Simple Comm Technique Beats Quantum Crypto 164
Atario wrote us with a link to a New Scientist article about an innovative new way of encrypting communications. An engineer at Texas A&M may have a way to exploit the thermal properties of a wire to create a secure channel. The result could be an effectively impenetrable way of securing communications, possibly outperforming quantum cryptography keys. "In their device, both the sender Alice and the receiver Bob have an identical pair of resistors, one producing high resistance, the other low resistance. The higher the total resistance on the line, the greater the thermal noise. Both Alice and Bob randomly choose which resistor to use ... Half the time ... they will choose different [resistances], producing an intermediate level of thermal noise, and it is now that a message can be sent. If Bob turns on his high resistor, and records an intermediate level of noise, he instantly knows that Alice has chosen her low resistor, in essence sending a bit of information such as 1 or 0. Kish's cipher does this many times, sending a random series of 1s and 0s that can form the basis of an encryption key, the researchers say."
Cool. (Score:5, Interesting)
Well, they quote Bruce saying it's good. (Score:3, Informative)
Although I don't recall seeing anything about it on his website. Bruce knows a lot more than I do, but this
Re:Well, they quote Bruce saying it's good. (Score:5, Informative)
Eavesdropping on this wouldn't do any good. From an eavesdropper's point of view, there are three noise levels, two of which mean nothing and one of which means a bit has just been transferred from A to B or from B to A. An eavesdropper can't tell which direction the bit is going or what the value of the bit was.
Sure they can. (Score:2)
And I'm not seeing why there would be three noise levels on the wire. You'd start off with the plain wire. Then Eve's taps. Then Eve would see the wire characteristic change when Alice put her resistor on. So she'd know that information. Then she'd see it change again when Bob put his resistor on. So she'd have that information also.
All Alice and Bob would know is the state A
Re: (Score:3, Informative)
Noise endpoint 1 endpoint 2
High high high
Medium high low
Medium low
Re: (Score:2)
The two resistors with different values function as a voltage divider. What's the clever method to eliminate the ground reference from Mallet, so he doesn't determine the bit via measurement in the voltage domain?
Re: (Score:3, Interesting)
But how do they put in those resistors? With switches. Switches that inject charge onto the output wire when their state changes. Switches with their own resistance and temperature coefficient of resistance. And that is detectable.
Alas, real resistors cannot be perfectly matched; the real wire state table
Re: (Score:2)
We are talking about eavesdropping: passive observation of the wire without much affecting it. A man in the middle attack cuts the wire and injects chosen signals into both of the new ends.
Bob's switch has two positions. One position means "Bob is transmitting binary 1", while the other position means "Bob is transmitting binar
Re: (Score:3, Insightful)
Moderate +1... (Score:2)
Still, it's a nice piece of thinking.
Re: (Score:2)
Re:Well, they quote Bruce saying it's good. (Score:5, Informative)
That would be: http://www.schneier.com/crypto-gram-0512.html#15 [schneier.com]
Mod parent up! (Score:2)
And Bruce does note that it is vulnerable to a man in the middle attack.
MITM... (Score:5, Informative)
I read Schneier's page because I respect the guy, and I figured he'd know what he was talking about. It already seemed trivially vulnerable to a man-in-the-middle attack, but I wanted to see if I was the only one.
Looks like I'm right:
He actually details a few more problems:
But then, I guess it's the best we've got:
This is nothing new... (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It was on his blog [schneier.com] last December.
In any case, the system can be defeated using a directional coupler.
Re: (Score:2)
Re: (Score:2, Funny)
Does it work with wireless?
Re: (Score:2, Informative)
Re:Cool. (Score:5, Informative)
Hope that clears up any debate this would generate.
And I don't know about the rest of the community, but I read the original post and thought "yep, got it in one". Apparantly I understand these things a little better than most.
Re: (Score:2)
broken link (Score:5, Informative)
http://www.newscientist.com/channel/tech/mg194260
dupe? (Score:5, Informative)
Re: (Score:1)
Comment removed (Score:5, Funny)
Security through Lack of Reference? (Score:3, Insightful)
Could someone correct me if I'm wrong (which I think I am)?
Re: (Score:2)
It's a bitstream -- high/low resistance being one and zero -- and to get the message back you need to guess exactly the sequence of ones and zeros as Alice or Bob used.
If you guess the wrong sequence you don't get any indication that your guess was wrong -- you just get the wrong message. Similar idea to a one-time pad; if you use the wrong decryption key you can get any message at all with no indication that it wasn't the right message.
