Twisted light increases efficiency of quantum cryptography systems

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using "twisted light." This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light.

The new approach doubles the 1 bit per photon that is possible with current systems that rely on light polarization and could help increase the efficiency of quantum cryptography systems.

Quantum cryptography promises more secure communications. The first step in such systems is quantum key distribution (QKD), to ensure that both the sender and receiver - usually referred to as Alice and Bob - are communicating in such a way that only they know what is being sent. They are the only ones who hold the "key" to the messages, and the systems are set up in such a way that the presence of any eavesdropper would be identified.

In the paper, published in New Journal of Physics today, Mohammad Mirhosseini and his colleagues describe a proof-of-principle experiment that shows that using OAM to encode information rather than polarization opens up the possibility of high-dimensional QKD.

Mirhosseini, a Ph.D. student in Robert W. Boyd's group at the University of Rochester's Institute of Optics, explains that they were able to encode a seven dimensional "alphabet" - that is, seven letters or symbols - using both the orbital angular momentum (OAM) of the photons and their angular position (ANG).

These two properties of the photons form what physicists refer to as mutually unbiased bases, a requirement for QKD. Using mutually unbiased bases, the correct answer is revealed only if Alice encodes the information using a particular basis and Bob measures in that same basis.

In QKD, once they have generated a long, shared key, Alice and Bob publicly announce the basis (or "alphabet") they have used for each symbol in the key. They then compare what alphabet was used for sending and which one for receiving.

They only keep the part of the key in which they have used the same "alphabet." The letters they keep produce a secure key, which they can use to encrypt messages and transmit these with regular encryption without the need for quantum cryptography.

If for any reason their communication is intercepted, because of a fundamental property of quantum mechanics, there will be discrepancies between Alice and Bob's keys. To check for this, Alice and Bob sacrifice a short part of their key. They share this publicly and identify any discrepancies. This lets them know whether their connection is secure and, if not, they will stop the communication.

The researchers showed that using their system they were able to generate and detect information at a rate of 4kHz and with 93% accuracy. A long term goal of the research is to realize secure communications at GHz transmission rates, which is desirable for telecommunication applications.

View post:
Twisted light increases efficiency of quantum cryptography systems

TrueCrypt cryptographic audit turns up little to fear

TrueCrypt cryptographic audit turns up little to fear Share This Home News Apple TrueCrypt cryptographic audit turns up little to fear Most desktop cryptography relies on software created and maintained by corporations, often (not always) based on open standards, but requiring a level of trust in that firm's ability to resist government efforts to weaken it as well as believing they can validate and audit their own code well enough to find and then repair serious flaws.

Most desktop cryptography relies on software created and maintained by corporations, often (not always) based on open standards, but requiring a level of trust in that firm's ability to resist government efforts to weaken it as well as believing they can validate and audit their own code well enough to find and then repair serious flaws.

Open-source projects, whether in the world of free software or other license structures, supposedly had the advantage that anyone could examine the code for flaws or injections.

That's turned out not to be the case, but things are getting better.

Truly cryptic

TrueCrypt is open-source virtual and full-disk encryption software that remains the only viable multiplatform option one could recommend that wasn't tied to a company. The independent project was developed by anonymous programmers for a decade; they still aren't identified. It works in Windows XP and later, many flavors of Linux, and Mac OS X.

In 2013, the nonprofit Open Crypto Audit Project (OCAP) was founded and raised over $70,000 to perform a thorough independent audit of TrueCrypt's codebase. The first phase, related to the "bootloader" software that worked only in Windows for full-disk encryption (FDE), finished in April 2014, and found no back doors or "super critical" bugs. (TrueCrypt can't manage an OS X boot volume. Read more about FDE and OS X's FileVault 2 in a previous Private I column.)

Then, abruptly, the project shut down in May 2014 with the release of a new version (7.2) that could only decrypt virtual disks and real partitions and drives. The developers put a note at the top of a stripped-down webpage, "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." They also implied that the end of official Microsoft support for XP was part of the reason. Later versions of Windows can use Microsoft-supplied and third-party full-disk encryption.

Mac users can also create encrypted virtual disk images with Disk Utility and encrypt external volumes with a simple Control-click on a volume in the Finder. But these have two associated issues: first, they're not portable to other platforms; second, we rely on Apple's codebase, which isn't externally and independently audited. TrueCrypt brings portability, and because the code is available for inspection, the opportunity to confirm it's not hiding secrets.

This raised many questions, none of which have been answered. Did the team get tired of the work after a decade? Did they discover a flaw so severe they felt they couldn't fix it? Did a government (one or more) discover their identities and pressure them to install weaker encryption or a backdoor? It's simply unknown, and none of my security sources have any strong inclination as to the reason.

More:
TrueCrypt cryptographic audit turns up little to fear

Stanford crypto expert Dan Boneh wins $175K computer science award

Stanford University computer science professor Dan Boneh has been named as the recipient of the 2014 ACM-Infosys Foundation Award in Computing Sciences for his work in cryptography.

Bob Brown (Network World) on 31 March, 2015 23:57

Stanford University computer science professor Dan Boneh has been named as the recipient of the 2014 ACM-Infosys Foundation Award in Computing Sciences for his work in cryptography.

The Association for Computing Machinery/Infosys Foundation award, which includes a $175,000 prize, recognizes relatively recent contributions by young scientists and systems developers. Boneh, who leads the applied cryptography group at Stanford, was born in 1969 in Israel.

MORE AWARDS:Database pioneer Stonebraker rocks $1M "Nobel Prize in Computing"| Whirlwind tour of technology's major awards, honors and prizes

The award citation formally acknowledges Boneh "For ground-breaking contributions to the development of pairing-based cryptography and its application in identity-based encryption."

Pairing-based cryptography has flourished over the past decade, making security mechanisms easier to use and roll out.

ACM President Alexander L. Wolf said in a statement, "Boneh's work on pairing functions and their application to identity-based encryption has revolutionized cryptography. He has added greatly to our understanding of important problems underlying modern cryptography systems. Boneh has produced new directions and given the field a fresh start."

Boneh's work has been formalized in such industry standards as IEEE P1363.3 and several IETF RFCs. The holder of nine patents, Boneh also co-founded Voltage Security to commercialize identity-based encryption. HP bought Voltage earlier this year for an undisclosed amount.

You can see and hear Boneh discuss computer security in the Stanford video below. And if you're really interested in his take on things, you can sign up for his online Coursera courses this year on computer security and cryptography.

Follow this link:
Stanford crypto expert Dan Boneh wins $175K computer science award