Totally Secure Non-Quantum Communications? 235
An anonymous reader writes "TEES is reporting that Dr Laszlo Kish, an associate professor at Texas A&M, has proposed a 'classical, not quantum, encryption scheme that relies on classical physical properties -- current and voltage. He said his scheme is absolutely secure, fast, robust, inexpensive and maintenance-free and relies on simultaneous encrypting of information by both the sender and the receiver.' The scheme uses properties similar to Johnson noise along with Kirchoff's Law to provide what he hopes to be an easier method of secure communications. Arxiv also has the full text [PDF Warning] of the paper."
A lesson for venture capital (Score:4, Funny)
Kish said that the dogma so far has been that only quantum communication can be absolutely secure and that about $1 billion is spent annually on quantum communication research.
I guess the quantum bubble is about to burst.
Re:A lesson for venture capital (Score:4, Informative)
Re:A lesson for venture capital (Score:3, Informative)
In Quantum Cryptography, traditional man-in-the-middle attacks are impossible due to Heisenberg's uncertainty principle. If Mallory attempts to intercept the stream of photons, he will inevitably alter them if he uses an incorrect detector. He cannot re-emit the photons to Bob correctly, which will introduce unacceptable levels of error into the communication.
If Alice and Bob are using an entangled photon system, then it is virtually impossible to
Re:A lesson for venture capital (Score:2)
Re:A lesson for venture capital (Score:3, Insightful)
Re:A lesson for venture capital (Score:3, Funny)
If I were paranoid, think I'd rather exchange CDs at a nondescript restaurant in Prague!
Re:A lesson for venture capital (Score:3, Informative)
Yes, but without overlay network. Quantum cryptography works only for directly connected hosts, so it is basically useless except in some very special scenarios. I think the only reason quantum crypto (and that should be properly 'quantum modulation' or the like) as well as quantum computation is so popular today is because it captivates peoples imagination. Since quantum crypto is really just key excahnge, you could allways replace it with pre-comottated random keys in the neighb
Re:A lesson for venture capital (Score:4, Informative)
People no longer understand p2p as "point to point", but rather "peer to peer". Point2Point cannot use significant IP addresses, but Peer2Peer must use them (or something similar).
Which means when Bob and Alice trade IP addresses,
I hope you meant "IP address" in some metaphorical way. There is no way QC can be applied to operate over an internet with real IP address. IP requires routing, and routing means packet-forwarding, but QC depends on an photonic signals that are irreproducible, and thus unroutable.
you ought to be able to have each other's IPs
Do you know the IPs of every mail-order vendor from which you might wish to order?
What you're doing is repeating the usual QC-request to have the initial exchange of recognition data left off of the vulnerability analysis, because it is in fact susceptible to every kind of man-in-the-middle assault.
Re:A lesson for venture capital (Score:3, Insightful)
It is like speech recognition, VR, kitchen helper robots,
It does not make a lot of sense technologically, but you can get grant money for it easily, because it matches what nonexperts think computing should be able to do for them. Stupid, but very human.
Re:A lesson for venture capital (Score:5, Funny)
Well, it both is and isn't.
Interesting.... (Score:4, Funny)
Re:Interesting.... (Score:2)
Re:Interesting.... (Score:5, Funny)
Re:Interesting.... (Score:2, Funny)
Re:Interesting.... (Score:2, Funny)
Re:Interesting.... (Score:2, Funny)
Re:Interesting.... (Score:4, Funny)
But you must admit it does have potential.
Credibility (Score:4, Insightful)
This is the first sentence from the article. I'm sorry, but I cannot take anything in that article seriously. On another note the guy has an interestingly hungarian sounding name.
Re:Credibility (Score:2)
Are you talking about pistol? I know it is probably the most effective technology against the weakest link in any security applications. Not sure about whether the Texas A&M guy can come up with something simpler
Re:Credibility (Score:2, Insightful)
Re:Credibility (Score:2, Insightful)
You're correct; the article was written by an employee of the communications department of the TAMU engineering program. The article was written for the "general public" audience. Also, the reporter him/herself is unlikely familiar with secure communication and quantum cryptography principles. The professor was interviewed by the reporter. He likely, either by choice or necessity, had to describe his paper in a context outside the
Re:Credibility (Score:2)
Then why don't you read the paper [opensubscriber.com], referred to from the article?
There probably are a hell lot of people like me out there; I personally have a lot of difficulties reading pure-technical texts... my mind gets distracted and I don't remember the things I read. When a text is written a bit more lively way, it helps me stay focussed on the article and everyone's happy...
Re:Credibility (Score:2)
TFA says:
The only way an eavesdropper can determine which resistance is being used at which end is to inject current into the communication channel and measure the voltage and current changes in different directions. Doing this, though, exposes the eavesdropper, who is discovered with the very first bit of information extracted.
But the circuit will get current induced in it from other sources anyway, adjacent phone lines, power lines, etc. How do the two ends of the link distinguish between accidental ind
Re:Credibility (Score:2)
Also, you can measure it at both ends of the line, and then from the phase of the changes deduce which side made which changes.
I thought I had heard a similar claim long ago about modem signals (at least, with newer modulations, not the ones with discrete tones for each direction) - the modem on each end can understand the other side only by subtracting out its own signal (which, of course, it knows) - an eavesdropper listening in wouldn't be able to separate them out.
Re:Credibility (Score:2)
Too much hype (Score:4, Insightful)
Haven't we heard this before?
Generally, if something sounds too good to be true, it usually is neither good nor true.
Implementation (Score:5, Insightful)
For example, he claims an eavesdropper could inject current to measure voltage drops, but would be discovered on the first attempt. If the eavesdropped can send a pulse of current that is so small as to not be registered on the endpoint equipment (which say samples the line at 1X sampling rate), but the attacker is injecting and sampling at a rate 100X faster, the attacker's pulse will be so far above the nyquist bandwidth of the endpoints that they will never see it.
I admit I only read the abstract, he may address this later on in the paper.
Voltage drop? (Score:2)
Re:Voltage drop? (Score:2, Insightful)
Re:Voltage drop? (Score:3, Informative)
The is more to a butt set than it being a corded phone with alligator clips. It ha
Re:Implementation (Score:2, Insightful)
Keep in mind that the energy from the attacker's pulse doesn't just go *poof* and disappear. It will be aliased to frequencies within the bandwidth of the endpoint(s) and might still be detected.
How this works and why it will fail (Score:4, Interesting)
What seems to be the flaw in this is that he assumes that the attacker must inject current unidirectionally to determine which resistance is at which end. Perhaps another means exists, courtesy of the speed of light.
Namely if you monitor the voltage at two points along the wire then you can distinguish between a wave proapgating from left to right and right to left. So you can now determine what fraction of the noise is coming from the left and what is coming from the right. Even if the noise level made his hard to do, there's also the moment of the resistor switch to capture. Each time the resistor is changed, even if it were perfectly synchronous, the left side's noise will reach the left tap sooner he the right tap.
This last effect could possibly be masked by injecting large amounts of noise into the system during the switch. (but of course this would also mask any current injection by the attacker as well). But the former effect of the noise signals propagation might still be detectable.
Re:How this works and why it will fail (Score:2)
Say each side has a free running RNG producing 1 bit per clock. So either side might be 0 or 1 on any given clock.
The properties of Kirchoff's laws make for an easy way for the transmission bus to sum the endpoint values, such that only the sum is shown to an eavesdropper.
So the bus can have 3 values, 0, 1 or 2. If it's 0 or 2 it's easy to tell what state the endpoints are in, but if it's 1, the endpoints are at opposite states.
