Subscribe free to our newsletters via your
. Medical and Hospital News .




TECH SPACE
Quantum physics could make secure, single-use computer memories possible
by Staff Writers
Washington DC (SPX) Jan 20, 2014


The "one-shot" memory devices that recent NIST research might make possible can be envisioned as physical keys that can only be used a single time, a useful feature for computer security applications. Credit: Talbott/NIST.

Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer scientist Yi-Kai Liu has devised away to make a security device that has proved notoriously difficult to build-a "one-shot" memory unit, whose contents can be read only a single time.

The research, which Liu is presenting at this week's Innovations in Theoretical Computer Science conference,* shows in theory how the laws of quantum physics could allow for the construction of such memory devices. One-shot memories would have a wide range of possible applications such as protecting the transfer of large sums of money electronically.

A one-shot memory might contain two authorization codes: one that credits the recipient's bank account and one that credits the sender's bank account, in case the transfer is canceled. Crucially, the memory could only be read once, so only one of the codes can be retrieved, and hence, only one of the two actions can be performed-not both.

"When an adversary has physical control of a device-such as a stolen cell phone-software defenses alone aren't enough; we need to use tamper-resistant hardware to provide security," Liu says. "Moreover, to protect critical systems, we don't want to rely too much on complex defenses that might still get hacked. It's better if we can rely on fundamental laws of nature, which are unassailable."

Unfortunately, there is no fundamental solution to the problem of building tamper-resistant chips, at least not using classical physics alone. So scientists have tried involving quantum mechanics as well, because information that is encoded into a quantum system behaves differently from a classical system.

Liu is exploring one approach, which stores data using quantum bits, or "qubits," which use quantum properties such as magnetic spin to represent digital information. Using a technique called "conjugate coding, "two secret messages-such as separate authorization codes-can be encoded into the same string of qubits, so that a user can retrieve either one of the two messages. But as the qubits can only be read once, the user cannot retrieve both.

The risk in this approach stems from a more subtle quantum phenomenon: "entanglement," where two particles can affect each other even when separated by great distances. If an adversary is able to use entanglement, he can retrieve both messages at once, breaking the security of the scheme.

However, Liu has observed that in certain kinds of physical systems, it is very difficult to create and use entanglement, and shows in his paper that this obstacle turns out to be an advantage: Liu presents a mathematical proof that if an adversary is unable to use entanglement in his attack, that adversary will never be able to retrieve both messages from the qubits. Hence, if the right physical systems are used, the conjugate coding method is secure after all.

"It's fascinating how entanglement-and the lack thereof-is the key to making this work," Liu says.

"From a practical point of view, these quantum devices would be more expensive to fabricate, but they would provide a higher level of security. Right now, this is still basic research. But there's been a lot of progress in this area, so I'm optimistic that this will lead to useful technologies in the real world."

*Y-K Liu. "Building one-time memories from isolated qubits." Paper presented at the ITCS 20-14 Innovations in Theoretical Computer Science meeting, Princeton University, Jan. 11-14, 2014.

.


Related Links
National Institute of Standards and Technology (NIST)
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TECH SPACE
Potential Future Data Storage at Domain Boundaries
Julich, Germany (SPX) Jan 20, 2014
Storing more and more in an ever-smaller space - what sounds impossible is in fact just part of the daily routine in information technology, where for decades, increasing amounts of data have been successfully stored on media with ever higher densities. An international team, including researchers from Forschungszentrum Julich, has now discovered a physical phenomenon that could prove suitable f ... read more


TECH SPACE
UK charity expands Philippine anti-trafficking work

Tornadoes, flood, drought cost US billions in 2013

Funding Problems Threaten US Disaster Preparedness

Microalgae and aquatic plants can help to decrease radiopollution in the Fukushima area

TECH SPACE
20th Anniversary of Initial Operational Capability of the GPS Constellation

NGC Wins Contract For GPS-Challenged Navigation and Geo-Registration Solution

Northrop Grumman and Trex Enterprises to Introduce Celestial Navigation to Soldier Precision Targeting Laser Systems

GPS Traffic Maps for Leatherback Turtles Show Hotspots to Prevent Accidental Fishing Deaths

TECH SPACE
Discovery of quantum vibrations in 'microtubules' corroborates theory of consciousness

Study: Chimps can use gestures to achieve specific goals cooperatively

Primates: Now with only half the calories!

Ultrasound directed to the human brain can boost sensory performance

TECH SPACE
The symphony of life, revealed

Rare Amur leopard killed in China: Xinhua

The way to a chimpanzee's heart is through its stomach

World's largest animal genome belongs to locust

TECH SPACE
Typhoid Fever - A race against time

Shanghai reports two deaths in China bird flu outbreak

AIDS infections down by a third in S.Africa: UNAIDS

China reports new H7N9 bird flu death

TECH SPACE
China's Wen pleads innocence over hidden riches claim

'Hypocritical crackdown' on China corruption activists: Amnesty

China, Japan dumpling poisoner gets life: report

China starts relaxing one-child policy

TECH SPACE
French navy arrests pirates suspected of oil tanker attack

Mexican vigilantes accuse army of killing four

Gunmen kill two soldiers in troubled Mexican state

China smugglers dig tunnel into Hong Kong: media

TECH SPACE
China's 2013 growth matches its slowest rate since 1999

Angry S. Koreans flood banks after data leak

China central bank adds cash ahead of holiday

China 2013 growth flat at 7.7%: AFP survey




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement