Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Monday June 08 2020, @11:46AM   Printer-friendly
from the ubreakable? dept.

Patterned Optical Chips That Emit Chaotic Light Waves Keep Secrets Perfectly Safe:

The one-time pad has proven absolutely unbreakable. Its secrecy rests on a random, single-use private key that must be shared ahead of time between users. However, this key, which needs to be at least as long as the original message, remains difficult to produce randomly and to send securely.

Fratalocchi's team has developed an approach to implement this encryption technique in existing classical optical networks using patterned silicon chips. The researchers patterned the chips with fingerprints to obtain fully chaotic scatterers that cause mixed light waves to travel in a random fashion through these networks. Any modification, even infinitesimal, of the chips generates a scattering structure that is completely uncorrelated to and different from any previous one. Therefore, each user can permanently change these structures after each communication, preventing an attacker from replicating the chips and accessing the exchanged information.

Moreover, these scatterers are in thermodynamic equilibrium with their environment. Consequently, an ideal attacker with an unlimited technological power and abilities to control the communication channel and access the system before or after the communication cannot copy any part of the system without reproducing the surroundings of the chips at the time of the communication.

"Our new scheme is completely unbreakable regardless of the time or the resources available, today or tomorrow," Mazzone says.

Journal Reference: A. Di Falco, V. Mazzone, A. Cruz and A. Fratalocchi, Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips Nature Communications.
DOI: 10.1038/s41467-019-13740-y


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by The Mighty Buzzard on Monday June 08 2020, @03:24PM (1 child)

    True but if you're using said information as a OTP page, you're going to need multiple images to get a respectable sized key out of.

    --
    My rights don't end where your fear begins.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by JoeMerchant on Monday June 08 2020, @03:38PM

    by JoeMerchant (3937) on Monday June 08 2020, @03:38PM (#1004854)

    That's what they're working on - maximizing the survivable information.

    Out in the real world, the bottom 25% of a .png image is just about fair game as far as "hidden encoding" goes - most LCD monitors only show the 6 MSb of RGB information. If you're using the image as an OTP, you can use it all - and just put a tiny amount of meta-data in the hidden space (such low encoding density makes it virtually undetectable...) said metadata to include things like checksums to ensure that you've got the right image, pointers so you can find the next OTP image, etc.

    --
    🌻🌻 [google.com]