Subscribe free to our newsletters via your
. Nuclear Energy News .




TECH SPACE
Quantum physics could make secure, single-use computer memories possible
by Staff Writers
Washington DC (SPX) Jan 20, 2014


The "one-shot" memory devices that recent NIST research might make possible can be envisioned as physical keys that can only be used a single time, a useful feature for computer security applications. Credit: Talbott/NIST.

Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer scientist Yi-Kai Liu has devised away to make a security device that has proved notoriously difficult to build-a "one-shot" memory unit, whose contents can be read only a single time.

The research, which Liu is presenting at this week's Innovations in Theoretical Computer Science conference,* shows in theory how the laws of quantum physics could allow for the construction of such memory devices. One-shot memories would have a wide range of possible applications such as protecting the transfer of large sums of money electronically.

A one-shot memory might contain two authorization codes: one that credits the recipient's bank account and one that credits the sender's bank account, in case the transfer is canceled. Crucially, the memory could only be read once, so only one of the codes can be retrieved, and hence, only one of the two actions can be performed-not both.

"When an adversary has physical control of a device-such as a stolen cell phone-software defenses alone aren't enough; we need to use tamper-resistant hardware to provide security," Liu says. "Moreover, to protect critical systems, we don't want to rely too much on complex defenses that might still get hacked. It's better if we can rely on fundamental laws of nature, which are unassailable."

Unfortunately, there is no fundamental solution to the problem of building tamper-resistant chips, at least not using classical physics alone. So scientists have tried involving quantum mechanics as well, because information that is encoded into a quantum system behaves differently from a classical system.

Liu is exploring one approach, which stores data using quantum bits, or "qubits," which use quantum properties such as magnetic spin to represent digital information. Using a technique called "conjugate coding, "two secret messages-such as separate authorization codes-can be encoded into the same string of qubits, so that a user can retrieve either one of the two messages. But as the qubits can only be read once, the user cannot retrieve both.

The risk in this approach stems from a more subtle quantum phenomenon: "entanglement," where two particles can affect each other even when separated by great distances. If an adversary is able to use entanglement, he can retrieve both messages at once, breaking the security of the scheme.

However, Liu has observed that in certain kinds of physical systems, it is very difficult to create and use entanglement, and shows in his paper that this obstacle turns out to be an advantage: Liu presents a mathematical proof that if an adversary is unable to use entanglement in his attack, that adversary will never be able to retrieve both messages from the qubits. Hence, if the right physical systems are used, the conjugate coding method is secure after all.

"It's fascinating how entanglement-and the lack thereof-is the key to making this work," Liu says.

"From a practical point of view, these quantum devices would be more expensive to fabricate, but they would provide a higher level of security. Right now, this is still basic research. But there's been a lot of progress in this area, so I'm optimistic that this will lead to useful technologies in the real world."

*Y-K Liu. "Building one-time memories from isolated qubits." Paper presented at the ITCS 20-14 Innovations in Theoretical Computer Science meeting, Princeton University, Jan. 11-14, 2014.

.


Related Links
National Institute of Standards and Technology (NIST)
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TECH SPACE
Potential Future Data Storage at Domain Boundaries
Julich, Germany (SPX) Jan 20, 2014
Storing more and more in an ever-smaller space - what sounds impossible is in fact just part of the daily routine in information technology, where for decades, increasing amounts of data have been successfully stored on media with ever higher densities. An international team, including researchers from Forschungszentrum Julich, has now discovered a physical phenomenon that could prove suitable f ... read more


TECH SPACE
Boeing Joins BIOjet Team To Develop Biofuel Supply Chain In UAE

Renewable chemical ready for biofuels scale-up

UAE's Etihad demonstrates flight with biofuel mix

Boeing Finds Significant Potential in "Green Diesel" as a Sustainable Jet Fuel

TECH SPACE
Solar-power device would use heat to enhance efficiency

DuPont Solamet Helps REC Increase Solar Panel Power Performance

MC Industrial to build Missouri's largest investor-owned Solar Energy Center

Solar Frontier To Build No.4 Solar Plant In Tohoku

TECH SPACE
Musselroe Wind Farm provides fresh energy for local economy

Maine offshore wind project appears on track for federal funding

No Evidence of Residential Property Impacts Near Wind Turbines

Blown away? US suspends wind power subsidies, for now

TECH SPACE
EU could cut emissions by 40 percent at moderate cost

The German energy turnaround - implications for Russia

Global warming's biggest offenders

Soaring electricity prices zap struggling Spaniards

TECH SPACE
Oil prices drop on China data

Shell to further scale down Australian operations?

Norway to build modern icebreaker for oil, gas exploration in Arctic by 2016

Energy storage in miniaturized capacitors may boost green energy technology

TECH SPACE
First planet found around solar twin in star cluster

NASA's Kepler Provides Insights on Enigmatic Planets

Powerful Planet Finder Turns Its Eye to the Sky

New kind of planet or failed star? Astrophysicists discover category-defying celestial object

TECH SPACE
Raytheon, L-3 demonstrate new ship protection system

Lockheed Martin Completes Critical Milestone to Upgrade US Navy's Electronic Warfare Defenses

China starts building second aircraft carrier

Vietnam takes delivery of its first 'black hole' sub

TECH SPACE
Mystery Mars rock reveals unexpected chemical composition

Mysterious stone 'rawled up' to Mars Rover Opportunity

Oppy Encounters A Surprise At Solander Point

Dutch researcher says Earth food plants able to grow on Mars




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement