Quantum cryptography in space (part I)
A brief introduction to the challenge of shrinking a typical laboratory setup for creating entangled pairs of photons for quantum cryptography into a package...
By: Centre for Quantum Technologies
Quantum cryptography in space (part I)
A brief introduction to the challenge of shrinking a typical laboratory setup for creating entangled pairs of photons for quantum cryptography into a package...
By: Centre for Quantum Technologies
Quantum cryptography for space (part 3)
There #39;s a limit to how far you can send entangled photons through optical fibres or the atmosphere without them getting lost or losing their quantumness. Put...
By: Centre for Quantum Technologies
Dec 17, 2014 by Lisa Zyga In the Kish key distribution (KKD) system, the two resistance values represent the states of an information bit. A cryptographic key is transmitted along the wire by randomly switching between the two resistance values, which can be detected by the sender and receiver via their thermal noise on the line. Since no net power flows through the line, the only way that an eavesdropper can measure the resistance values is by injecting current into the wire and measuring the voltage and current changes in each direction, but the extra current would be quickly noticed. Credit: Gunn, et al. 2014 Nature Scientific Reports
(Phys.org)How secure is completely secure? In the world of secure communication, a scheme may be completely secure until it's notthat is, until an attack is proposed that reveals a weak spot in the scheme. This is what's currently going on for Kish key distribution (KKD), which claims to derive total and unconditional security using classical rather than quantum techniques, thus avoiding the complexity and expense of quantum cryptographic schemes. But now a new paper has uncovered a vulnerability in KKD that enables an eavesdropper to correctly determine more than 99.9% of the transmitted bits. Fortunately, countermeasures may exist to protect against this attack and regain the system's security.
"The worthiness of a cryptographic scheme is measured by the number of papers that try to attack it," Derek Abbott, Professor at The University of Adelaide in Australia and coauthor of the new paper, told Phys.org. Abbott and coauthors Lachlan J. Gunn and Andrew Allison have published their paper in a recent issue of Nature's Scientific Reports.
By Abbott's measure, KKD has proven to be very appealing (as many people have tried to attack it) since it was first proposed in 2005. Notably, KKD has stood up to attacks from Amnon Yariv (2009 winner of the National Medal of Science) from Caltech, as well as Charles H. Bennett of IBM. Bennett co-developed the first ever quantum cryptography protocol in 1984 (he is the first "B" in the so-called BB84 protocol).
Security from thermal noise
In the 2005 paper that first introduced KKD, Laszlo B. Kish, Professor at Texas A&M University, described a system that promises unconditional security from the second law of thermodynamics. The scheme transmits a cryptographic key along a wire by randomly switching between two resistor values, which represent the states of an information bit, at the two ends of the line. The sender and receiver passively detect each other's resistance values via the thermal noise on the line. Each time the two parties determine each other's resistance values, they secretly share one bit of information.
Because the second law prohibits net power from flowing from one resistor to another when the system is at equilibrium, a potential eavesdropper cannot determine the resistance values. The only way an eavesdropper could intercept the bits is by injecting current into the wire and measuring the voltage and current changes in each direction to determine the resistance values, but the extra current would be quickly noticed.
The design of the KKD system relies on a thorough understanding of the physics of waves traveling through a transmission line. One debatable requirement for unconditional security in KKD is that transmission lines prohibit the propagation of waves that are below a certain frequency, v/(2L), where L is the transmission line length and v the signal propagation velocity. This restriction is claimed to arise from the fact that wave modes do not propagate below this frequency.
In the new paper, the researchers show in simulations and experiments that waves with frequencies below this critical value do actually propagate along the transmission line. The reason, they explain, is that at low frequencies a coaxial cable supports TEM (Transverse Electromagnetic) modes, which have no low frequency cutoff.
The researchers detected the existence of propagating TEM waves on a coaxial cable by constructing a directional wave measurement device, which they then used to successfully eavesdrop. They showed that, merely by measuring the TEM waves traveling along the transmission line, an eavesdropper can determine both resistor values, allowing them to correctly intercept more than 99.9% of the bits without being caught.
Continue reading here:
Attack on classical cryptography system raises security questions
Make Unlimited Profit on any e-currency or Cryptocurrency with computermoneymagic.com!!!
A recent review of a mini investment done by a new member of the Computer Money Magic Program!!!
By: Computer Money Magic
See more here:
Make Unlimited Profit on any e-currency or Cryptocurrency with computermoneymagic.com!!! - Video
Selling cryptocurrency to custumers
Selling cryptocurrency to custumers Como vender criptomonedas a clientes.
