Subscribe free to our newsletters via your
. Space Industry and Business News .




TECH SPACE
Quantum physics could make secure, single-use computer memories possible
by Staff Writers
Washington DC (SPX) Jan 20, 2014


The "one-shot" memory devices that recent NIST research might make possible can be envisioned as physical keys that can only be used a single time, a useful feature for computer security applications. Credit: Talbott/NIST.

Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer scientist Yi-Kai Liu has devised away to make a security device that has proved notoriously difficult to build-a "one-shot" memory unit, whose contents can be read only a single time.

The research, which Liu is presenting at this week's Innovations in Theoretical Computer Science conference,* shows in theory how the laws of quantum physics could allow for the construction of such memory devices. One-shot memories would have a wide range of possible applications such as protecting the transfer of large sums of money electronically.

A one-shot memory might contain two authorization codes: one that credits the recipient's bank account and one that credits the sender's bank account, in case the transfer is canceled. Crucially, the memory could only be read once, so only one of the codes can be retrieved, and hence, only one of the two actions can be performed-not both.

"When an adversary has physical control of a device-such as a stolen cell phone-software defenses alone aren't enough; we need to use tamper-resistant hardware to provide security," Liu says. "Moreover, to protect critical systems, we don't want to rely too much on complex defenses that might still get hacked. It's better if we can rely on fundamental laws of nature, which are unassailable."

Unfortunately, there is no fundamental solution to the problem of building tamper-resistant chips, at least not using classical physics alone. So scientists have tried involving quantum mechanics as well, because information that is encoded into a quantum system behaves differently from a classical system.

Liu is exploring one approach, which stores data using quantum bits, or "qubits," which use quantum properties such as magnetic spin to represent digital information. Using a technique called "conjugate coding, "two secret messages-such as separate authorization codes-can be encoded into the same string of qubits, so that a user can retrieve either one of the two messages. But as the qubits can only be read once, the user cannot retrieve both.

The risk in this approach stems from a more subtle quantum phenomenon: "entanglement," where two particles can affect each other even when separated by great distances. If an adversary is able to use entanglement, he can retrieve both messages at once, breaking the security of the scheme.

However, Liu has observed that in certain kinds of physical systems, it is very difficult to create and use entanglement, and shows in his paper that this obstacle turns out to be an advantage: Liu presents a mathematical proof that if an adversary is unable to use entanglement in his attack, that adversary will never be able to retrieve both messages from the qubits. Hence, if the right physical systems are used, the conjugate coding method is secure after all.

"It's fascinating how entanglement-and the lack thereof-is the key to making this work," Liu says.

"From a practical point of view, these quantum devices would be more expensive to fabricate, but they would provide a higher level of security. Right now, this is still basic research. But there's been a lot of progress in this area, so I'm optimistic that this will lead to useful technologies in the real world."

*Y-K Liu. "Building one-time memories from isolated qubits." Paper presented at the ITCS 20-14 Innovations in Theoretical Computer Science meeting, Princeton University, Jan. 11-14, 2014.

.


Related Links
National Institute of Standards and Technology (NIST)
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TECH SPACE
Potential Future Data Storage at Domain Boundaries
Julich, Germany (SPX) Jan 20, 2014
Storing more and more in an ever-smaller space - what sounds impossible is in fact just part of the daily routine in information technology, where for decades, increasing amounts of data have been successfully stored on media with ever higher densities. An international team, including researchers from Forschungszentrum Julich, has now discovered a physical phenomenon that could prove suitable f ... read more


TECH SPACE
CCNY Team Models Sudden Thickening of Complex Fluids

Potential Future Data Storage at Domain Boundaries

What makes superalloys super - hierarchical microstructure of a superalloy

Quantum physics could make secure, single-use computer memories possible

TECH SPACE
Boeing Transmits Protected Government Signal Through Military Satellite

Boeing Transmits Protected Government Signal Through Military Satellite

Fifth MUOS Completes Assembly, Enters System Test

Northrop Grumman Supports US Marine Corps Command, Control and Communications Facility for Tactical Air Operations

TECH SPACE
NASA Commercial Crew Partner SpaceX Tests Dragon Parachute System

NASA's Commercial Crew Partners Aim to Capitalize, Expand on 2013 Successes in 2014

Ariane Flight VA217; Ariane Flight VA216 and Soyuz Flight VS07

2014 set to be a very productive year for collaboration between Arianespace and Italy

TECH SPACE
20th Anniversary of Initial Operational Capability of the GPS Constellation

NGC Wins Contract For GPS-Challenged Navigation and Geo-Registration Solution

Northrop Grumman and Trex Enterprises to Introduce Celestial Navigation to Soldier Precision Targeting Laser Systems

GPS Traffic Maps for Leatherback Turtles Show Hotspots to Prevent Accidental Fishing Deaths

TECH SPACE
Boeing Starts Assembly of Final KC-46A Test Aircraft

Novel technology reveals aerodynamics of birds flying in a V-formation

Indonesia plane crashes after lightning strike, 4 dead

Indonesia closes in on Grumman F-5 Tiger replacement

TECH SPACE
2-proton bit controlled by a single copper atom

New Technique for Probing Subsurface Electronic Structure

Fastest organic transistor heralds new generation of see-through electronics

Intel to cut staff in face of stagnant earnings

TECH SPACE
China's pollution seen from space

Charles River Analytics Develops Satellite Image Processing System for NASA

Earth may be heaver than thought due to invisible belt of dark matter

More BARREL Balloons Take to the Skies

TECH SPACE
Loss of biodiversity limits toxin degradation

US consumers to blame for some air pollution from China

Waterfowl poisoning halved by lead shot prohibition

Dangerous pollution hits China's capital




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement