme are likely to scan these keys from pre-determines angles, the amount of difference allowed between these similar keys may be large enough to create "duplicates".
Note that this doesn't mean that blackhats can duplicate your key, but they may be able to create a matching pair and swap yours with theirs in the middle of the night...
Re:Old Technology, new twist (Score:3, Interesting)
The advantage of this approach over other physical authentication techniques such as biometrics is that you don't have to trust the scanners. With fingerprint readers, once they scan you they can then store your fingerprint and impersonate you. That doesn't seem possible with this new approach.
Of course for pure theoretical security, it still doesn't match a smartcard with an RSA key encrypted with a strong 128 bit password that the user has to type in every time he wants to use the card. Unless you want to embed the smartcard inside a refractive epoxy for the best of both worlds.
-a
Re:Old Technology, new twist (Score:2, Insightful)
I think the correct term would be quasirandom. A quasirandom sequence is one that fills a space in a sort of random manner while observing some constraints. For example, when performing a monte carlo integration, you would rather avoid sampling data points that are very close, so a quasirandom sequence can give better convergence. On the other hand (in the case of the integration) you sacrifice the rigorous error estimation that is possible using true pseudorandom numbers.
Re:Old Technology, new twist (Score:3, Interesting)
Candles of different colors were dripped onto the envelope to create a swirl of color that can't be as simply duplicated as a single color wax seal can. The picture of the multi-colored seal was sent ahead to verify the authenticity of the seal.
Re:Old Technology, new twist (Score:2)
can we all say:.... (Score:2, Insightful)
Re:Old Technology, new twist (Score:2, Interesting)
I believe nuclear materials are safeguarded using a similar system. A bundle of fiberoptic cables is used as a "chain", with the ends somehow twisted and locked. The twisting has the effect of breaking some of the cables in a random pattern that can be verified or monitored continuously by shining a light through the bundle. Presumably any attempt to remove the cable (or cut it) would alter the pattern.
Neat.
Pat Niemeyer
Re:Old Technology, new twist (Score:5, Interesting)
The jagged edge of the contracts looked like teeth, Latin dent IIRC, and whoever held such a contract was said to be indentured
Didn't require lasers, of course, but did require that the two parts be physically present and visually verified, so it is remarkably similar in principle. The fibers and surface imperfections of the parchment (thin leather) would have taken the place of the glass beads in this case.
So, does the MIT patent fail due to prior art?
Obvious circumvention scheme (Score:2, Insightful)
A crummy piece of film exposed at the sensor plane, then developed, could be used to get around this. Lay the film on the 2D sensor, and voila - the 2D pattern is duplicated!
Re:Obvious circumvention scheme (Score:2, Insightful)
Re:Obvious circumvention scheme (Score:5, Informative)
A one-angle view of this token would not be secure, but a security mechanism that scanned the token through multiple angles would be very difficult to recreate. I don't know if they should be throwing around the word 'impossible', however.
Re:Obvious circumvention scheme (Score:2)
It is impossible to re-create the crystal that generates the data, not the data itself. You are looking at this object which is used for physical security from a purely software standpoint. The data istelf (the pattern resulting from the laser through the crystal) is useless if you cant create the crystal which generated the data in the first place, because then you can't duplicate the card.
Re:Obvious circumvention scheme (Score:2)
Re:Obvious circumvention scheme (Score:2, Insightful)
This is what this technology is meant to prevent. First, you'd need the laser equipment to read the fob to get the dot pattern. Then, to be sure, you'd need to make sure that you illuminate the fob from all sides, since the dot pattern is different depending on where the laser is shown from. Next, you need a fabrication facility to create these crystal fobs (currently not available, I imagine that'll change, too) and finally, you need a boatload of math to figure out what set of microscopic bubbles works together to form the set of dot patterns you scanned previously.
This last bit, the forcing function, if you will, is the clincher. I imagine that the reversal of the dot patterns to a layout of microscopic bubbles in the fob is an f(x) that's particularly difficult to reverse, at least on the order of factoring the product of large primes (if not more difficult).
Possible? Maybe - eventually, certainly. More secure than credit cards? You betcha. Especially since credit card fraud/theft is amazingly low-tech these days
Cheers.
Is it really prohibitively hard? (Score:2)
1) How do we know that determining the bubble pattern of the fob is difficult enough to determine? This seems to me to boil down a simple, but large, ray tracing problem. Comodity graphics cards today can do fantastic things with lighting that were dreamed by many as not even possible only 15 years ago. Perhaps it can be exploited to solve this problem in the near future. I'm not convinced that this is truely a one-way hash; the idea is too new to confidently rule out the possibility of a solution.
2) Duplication is perhaps beyond current technology, but maybe not far away. It isn't difficult to imagine a matarial that can have it's light refraction properties modified at an arbitrary point that is located at the intersection of two or more lasers. Holographic research has been focused on solving this problem for some time and may have already come up with a (albeit expensive) solution.
Re:Obvious circumvention scheme (Score:2)
Mostly it's a great way to come up with one time pads and otherwise feed random number needs in various crypto applications. Not terribly useful as a means of crypto per se.
not exactly... (Score:2)
Except, if she had had her eyes shut like she was supposed to, it would have worked. Thats not a failing of the 'physical world' crypto, but rather the human brain's randomness generator.
Simple crack. (Score:2)
Scan your victim's card, and record the pattern you see.
Place the recording on a similarly-sized device with any type of display. (LCD, LED, anything that can be powered by a small solar panel) "Cheap" copies targeted against "cheap" scanners won't need backlighting for the display.
Make sure the card-sized device has a solar panel on it that will be able to power the display and the supporting IC that controls the display.
When the illuminator turns on, the card has power. The card then immediately starts playing back the stored video, mimicking what the scanner would see had it been the real thing.
This assumes, however, that the scanner has only one "eyepiece." Camoflaging (sp) the card so it looks real to the human observer would probably be difficult.
Re:Simple crack. (Score:2)
A couple of resulting scenarios:
Or
Re:Bypass the sensor unit (Score:2)
except, the fob is a function, not a set of data, and can produce an infinite number of possible outputs. You only have the outputs for one input
One "obvious" solution to this is to encrypt the pattern at the device before it is sent, but now we're back into the standard encryption world, and we know that nothing is perfect there.
If by 'not perfict' you mean 'takes a million billion years to crack'
OK, so we change the pattern based on the date and time with a "protected" algorithm. Like that can't be solved.
huh, why? Did you have a million billion years of computer time to spare?
Well, then we'll use a system like the "SecureID" cards with each credit card unit including the random/automaticly generated token as part of the encryption effort. Well that would be a little more complex.
But in the end, all of these solutions can be applied to the current barcode read from credit cards before it is sent over the phone lines today. The use of a 3D number/key generator, which is really what this is, won't change that.
ok, not like any of that made any sense...
P.S. Don't ask me how this could be used at Websites.... Pardon me, while I send this huge bit representation of your 3D fob over this dinky 56Kb error prone phone line. Right....
Well, obviously we wouldn't as you. you don't even know what a hashcode is.
bah (Score:2)
So what, that's only half the picture. (Score:3, Interesting)
Getting the 2D pattern is easy (anyone with access to a reader could simply get this pattern through software). You then have to manufacture a crystal which produces this pattern, so that you can use your new counterfit card at the Sony store, etc. This is the part that is currently impossible.
Re:So what, that's only half the picture. (Score:2)
Oops.
-Peter
Re:So what, that's only half the picture. (Score:2)
No. The card doesn't output anything, it has no electronis, only this crystal. Both the laser and the device that picks up the patten ar eon the reader. So you'd have to duplicate the crystal.
Re:So what, that's only half the picture. (Score:2)
To illustrate: You have one of these cards. It doesn't output anything, i.e. it is a passive device. I "borrow" your card, put it through a reader and learn what the "correct" output of your card is. I then construct a card that looks more-or-less like a legitimate card, but it is actually an active device that emits YOUR 2D pattern whenever it is scanned.
In other words, I can't fake the 3D structure of the card, but I am not at all convinced that I'd have to in order to make charges on your account.
Is that spelled out clearly enough for you?
-Peter
Re:So what, that's only half the picture. (Score:3, Interesting)
No one would accept this emulator card you speak of, even if you could make one, which I doubt. And such emulator card would probably not fit in any ATM either.
Re:Obvious circumvention scheme (Score:2)
if you were to build a practical (read: a forged credit guitar pick to by a hard drive at Fry's) forgery, you'd have to come up with a way to force the ultra-thin laser beam to spread into that pattern...
what would you do? Bring a lens with you to spread the laser evenly over the film?
i can't think of an obvious way to make a practical forgery - but i'm not saying it can't be done. But your notion of using film is bogus.
Well (Score:2)
Of course, none of this matters, since the above poster basicaly didn't understand what the whole thing does anyway.
Re:Obvious circumvention scheme (Score:3, Insightful)
Oh wait, what's this? Oh, there's an ARTICLE to read? One which discussed exactly that, and how the laser can be shone through the fob at multiple angles, requiring the correct 3D structure? Hmm.
Re:Obvious circumvention scheme (Score:3, Interesting)
Stereolithography (Score:2, Informative)
I did a lesson at college on Stereolithography [howstuffworks.com] about 10 years ago. The process of curing two-part epoxy resin with the heat generated with laser lights. It was very accurate back then; more than adequate for producing A1 models and patterns.
I'm wondering how accurate it is now or how accurate it could become.
Re:Obvious circumvention scheme (Score:2)
The MSNBC article seemed to have the most details. They said that the outputs did not have to be reused. It sounds like a challenge-response system, where the server sends input patterns, and the reader sends back the output patterns. If they really don't have to be reused, then the above criticism is not valid.
Presumably, the server stores some finite number of input-output patterns, and then can send some subset of input patterns to be checked. By using different combinations of input patterns, even if some output patterns were intercepted, it would not be enough information to compromise this.
For example, if the server stored 100 different input-output patterns, and sent 5 input patterns to be verified for a transaction, then the total number of unique checks would be 100!/(95! * 5!), or about 75 million.
Of course, if different crooked merchants stole output patterns and pooled their knowledge, or if a customer made repeated purchases from the same crooked merchant, then it could possibly be broken. More information is needed about the system to understand its vulnerability to this type of threat.
Obviously havn't read the artical (Score:2)
Your spoofing technique would only work if the angle you chose and the angle randomly selected were the same, so the chances of it working would depend on how many angles for which the results are stored.
Also, you could 'challenge' by requesting two different angles to be checked, in which case you're system wouldn't work at all.
(I can't believe this got a four, Mysterious obviously either didn't read the artical, or didn't understand it)
Re:Obviously havn't read the artical (Score:2)
You authenticate against a database that has several readings from several known angles:
Re:Obviously havn't read the artical (Score:2)
Of course the other problem is what another poster mentioned, duplicating the key via stereolithograpy or some other method - these tokens are made in the first place, they arent beyond being produced with more care (e.g a tiny layer at a time and placing the glass spheres where required).
In short this is a cool and clever glorified front door key, but with more combinations.
Tokens, glass balls and lasers? (Score:2, Funny)
hmm... (Score:4, Funny)
To clarify the story submission (Score:5, Informative)
One thing know once you read the article(s), that really should have been included in the story submisstion, is this technology is more geared toward replacing things such as magnetic stripes on credit cards, and em cards, and whatnot. The tiny crystals that will replace these stripes produce a one-way function that is currently impossible to duplicate, so if widely adopted this would (at least temporailiy) make card couterfitting impossible. It is not describing a new encryption mechanism for your PC, or any software for that matter.
pretty cool uses for encryption, actualy (Score:2)
It would actualy be a pretty cool encryption system, basicaly data would be locked forever unless you had the card. You'd never have to worry about anyone getting access to your data, since they would need the card to read it. And, if for example the FBI was on your ass, just throw the card in the microwave
Impossible to Compromise? (Score:2, Insightful)
how is stealing speckle patterns gonna be any different from stealing credit card numbers from "secure" servers?
Bank cards as well (Score:2)
It could also be used on bank cards, thus preventing people from counterfitting them. I once read about a ring which was using an aptly mounted hidden camera to monitor people's PIN numbers. They then grabbed some ATM slips the person threw away (most people rarely keep/destory them) and manufactured a fake card using their PIN and their account information.
Re:Impossible to Compromise? (Score:2)
With credit cards, the credit card number is the secret, the whole secret, and nothing but the secret.
With the new gizmo, the speckle pattern is not the secret. The secret is the arrangement of crystals, which isn't shared with anyone. Steal a copy of the speckle pattern and you have nothing.
Nope (Score:2)
Re:Impossible to Compromise? (Score:3, Insightful)
Because stealing the speckle pattern does you no good. You need to create a device that makes that pattern, when light is shone through it and an inaccessible air gap onto a sensor. You can't just lay something on top of the sensor itself because, in any even half-way sensible design, you couldn't get to the sensor itself without disabling the entire reader.
I actually think this idea is extremely clever, but I don't know if I'd consider it a method of encryption. Even if you had an LED grid representing cleartext on one side, so you could read the "ciphertext" speckle pattern on the other side, how do you decrypt that? What kind of resolution, frequency and loss ratio are we talking about? This seems like it might be a really good authentication mechanism, where a known input will only be converted to a known output in the presence of a unforgeable secret, but I don't see how it can work for encryption where the input varies.
Re:Impossible to Compromise? (Score:4, Insightful)
Also, if the connection between a store and the pattern validation server is ever intercepted, a hacker could just save your patterns and re-send them whenever they want to purchase pr0n or something. So I think the original poster was right: this is just like stealing credit card numbers. As long as validation is done by passing around a bunch of digital data, that will always be the point of weakness. Even now, the vast majority of credit card fraud happens not because somebody's magnetic strip gets duplicated, but because somebody's credit card numbers get stolen. It seems like making the physical cards harder to duplicate is barking up the wrong tree.
The only solution I can see is this: There wouldn't be a unique resultant diffraction pattern that gets passed around, but rather a two-way conversation between the validation server and the card reader. The server would ask three random questions of the sort "what pattern is produced when the laser shines from angle 1, what about angle 2, etc. The problem with this is that the validation server would have to know what the right answers are to all of the possible questions, and that creates a problem: either there would be waay too much data stored for each card, or there would only be a limited number of "questions" the server could ask. In the latter case, a thief's computer could just memorize all the answers to the few questions, and produce them without the card whenever the validation server actually asks.
Re:Impossible to Compromise? (Score:2)
Your analysis seems right on target to me. Any system that's not challenge/response is vulnerable to replay by anyone who can intercept the messages involved, and this system only allows for a limited number of challenge/response exchanges.
I think the "validation server" approach might be problematic, though, since it allows new avenues for compromise. It might actually be better to store challenge/response pairs on the card itself, such that each use of a pair also erases that pair. Each card would then be good for a finite number of non-repeatable transactions, with server communication only necessary to "recharge" the card with new pairs. If the storage on the card and the challenge space are quite large, this is something the consumer would only have to do every N months or years, so it might actually be a decent convenience/security tradeoff even if recharging requires going to a service center or something.
Re:Impossible to Compromise? (Score:2)
Unfortunately, I think the system proposed will not be compatible with this, because I don't think it's overwritable/erasable in the way it would need to be for this sort of validation. The traditional "smart cards" would make more sense for this purpose. However, their problem is different: their chips can be read and duplicated, something that appears much harder to do in this system.