Re: (Score:1)
Quantum cryptography is vulnerable too (Score:2)
Re: (Score:3, Informative)
In both c
Re: (Score:3, Insightful)
Re: (Score:2)
I always thought the value of quantum cryptography was that the states were truly discrete and impossible to measure without at the same time changing them and making the intruding presence known. The scary part about quantum crypt
It only works on a direct connection (Score:2, Interesting)
Under the conditions stated above, cryptography isn't very important. The most i
Man in the middle (Score:2, Insightful)
TFA (someone said it was /.'ed) (Score:4, Informative)
Already Broken (Score:5, Informative)
Old news: Broken, rebutted, broken, rebutted again (Score:3, Informative)
Re:Old news: Broken, rebutted, broken, rebutted ag (Score:3, Insightful)
This technique is worse. Quantum cryptography** lets you know the extent to which your shared key has been decloaked, providing a rational basis for reusing chunks of the (expensive) one-time pad.
**A bad name. It really ought to be called quantum exposure detection.
Re:Old news: Broken, rebutted, broken, rebutted ag (Score:2)
This technique has no promise whatsoever.
Re: (Score:2)
[*] Given a truly random key which is kept secret and used only once.
crappy crappy method (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Speed of light? (Score:3, Informative)
This reminds me of another crypto method where the receiver adds noise to the line. The theory is that they know what the noise is, so they can remove it, but Eve can't get it because she doesn't know what the noise was. It falls down under the same attack because the signal is only propagated at the speed of light, not instantaneously.
MOD PARENT UP (Score:2)
Re: (Score:2)
Basically he specifies that the frequency one switches the resistors has to be kept below a certain limit and low pass filters used at each end to prevent attacks using injection of high frequency signals. He shows that below threshold frequencies, the eavesdropper gets statistically w
Digital communications (Score:1)
Alice and Bob should just get a room (Score:4, Funny)
Re: (Score:2)
Random noise. (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Is Schneier enough of an electrical engineer ? (Score:5, Interesting)
To me, this whole matter with his formulae of the noise of a resistor is just hocus pocus; as much as the math is correct. But any reasonable electrical engineer knows these
What Kish rather seems to propose, is the injection of noise into a link; noise at two levels, nevermind if they are derived from a resistor, short-circuited or not, or any other noise generator.
Over. What he then says is the following:
If Alice sends high noise level ('H'), Bob will send low ('L') noise level; and vice versa.
The man-in-the-middle will have tri-state noise: LL,LH/HL,HH. LL and HH are out. The assumption in that paper, hidden behind a lot of barrage, is: LH and HL will appear identical to the eaves-dropper. Alice. however, when sending L, can pass an information quantum (since Bob will switch to H, knowing Alice sends L); while Alice sending H, Bob will switch to L, knowing Alice sends H).
The theory of Kish is, that Eve will have no clue if she intercepts HL or LH. Which only works in theory.
Because any electrical engineer deserving his title will tell you that those sources won't produce noise of identical spectrum in the first place. Therefore, the spectra will change, giving you a sequence of jumps. The maximum you have to do is toggling
Much ado about nothing, me thinks
Re: (Score:3, Insightful)
Not even a need to auto-correlate. If you measure both the current and voltage in one point of the transmission line, you can figure out which way the signals are going. On top of that problem, I can't really see that method scale in the Gbps, while I can easily imagine the single-photon methods scaling that high.
Re: (Score:2)
Not unless Einstein was wrong.
Kish's system depends on Alice's actions having an effect on Bob. That effect is going to propagate---at most---at the speed of light.
The problem here is that Kish is an electrical engineer, rather than a physicist. As an engineer, he's used to throwing away unimportant details. The problem (which is a common problem among otherwise competent engineers who try to design cryptosystems) is that those "unimportant" details are exactly what an attacker is going to use to bre
Re: (Score:2)
As a EE, I call bullshit! ;-)
The problem is that his experience is narrow, which makes his abilities brittle. Cross-correlation of multiple receivers is the bread and butter of engineers designing CDMA receivers, passive sonars and radars, and phased-array systems. This cryptosystem is the kind of scheme that if you walked into a radar guy's lab and asked him for a solution, he would just point to a box without saying
What would this be good for? (Score:3, Interesting)
Are there ways to use these secure channels to build a real redundant network where traffic could be rerouted when lines fail? Or would the routers end up being the weak spot? Making it just as insecure as every other network?