That's the crux of this, when the bu
Re:How this works and why it will fail (Score:2)
Re:How this works and why it will fail (Score:3, Interesting)
How sensationalist ... absolutely secure, haha! (Score:2, Insightful)
Oh, the sensationalism!
Re:How sensationalist ... absolutely secure, haha! (Score:2, Insightful)
Re:How sensationalist ... absolutely secure, haha! (Score:2)
Pinch of NaCl (Score:2, Insightful)
The only way an eavesdropper can determine which resistance is being used at which end is to inject current into the communication channel and measure the voltage and current changes in different directions. Doing this, though, exposes the eavesdropper, who is discovered with the very first bit of information extracted.
But what if the eavesdropper was present from the very beginning, how will they be
Re:Pinch of NaCl (Score:2)
Since WHEN has that ever stopped anyone from posting on slashdot?
Re:Pinch of NaCl (Score:2, Insightful)
Ah. So if the sender and receiver and receiver already have a reliable method of communication, they can use that to prevent eavesdropping on this new channel.
Now, how do they get this reliable method of communication to check current measurements with each other, that is
Re:Pinch of NaCl (Score:2)
The same complaint can apply to Quantum Cryptography, and although it does mean MIM attacks are not completely impossible, that objection can be overcome in practice.
Most people have available a method which they believe to be reliable and non-intersectible: hand-carried briefcase with armed guards. Problem is, it's slow, and can't respond fast enough i
Sounds like Snake Oil... (Score:3, Informative)
In related news, perpetual motion device perfected (Score:2)
There is no such thing as a perpetual motion machine, an honest politician, or perfect encryption. All three exist in theory, but never in reality.
It may be that this new scheme does represent a method of encryptions that is on-par with the best existing methods, or perhaps
Re:In related news, perpetual motion device perfec (Score:3, Informative)
Well, let's see. The perpetual motion machine doesn't exist, in theory, because the laws of thermodynamics and whatnot essentially rule it out. Of course, it may exist in somebody's theory, but their theory would be at odds with actual, working theories that correspond with reality.
You're closer to the mark when it comes to the honest politicians. I think t
Re:In related news, perpetual motion device perfec (Score:2)
Nope! Read the article you linked to. Carnot's theorm indicates that no engine operating between to heat resevoirs can be more efficient than his... but that doesn't mean there's no loss in the system. On the face of it, such a thing would require no gravity present, no friction in the system, literally perfect heat trapping, etc. The theories are that those things are impossible, and so with the Carnot engine, we're talking ab
Just in: Moon orbits Earth for 4 billion years (Score:2)
quantum recording (Score:2)
How about recording the signal after it has been transmitted through some output at the other end? This bugging would not interfere with the signal being transmitted but would still record the information for transmittal later? If you are transmitting the information through a computer, I think s
Very interesting but what about tolerance? (Score:2, Informative)
Why must non-cryptographers be so dumb? (Score:3, Insightful)
There's so much wrong with this, I don't know where to start.
First, Cryptography is hard. Even professional cryptographers with decades of experience still get it wrong -- often. Considering as this guy has essentially no previous experience (he's an EE professor), it's already near certain that he's dead wrong.
Second, he doesn't provide "absolutely secure" communications. He provides non-interceptable communications. He's totally ignoring authentication, non-repudiation, man-in-the-middle attacks, and half a dozen other very important problems. (It's also not a cipher, but we'll ignore that slip.)
He also assumes (from the abstract) that an eavesdropper can only eavesdrop by injecting current into the wire, which is blatantly false. One could easily tap the magnetic field generated by current in the wire, without drawing very much power from the wire at all.
And to top it all off, he's depending on the precise values of voltage and current, which means this is an analog system. Analog systems are notoriously difficult to build precisely -- which is why we're using digital everywhere.
This is such bad research that I can't wait until Bruce Schneier [schneier.com] get ahold of this.
Re:Why must non-cryptographers be so dumb? (Score:2, Interesting)
It is. On the other hand, since crytography has nothing to do with the problem he's working on, this is an irrelevant observation.
He's totally ignoring authentication, non-repudiation, man-in-the-middle attacks, and half a dozen other very important problems.
Yup. He's also ignoring global warming, terrorism in Israel, and numerous other very real problems that are nevertheless irrelevant to the problem at hand. You appear to have misunderstood what problem he's attempting
Re:Why must non-cryptographers be so dumb? (Score:2)
Nothing? What about the fact that the mass-media is describing his project as "an encryption scheme"?
True, what he's doing isn't technically encryption. But since false claims to the contrary have been made, then cryptography has become relevant, if only to debunk.
Note that it isn't Dr. Kish's fault that the word "encryption" has been wrongly invoked- blame goes to whoever coined the "quantum encryption" misnomer.
I dunno--why are you? (Score:3, Insightful)
He is doing cryptography in the quantum cryptography sense--a secure, non-interceptable channel--not in the algorithmic cryptography sense. He is well-qualified to talk about the kinds of systems he is talking about.
Second, he doesn't provide "absolutely secu
Re:I dunno--why are you? (Score:2)
Schneier does not have to be an expert on electronics, if he can show he can recover the message.
I'm a CS student/TA/Network administrator (so I'm no electronics expert) but my solution would be very simple (a man in the middle attack):
1)Buy two of these encryption boxes
2)Cut wire (wait until the devices are off or not monitored if necessary)
3)Put a device on each end of the cut wire.
4)Listen from one side, eave
Re:Why must non-cryptographers be so dumb? (Score:3, Interesting)
It is a bit like QC (Score:2)
Dr. Laszlo Kish's scheme seems to be about having the receiver introducing a random stream which makes it har
Re:Why must non-cryptographers be so dumb? (Score:2)
Someone explain please (Score:2, Insightful)
FTFA: The way the eavesdropper gets discovered is that both the sender and the receiver are continuously measuring the current and comparing the data," Kish said. "If the current values are different at the two sides, that means that the eavesdropper has broken the code of a single bit. Thus the communication has to be terminated immediately."
And it also assumes that measureing equipments themselves are calibera
Re:Its a one time pad (Score:2)
Most electrical noise generators rely on chaotic physical events, like the noise in a Zenner diode. Even if you build two completely identical nois generator circuits, their outputs will never be the same.
"Security by Obscurity" (Score:3, Insightful)
Of course, the attacker may be the receiver, in which case she KNOWS the value at one end. And that is the trivial breaking case.
Ratboy.
Re:"Security by Obscurity" (Score:2)
Re:"Security by Obscurity" (Score:2)
If you have a 1024 bit key, an attacker has a 1/(2^1024) chance to find your key in 1 guess. Its 1 pidgeonhole in a really large matrix.
How is that much different than lining up a crazy amount of "If you do this when this is this at this" variables that roughly equal to the domain of chance of 2^1024?
For example, say I have a small Linux device that I compiled for root only (wifi mesh point). I dont want others to easily find this device, so first I turn it into a brouter and only certain IP
Re:"Security by Obscurity" (Score:2)
"In cryptography and computer security, security through obscurity (sometimes security by obscurity) is to some a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to ensure security. A system relying on security t
Re:"Security by Obscurity" (Score:2)
I understand what is traditionally means, but what difference does it make if it's 1 doormat or 10^10 of them? You're still relying on secrecy and obfusication to get people who you want to have permission to get it, and keep out all others.
Re:"Security by Obscurity" (Score:2)
Then what are you going on about? Your changing the meaning of the expression simply serves to make it useless for communication, nothing more.
Re:"Security by Obscurity" (Score:2)
A thing about security (Score:2, Troll)
The best you can hope for is being a few steps ahead of the people who want to take advantage of your provide data. This is not to say that working on security improvements is worthless, rather that you will always have to work on better t
Re:A thing about security (Score:2)
Every time I listen to my wife talk to one of her friends I'm reminded of just how true this is.