Here is my understanding of how credit card transactions work today. After your card is scanned, your account number gets encrypted and sent to the MasterCard servers, where they look in a database to check whether it's a valid account and whether your balance is high enough to make the purchase. If it is, they send back an OK.
If the card sent a query-response pair to the bank, how would the bank be sure that the pair is coming from the card? How would it know that it's not coming from some data server that previously read your card and saved all the card's query-response data in memory? It seems that if we want to avoid this, the query must come from the bank itself, a sort of check like: "are you the real card?" What question would be asked would not be known to the card; only the answer would.
One way to get it to work, I suppose: first make the card, then read it at the bank to see how it responds to 1000 different queries. Save that at the bank. Then, send out the card to the customer. When the customer makes the first purchase, send out the first query during card validation. If it's the right card, it will answer in the same way it did at the bank when it was initially scanned. So on for the next 999 queries. Once you get to transaction 900 or so, the bank might just send you a new card. I guess it does require a lot of data archiving, but the system really does very safe.
Re:Impossible to Compromise? (Score:2)
You're right that storing both values on the card forces you to assume that the sensor is not compromised and is reporting actual observed (rather than recorded) speckle patterns, and that's a bad thing. On the other hand, I don't think your suggestion really protects the vendor either, because the bank is still not authenticated to the vendor. Maybe we both need to go think about this some more.
Re:Impossible to Compromise? (Score:2)
Durability? (Score:5, Insightful)
Re:Durability? (Score:3, Insightful)
This is similar to the trick they use in CD's. At the metal layer containing the information the light is focused to a few micron. This layer is burried almost a millimeter deep inside the plastic. At the surface the beam has a much larger diameter and tiny scratches are no problem.
Re:Durability? (Score:4, Informative)
(Careful---you are in danger of becomming a Slashdot naysayer [slashdot.org].)
Re:Durability? (Score:2)
(You are in serious danger of becomming a Slashdot Maysayer [slashdot.org].)
It's in the article (Score:3, Insightful)
I would imagine that since it's the internal structure of the token which determines the output, surface scratches don't have as dramatic an effect.
In a related story.... (Score:4, Funny)
Early results (Score:2)
When MIT announced that they would dedicate several old Apple IIs to the project, MacGyver was quoted as saying, "I'm excited, but it's still overkill for the project."
In the first week, he developed a quantum computer that can crack RSA 128 bit encryption in 0.034 seconds, predicts the weather with 97.5% accuracy up to 10 days in advance, located Jimmy Hoffa and solved the mystery of crop circles.
And then he built a beowolf cluster of them.
Function that cannot be tampered, copied or faked (Score:3, Insightful)
Re:Function that cannot be tampered, copied or fak (Score:2)
I already have one of these in my wallet.. (Score:5, Funny)
there are 50 or so of em lying around at home, making my wife mad.
so explain again why guitar picks [westsky.com] are news?
(my apologies to westsky in advance)
So what exactly is new here? (Score:2, Insightful)
I also don't see why this is any different than any other hardware based authentication (RSA tokens, smart cards, etc.) The tokens might be cheaper, but I bet the scanner is not going to be cheap.
And as with most authentication systems the big problem is going to be protocol attacks, not attacks on the cryptography itself. I don't see little glass balls changing this fact.
Yes I'm cynical. But probably with good reason.
Headline from Nature reads: (Score:5, Funny)
Finally! Something to go hand-in-hand with my REO Speedwagon encryption algorithm.
Shit (Score:4, Funny)
Re:Shit (Score:2, Funny)
Neil Gershenfeld (Score:2, Informative)
Help me understand. (Score:2)
Would wear and tear change the shape of the token, rendering it useless?
If this stores a terrabit of info, how can we get it to store the info we want?
How will the government be able to demand a backdoor to this tech?
Will I ask any more questions?
Why are holographs prohibitive? (Score:3, Interesting)
You could almost certainly make one if you had the original card to duplicate.
If you had the verification information for the card - the list of patterns the scanner looks for - you could probably make a holographic reproduction with a bit of fiddling (the same multi-exposure technique is used for making aminated holographs that move as you change viewing angle).
You'd have a hard time duplicating the card just from observing one transaction, but the same holds true for electronic media (one challenge/response pair does not give you a smart card's key).
Does anyone have further details on why the researchers say this would be difficult to forge?
Re:Why are holographs prohibitive? (Score:3, Informative)
The original Science article [sciencemag.org] cites an Applied Optics article from 1984, which I'm would guess basically says what I've said in the previous paragraph.
Re:Why are holographs prohibitive? (Score:2, Informative)
Beyond the obvious constraint of having to record 10^11 or more distinct interference patterns in order to produce the hologram, the incoherent superposition of these N patterns decreases the overall diffraction efficiency of the hologram by 1/N, making them all effectively unobservable.
DRM implications (Score:2)
And the marketing poeple. . . (Score:5, Funny)
Easily Damaged? (Score:3, Insightful)
I'd imagine it'll take a little work to keep these things from getting scuffed or otherwise damaged beyond recognition through regular handling, especially if they end up on your key chain.
Of course, a really sophisitcated system might take that into account, and update the key profile to recognize each key's unique wear and tear.
Defeats one of the purposes of smart cards (Score:3, Interesting)
Re:Defeats one of the purposes of smart cards (Score:2)
How about 2 seconds total? No mag stripe running out after 6 months? It would be noticably faster. It annoys me every time I use a credit card because I am aware of how much time is being wasted. If I am just grabbing a Coke at the 7-Eleven, I shouldn't have to double my time in the store by using a credit card, annoying everyone behind me in line.
Still a major flaw in this for 'Smart Cards' (Score:3, Insightful)
A 'smart card' isn't going to stop a pick pocket from theiving your wallet so we're back to square one.
And not to be troll but has this been on
Several solutions to this "problem" (Score:3, Informative)
Also this stops mafia-types from mass producing fake cards. At CTST this year an IBM team presented a paper in which they read the keys off several cards through RF leakage, making it easy to make fake cards. This would prevent such fake cards, at least until a way of faking these patterns comes about.
Re:Still a major flaw in this for 'Smart Cards' (Score:2)
Stealing the physical card happens, but it is small potatoes. Fake cards (usually copies of legitimate cards) are a really, really big problem. Credit card companies loose billons of dollars a year due to fake cards.
The biggest issue I had from reading the article, was figuring out how the one-way-function was going to be verified. It's nice that there are a terabit of combinations that could be used, does this mean the issuer is going to have to store a terabit of data for each user?
If they only use a subset, than we no longer have the security range of a terabit of information do we? All an attacker has to do is figure out what the subset that will be used is. Since it is "copy proof", it is not like the host can perform a duplicate one-way-function. I don't think this will become practical unless they can clearly resolve this issue.
ICBMs :) (Score:5, Informative)
So it's become cheaper, cheap enough even for everyday use. However, the possible uses I can see are rather limited: local authentication, and pretty much nothing else.
It's good for credit cards, but only if the card is physically read by the entity requestion authentication, and only if that entity is online (or has a local database of the speckle pattern of all cards worldwide, plus a magically updated revocation list).
For any non-local authentication it doesn't seem much good
So
But it definitely has nothing to do with crypto (i.e. encryption)
Something similar speculated on in 1920's sci-fi (Score:2, Interesting)
What's really going on here (Score:5, Informative)
This is an improvement on an idea from the 1980s called "quantum subway tokens". There have also been a few schemes involving 2D speckle patterns as unique, hard to forge data items. But they're not challenge/response, like this. Challenge/response devices exist (Sun's Java-powered jewelry, the Dallas Semiconductor button) but they're more complex. On the other hand, their readers are simpler than this optical system will require.