Are there any other types of uses where those connections might be useful or are they no more theoretical toys?
Re:What would this be good for? (Score:4, Insightful)
Two offices, say, across town, that want to communicate very securely.
When would that possibly be a problem? That would basically require some strange situation with a totalitarian government that wants to disrupt communications between two end points, but apparently doesn't actually want to get access to the unencrypted information itself.
If it's just some rival company trying to disrupt service, a line crew goes out, fixes the line, and they're back up and running before they even want/need to change the encryption key.
And what would be the point, since you could just as easily cut the other communications lines (eg. OC3s), the power lines, etc., etc.
Re: (Score:3, Insightful)
The point is: When I disrupt your valuable crypto channel long enough you simply can't use it and have to fall back to other means of less secure means of communication which I then can intercept.
### And what would be the point, since y
Re: (Score:2)
Yeah, you said that the first time, and I responded: "a line crew goes out, fixes the line, and they're back up and running before they even want/need to change the encryption key."
No, they actually have to directly go fr
Re: (Score:2)
Re: (Score:2)
It's hard to prove that the physical medium wasn't quietly intercepted. Quantum is provably secure.
That also doesn't allow frequent key changes, and after a short while the quantum link should be less expensive than physically sending people across town.
Public-key isn't fast or in
Re: (Score:2)
Know who uses this? (Score:2)
I'm pretty sure this is how the cosmic microwave background radiation [wikipedia.org] is generated.
~kulakovich
Impenetrable == Unsinkable (Score:5, Insightful)
When I read this, I had a flash back to a Dr. Who episode.(paraphrasing)
Army General: Trust me doctor this place is impenetrable.
Doctor: The problem with impenetrable is that it sounds too much like unsinkable.
Army General: Well whats wrong with that?
Doctor: Ask the passengers of the Titanic.
I always get a little bit itchy whenever people start throwing superlatives around like unbreakable, impenetrable, etc. Nature, Human ingenuity, or Human stupidity all have a nasty habit of proving us wrong.
Obligatory (Score:2)
Re: (Score:2)
Not worth 2c of consideration (Score:2, Interesting)
[a] it takes an "educated eavesdropper" to even realise information is being sent when there seems to be just low-level noise on the line.
[b] If they do try to eavesdrop, they can only tell a message is being sent, not what it is, because it's impossible to tell whether Alice has a high or low resistor turned on, and whether the bit of information is a 1 or a 0.
[c] What's more, eavesdropping on the line will naturally alter the level of thermal noise, so Alice and Bob will know tha
Re: (Score:2)
Re: (Score:2)
one time pad (Score:2)
This looks interesting, great. But as long as we're in the "what is better than what" game, how is this any better than one-time pad?
If you're going to go to the work of putting down a single, dedicated wire with two fixed endpoints - it would seem a lot easier for Alice and Bob to just meet, generate 2 identical random pads (with current disks, 1TB is easy) an then Alice and Bob communicate securely until they meet next. Done.
Seriously, what keeps an attacker from just cutting the wire? Poof! no more ch
Beats quantum crypto... (Score:4, Funny)
I belive congrats are in order.
TLF
I just don't get it (Score:2)
Crypto, from my point of view, faces 2 main problems:
1) The safe transmission of the key
2) The computational power to encode/decode the message
Asymmetric cryptography solves the first problem, while with symmetric cryptography, the second problem is much smaller.
To "solve" both, we have things like what is used with HTTPS. You first use asymmetric to transmit a sy
Re: (Score:2)
Re: (Score:2)
What you pointed about HTTPS, lets call it "key reusability", is not really an issue. I'm not exactly sure about HTTPS, but many other symmetric/asymmetric situations I've studied you get the a new symmetric key negotiated from time to time. So your time to find out what that key is, and still be able to use it, is pretty short. Lets say 60 seconds, which is a pretty short time to break a 128 key.
So, you are pointing out we have a low speed (or high cost) fixed secure channel and,
Circuit switching (Score:2)
Intuition (Score:2)
I haven't yet seen a compelling argument why it won't work in all its simplicity, but I'm positive it's BS. My intuition seldomly fails when talking about matters I think I understand (...I Think...).
(Random rambling)
Eve has a probe in the line. It attaches to the line near Alice and Bob. It is effectively very big resistor and a small power source, which circulates small current through the wires and his own resistor. Now, Alice attac
Go read Cryptonomicon (Score:2)
vom? Oscilliscope? non-intrusive ammeter? (Score:2)
So I have a 50% chance of knowing a bit with absolute certainty, so you can only use the bits generated when the resisters are mismatched by knowing that I used High, so they used Low.
Now, if they are using DC it is infinitely easy to tell who used low and who used high by the amount of voltage drop.
If they are using
Dupe, Dupe, Dupe (Score:2)
Not only does this not add any new information to the 2005 /. article [slashdot.org], it also leaves out all the discussion that happened last time.
Specifically, some Slashdotters pointed out that, due to the speed of light, Eve can tap the line in two places at once and watch the "instant" change in the circuit propagate from sender to receiver. You don't even need a full man-in-the-middle to crack this.
Re: (Score:2)
Oh, and I should add that the new article rather misrepresents what Bruce Schneier said about the system when it last made the rounds. Bruce's point was that, although it's a clunky and horrible system, quantum crypto is slightly more clunky and horrible. Therefore, on the off chance that it happens to be secure — Bruce didn't say one way or another, since he doesn't know enough physics to analyze it — it might make a good substitute.
Re: (Score:2)
It sounds like Alice and Bob need to coordinate in advance when they will use their low and high resistors. In which case, they're using a one-time pad and already secure.
No. (rtfa?) It's very similar to quantum cryptography, just without the quantum.
When the bit is created, you have no info (Score:2)
Re: (Score:1)
http://www.susumu.co.jp/english/pdf/products-j01-
Re: (Score:1, Troll)
Re: (Score:1)
So how do you know who is using which resistor?
Re: (Score:2)
What you could do is randomize the resistance at each nonzero turn; this will allow you to mask any differences in the strength of your resistors (if Bob's resistor is a bit off and has 99.5% of Alice's, suddenly Eve can tell what data is going through). Alice and Bob can still tell if they're using baseline or non-baseline resistances and whether the other is, and they can tell whether the total resistance in the wire is greater than
PAIRS of resistors (Score:4, Insightful)
I read it the same way you did at first; it's poorly worded.
This sounds like it's someone trying to think outside the box, given a basic knowledge of quantum cryptography. "Well, what else sort of works like light polarization? What is there that, if intercepted, doesn't give the interceptor any more information than said polarization does in the case of quantum cryptography?"
Of course, one of the advantages of quantum is that you can Detect eavesdroppers, because if they listen to more than a few bits they flip more of your bits than probability would reasonably allow for. It isn't only about how much information the eavesdropper can obtain--it's about whether or not you'll realize they're there.
Re: (Score:2)
They don't need to be all that identitical. 10% is probably good enough.
Also, here you don't *need* to detect eavesdroppers -- listening to the channel doesn't actually tell you anything. (It is vulnerable to a man in the middle attack, though -- I can sit in the middle with a pair of resistors and establish a key with alice, and a different one with bob, and then intercept the message traffic on the data channel and decrypt / read / reencrypt.)
The circuit looks like this: alice connects one end of he
Re: (Score:2)
I would think that at the point a tap or splice or however else you planned to insert eve, that if only momentarily, the resistance of the line would be dramatically altered, and quite easily detectable.
That's assuming you could measure the resistance of Alice and Bob without affecting the resistance of the circuit, which I also
Re: (Score:2)
I imagine in practice you could make it difficult to tap by monitoring line resistance; however there's no theoretical basis that says Eve can't just be better at tapping than Alice and Bob are at detecting her.
Also note this isn't about line resistance -- it's about the resistors at the other end, which, incidentally, aren't being used very much like resistors. That is, they're not being used to convert between voltage and current in the normal fashion, they're being used as sources of noise with very s
Re: (Score:2)
No, there is nothing hidden in the noise. What A and B and anyone listening in can measure is whether there is a small amount of noise, a medium amount of noise, or a huge amount of noise. There is nothing hidden in the noise. But if there is a medium amount of noise, then all I know as someone listening in is that one side sent a 0 and the other side sent a 1. I don't know _which_ side sent the 0 and which one sent the 1. A and B who were sending the da
Noise isn't just noise... (Score:2)
Except that's not all anyone in the middle can measure. Noise isn't either on or off. When Bob switches his resistor, that causes noise. When Bob takes a measurement, that causes noise (after all, that's what they're depending on to detect Carol in the middle). As the temperature changes, the noise level changes. There's an enormous amount of information about the
Re: (Score:2)
Unfortunately, that says more about you than it says about this system.
Re: (Score:2)