Re:A thing about security (Score:2)
Good luck trying to break one time pad. Even 300 years from now. You'll also need god luck while trying to break RSA with a big enogh key if we don't make a quantum computer. Oh, I almost forgot, good luck trying to break the current used symetric criptography systems, even 30 yeas from now.
The brest seurity is not the one done with the newest technology. The best security is the one with the toghest weak link. But if you are only taking the technology into account, the best security is the one done with t
Re:A thing about security (Score:2)
Damned right. Those hook-and-eye bras have been around forever, and I'll be damned if I can break into those easily.
Re:A thing about security (Score:2)
Even so, you'll have better luck if you understand how it works. Then you'll know to send the ninjas to break into the right cabinet and photograph the pages of random numbers for later use. Historically, OTP has been broken, when the pads were created with a biased RNG.
Everything is breakable, and knowledge allows you to hurt anything more effectively.
Re:A thing about security (Score:2, Insightful)
The best cryptographic and digital security is one that is very public, that has had many hundreds of people pounding on it for years trying to find flaws.
A secret system is likely to be broken as soon as someone more skillful than the designers learns of its existance.
"Absolutely secure" makes security folk laugh (Score:2)
I just stop reading at this point. Perhaps saying that it is "thought to be secure at the current state of knowledge", but if there's one thing we should have learned already, it's that nothing is absolute.
Technical discussion (Score:2, Insightful)
Suppose Eve inserts a resistor in the transmission line. Now she can measure two voltages instead of one, and I'm pretty sure the difference in standard deviation will reveal the choice of resistors at each end of the line.
If Eve fears that her resistor might be detected, she can use the intrinsic resistance of the wire instead. Unless we assume superconducting transmission lines...
Nice try, though. This is probably related to the issue of determining who is talking when eavesdropping on a two-wire tele
I can break that! (Score:2)
A classical counterpart of quantum criptography... How could anyone imagine researching such a thing?
Of course, the process is so weak that I can alread imagine a way of breaking it: One could insert low intensity pseudo-random noise (that mixes with the termal noise) and measure the current. He'll be able to get near half the bits this way.
The author is also a bit naive, assuming that the resistence changes will be imediate. Since that is impossible, one can insert some current into the system during the
Re:I can break that! (Score:3, Funny)
I read your post. His PhD is solidstate physics makes him more than qualified to talk about this sort of thing. You on the other hand are NOT. You don't even know what cryptography means OR how to spell it. This has nothing to do with cyphers and everything to do with setting up a physically secure
It's not encryption. (Score:2)
something to wonder about (Score:3, Informative)
There is also the slight problem of the common clock which must be available at each end. Somehow both sides need to be synchronised which implies either quite expensive atomic clocks or a side channel containing the information. Either limits the practibility of the idea.
Problems (Score:4, Informative)
As I mentioned, this is 100% secure, and any reasonably well-written book on cryptography will confirm that. To be 100% secure, however, the keystream must be as large as the data being encrypted, and must be absolutely random -- any degree of predictability can lead to breakage (e.g. search for "Venona").
The biggest shortcoming of a one-time pad is the key: first you have to generate an absolutely random key, and then you have to distribute that key to the people at both ends of the communication securely. The usual problem is that if you can communicate that key reliably, then you could normally communicate the data reliably just as easily. As such, a one-time pad is typically only useful in fairly limited situations like a spy receiving a DVD-ROM full of key material during a f2f visit, then using the key out in the field. For more typical scenarios it's rarely useful though.
This scheme seems to cure one, but definitely not both of those problems. It's basically a way of using two one-time pads simultaneously, so that the receiver can deduce the sender's key at any point, but what is transmitted over the wire basically depends on both his own key and his partner's key (not exactly an XOR, but a bit like it). If all the attacker does is collect the voltages on the line, I wouldn't be too surprised if this really is secure.