The useful advancement in this thesis is in section 5.3.4, where the authors demonstrate that the registration of the scanning beam doesn't have to be extremely tight. You'd think this scheme would involve optical-bench precision, but it doesn't. (Well, actually it does, but not wavelength-precise optical bench precision. Still, it involves micrometers driven by computer-controlled stepping motors and a very rigid fixture. It's not a "just swipe the card" system.)
The trouble with this system is that there's no public key associated with the object - only a huge number of possible challenge/response pairs. Validation at an untrusted reader is done by probing the object using challenges previously performed at a trusted reader. Those challenges are "used up" as the object is validated, because otherwise, they could be replayed. This is much less convenient than a public/private key system. It's more like one of those systems where you have a wallet card with a long list of challenge/response pairs for logging in. The only advantage here is that the object isn't copyable. It's still stealable, of course.
It's kind of neat, but probably not commercially useful.
Re:It's commercially useful for one thing: (Score:2)
Very old news (Score:3, Interesting)
The idea was that the hull of each spacecraft was coated in embedded diamonds (cheap in the future because DeBeers' monopoly is gone). The police can then read your hull with a laser from 1 million miles away and you can't forge the "number plate".
TWW
Validation (Score:2)
The construction of the tokens is fairly random, so its not know what the results of X angle on Y token will result...
Another comment mentioned that they may do prescans with a trusted scanner, but then every scan by an untrusted scanner must be discarded... so each token is only valid for some limited number of untrusted scans.
Yet (Score:2)
should read cannot be tempered, copied or faked yet.
couple problems (Score:3, Insightful)
2. uniqueness
Think of it as the bubble patterns is one member of a very-very large set (the "bubble" set) and the laser is a projection or mapping function of this member of the bubble set on to a much smaller "diffraction pattern" set. Since the different laser angles can be used, that's like using different mapping functions.
A verification agency isn't gonna store which member of the bubble set each token is and do a diffraction simulaton with computers everytime the token is scanned, but more likely they will store the one or two projections on to the diffraction pattern set which are created by the one or two reader devices that are marketed. Also the whole diffraction pattern isn't gonna be stored, but just the part of the pattern sampled by the device.
This seems like a much easier problem to solve for the token forgers. All they have to do is make a token that when projected to the one or two sampled diffraction sets stored by the verification agency instead the the infinite possible diffraction patterns of arbitrary precision.
Then you have the uniqueness problem. Since the verification agencies are likely only storing sub-space projections which are finitely sampled, there's the possibility of collisions between two cards. At least with a non-one-way function, you can detect collisions beforehand, now you have to make the card with bubbles and project them to you subspaces and only then discover there's a collision and you have to throw the token away. This also defeats the feature alluded to that you can always use another projection. If you don't check for collisions ahead of time, they will inevitably occur (think of the birthday paradox).
There are fundamental mathematics working against any scheme that depends on low probability of collision. You don't have to duplicate a specific thing, but you hope for a collision (which is duplicating any one of a large set). This of course is much easier to do and is the known as the birthday paradox in probability theory. This has been used as theoretical fodder to break many encryption systems (meets in the middle attacks).
Here's another way to think of it. You have a zillion digit credit card number (token) and you apply a few different hash functions (laser angles) to the number to get a "signature" (diffraction pattern). The only advantage of this technology is that it's hard to duplicate this zillion digit number where most things electronic are easily duplicated. But some of the other "features" don't seem easy to take advantage of.
It's like the phreakers of yesteryear where they just guessed long-distance calling card codes if the set is large enough, collisions are inevitable. That's when companies invented PIN numbers. What it probably means that these tokens will probably end up being only as secure as your 4 digit ATM PIN... Something to think about...
Sometimes when you think outside the box, you realize that the box was green and the grass is really dead out there too...
one way functions (Score:2, Interesting)
An easy application is for keys. If the lock has N input/output pairs recorded, getting in with a fixed example output would be hard.
A more advanced use of these things would be to have some way standard way of encoding a bill of sale including a datestamp into bits that could drive the laser inputs. Then save the resulting pattern(s) as proof that the vob was there at the time of the transaction.