That doesn't mean there aren't any shortcomings though. One obvious problem is that both ends still have to generate absolutely, 100% random keys. Another problem is a man in the middle attack. If the pattern of resistor changes can be predicted, then the attacker only has to find the value once at one end to break all subsequent communications over the channel. Since the scheme doesn't (at least by itself) provide any kind of confirmation of who's on the other end of a line, a man in the middle has a pretty easy time with things.
Another approach would be to tap into the line at two points, preferably widely separated. Since the current only travels over the wire at (about) 2/3rds the speed of light, when one end changes a resistor, the change in voltage/current will be detectable first closer to that end, and some time later at the other end. Two widely separated measurments would allow an attacker to figure out which end changed resistors at any given time. Ultimately, the degree of separation does't even have to be particularly huge -- larger separation just reduces the precision of timing necessary, but even one foot apart gives about a nanosecond.
Re:Problems (Score:2)
But you're right. Man in the middle would work like a charm, and that propagation method might work too (not my area of expertise).
Re:Problems (Score:2, Interesting)
It does have similarity in that it combines the knowledge of what random choices the reciever made along with the resulting line condition, but the end result is the construction of a OTP that is mirrored on both ends. (Literally mirrored, both ends will have an inverse copy of each other, all the bits will be NOT'ed).
It's important to note that the actual payload data is not sent du
One-time pad (Score:2)
But the syncronization of the clocks initially has to be very precise. In fact, so precise that a lot of information has to be sent over to get it exact. It would be physically beautiful if it turns out that in order to get perfect synchronization you'd have to exchange enough information initially to make it a one-time pad. (and thus useless)
OTH, the method is not really an encryption scheme, so perhaps it would be surprising if the
As long as both parties are physically connected.. (Score:2)
It's already been invented (Score:2)
A similar principle was used about 50 years ago, although maybe using a different method. I've not seen the paper about this device (Bell project C43), but the Ellis Paper on non-secret encryption [cesg.gov.uk] (PDF, sorry) makes a brief description of the device in item 6.
Oh, if I were attacking that devic
Absolutely secure communication already exists (Score:3, Informative)
Re:Padlock by Via? (Score:2)
Re:Padlock by Via? (Score:2)
Apart from having used the word "encryption" in the description of both of them, they have about as much to do with each other as a shoe and a condom (both are pieces of "clothing").
Re:Padlock by Via? (Score:4, Funny)
In my case... they both cover a foot
Re:Padlock by Via? (Score:2)
See, theres as much a reason as any to not convert to the metric system. We would loose such excellent humor.
Re:Nationality (Score:2)
Re:Outdated and irrelevant (Score:5, Insightful)
Re:Outdated and irrelevant (Score:2)
"They can't stop the signal, Mal!" - Joss Whedon must be part geek.
Re:Outdated and irrelevant (Score:2, Insightful)
It won't obviously, but we are talking about a future with quantum based encryption, no time for dogma in science...
An alternate path to that future has been proposed. To dismiss it off-hand is what kept people in the Dark Ages.
Re:Outdated and irrelevant (Score:2)
"resistance" is futile"
Ok shoot me now
Re:So this is what I've been hearing on the CB (Score:2)
Re:Would this idea defeat the system? (Score:3, Insightful)
As for "several thousand combinations"... After the first 32 bits of information you have 4,294,967,296 possibilities, so I hope you are a good guesser.
Re:Would this idea defeat the system? (Score:4, Insightful)
Another way to see it: if the signal in your induction pickup were truly undetectable then we could wrap billions of similar induction pickups around the communications wire and generate electricity "too cheap to meter".
Re:Would this idea defeat the system? (Score:2)
-
Re:Communications expert or not ...? (Score:2)
Also there are numerous active network elements invo
Re:Communications expert or not ...? (Score:2)