However, that leaves a major hole. If the user destroys the vob, the store can no longer check if the signature was valid. To combat this, the user needs to be identified at the time of the transaction. As long as the vobs are registered in a central identity server so that the store can make sure the person is who they claim to be at that point. Additionally users have to record lost or destroyed vobs. The central identity server could use the N known input/output pairs to authenticate the user.
Missing the point? (Score:3, Insightful)
I am not an optical engineer, but the important part of this is not "you cannot duplicate this token", since that didn't appear to be in anything I read; it's "you cannot duplicate this token _by reading the interference pattern or disassembling/probing inside_", which is a different problem entirely.
I suspect that with sufficiently high-quality materials and production controls, it _is_ possible to duplicate these in the production phase, which then makes it a useful toy; make two of them that have the same interference pattern, and given identical readers, you have a one-time pad that you can use for quite a while. I don't know how they're embedding the glass spheres in the epoxy, but with a finite number of positions for each glass ball in the epoxy (small enough to be useful, large enough to be secure), you might be able to have either coded duplicates (like keys; "2488210366" == "glass balls in pattern X") or a "mold" system where you position the balls identically for a pair of tokens and then destroy the mold, making it impossible to recreate the tokens. Either way has its useful features.
--
SD
Re:Interesting applications for storage (Score:2)
Re:Well holy shit. (Score:3, Informative)
They've discovered the one-time pad!
No, they have not. That would mean that whoever receives a message sent with this data had the same pad, and that isn't the case.If it were, a 12-terabit stamp-size one-time pad would still be rather good.
I'm a bit unclear how this works in practice though. They say they can check the patterns the thing makes against a "secure" database. They can't store all the 12 terabits there.
So, I assume, they pick some number (say, 100) of ways to shine a laser at it at random, and store those in the server. When it's time for identification, the server tells the token reading gadget which position(s) the laser should be in, it sends the pattern back, and it can be checked.
One possible attack is obvious, it may be possible to find out which random spots for the laser have been stored for this token by asking for a verification enough times. However, that gives you the task of making an object that fits into a reader, that gives the right patterns for all the 100 ways... And that's Hard. So it may not even be necessary to randomize the laser positions, just check some number of standard patterns, and it will be too hard to make an item that can fake them all.
Thanks for listening to my train of thought. I think I get it now :)
Re:If each one was unique then.... (Score:2)
If each one was unique then they (being whoever would want to) could track you via the usage of your epoxy token.
You mean, in the same way they can track you by the unique *number* on your credit card already?
Re:How Big a Problem Is This with Credit Cards? (Score:3, Insightful)
Intelligence is only a small part of the equation. It is difficult to come up with a very simple solution to a problem that uses technology and manufacturing processes that are years away.
20 years ago, this thing would have had to be about the size of a brick, as beam density, laser accuracy, and manufacturing processes were not advanced enough to create something portable.
For other applications, the dream can drive technology. Weapons systems, space travel, and a utopian society are but a few things that can drive technology to create. A credit card that can't be copied is not a big enough dream to create technology, but it is big enough to take existing technology and innovate.
As for your second point, here's a thought.
The card currently would be useless to stop physical theft, right now. The scheme just relies on the frefraction of light to create patterns. Once you have the card, then Bam, you have the money.
But what if you could arrange these flakes into such a pattern that when light is passed through at a predetermined angle, it provides a composite of the card holder, which will appear on the POS terminal screen. Match the picture with the cardholder, then go ahead. The weakest link falls to the clerk.
-This idea has been released under the GPL. It may be freely distributed or modified under said terms.
Re:How Big a Problem Is This with Credit Cards? (Score:2)
The problem is that if it becomes that easy to produce, how hard would it be to reproduce? Putting your visage on the card, and then getting the background noise right, I would have to say damned difficult, especially if the lasers relied on bouncing through your picture.
What diffrence does it make? (Score:2)