By: Mugentime
Read the original:
Selling cryptocurrency to custumers - Video
Bitcoin, the online cryptocurrency recently hailed as the most successful of its kind, has been valued as potentially the worst investment in 2014 by business site Quartz.
Bitcoins value has plummeted massively in the last 12 months, currently showing a bigger drop than the Greek stock exchange or the Argentine peso. According to the Guardian, one bitcoin is now worth less than half of what it was this time last year, having devalued by 52% since the start of 2014.
Even the Russian ruble which was declared the worst performing currency of 2014 and which has registered single day falls worse than those seen in Russias 1998 economic crisis, had outperformed Bitcoin as of Wednesday morning GMT.
Jim Urquhart/REUTERS Some of Bitcoin enthusiast Mike Caldwell's coins are pictured at his office in this photo illustration in Sandy, Utah, January 31, 2014.
Currently the rubles rate of devaluation in 2014 is 51%.
According to Andrew Davies, a Newsweek business writer, it isnt highly surprising the cryptocurrency has hit a rough patch as the novelty of bitcoin makes it highly sensitive to changes in the trading climate.
Right now people are feeling very worried and so are dumping holdings that they fear might fall sharply in value, Davies says.
Bitcoin is a prime candidate for this treatment because its value depends always on what I call the greater fool - i.e. someone who is willing to pay even more for it than you did in order to take it off your hands and give you a profit. Davies adds.
A surge in popularity of bitcoin trading over the first half of 2014 caused the value of the currency to skyrocket, hitting the highest ever rate of $900 per single coin and prompting the number of merchants trading in the currency who have made a billion dollars in revenue to increase from zero to 10 by the end of the year.
In the second half of 2014 however, the excitement surrounding bitcoin decreased and volatility in oil, equities, bonds, currencies and commodities has scared traders away from experimental currency such as bitcoin causing the value to drop to $334 per coin on Wednesday.
Read this article:
Bitcoin worse investment than the ruble in 2014
WORLD EXCLUSIVE
Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.
According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50years.
The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
Advertisement
The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
Drone strikes have been a key element of the Obama administration's attacks on Islamic extremist terrorist and insurgent groups in the Middle East and south Asia. Australia has directly supported these strikes through the electronic espionage operations of the US-Australian Joint Defence Facility at Pine Gap near Alice Springs in the Northern Territory.
The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements".
"Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."
View post:
Drone strikes counterproductive, says secret CIA report
Chelsea Manning Tortured Using Shamed CIA Techniques?
Was Chelsea Manning tortured using shamed CIA techniques? http://www.walesonline.co.uk/news/wales-news/wikileaks-whistblower-chelsea-manning-tortured-8283986 On the Bonus Show: Louis...
By: David Pakman Show
Follow this link:
Chelsea Manning Tortured Using Shamed CIA Techniques? - Video
This week marked the 27th birthday of Chelsea Manning, the U.S. military whistleblower who currently sits in prison for leaking material to Wikileaks. Here are some birthday wishes for her from people who have spent time in similar circumstances.
The Guardian ran a feature yesterday of birthday messages for Chelsea Manning from 14 celebrity supporters, from Michael Stipe to Slavoj Zizek to Saul Williams. Random as hell, but thoughtful nonetheless. A few messages came in too late for The Guardian's deadline, and they were passed on to us. They're worth reading.
From Terry Anderson, a journalist who was taken hostage by Hezbollah militants in 1985:
Dear Chelsea,
I am a retired AP journalist and Marine Vietnam veteran. I am often these days ashamed of my country when its leaders blatantly violate not just our constitution, but our ideals and principles. I am always proud of those who, feeling the same outrage, sacrifice themselves to fight back. You have shown yourself to be more of a hero than many others who claim to be serving America, and done so with dignity, knowing and accepting the consequences. One day, hopefully soon, our country will recognize that heroism. Meanwhile, stay strong in yourself. I was held for seven years by Shiite radicals in Lebanon. I know how soul-shattering imprisonment can be. I also know it is possible to survive it.
With respect, Terry Anderson
From Murat Kurnaz, a resident of Germany who was held by the U.S. at Guantanamo Bay for five years before being released in 2006:
"Whistle blowers, who make state-crimes public, are heroes and not criminals. Their courage should be honored. This is the only way to avoid future crimes committed by officials. Chelsea Manning should be pardoned immediately."
From Talib Kweli, rapper:
Read more from the original source:
Happy Birthday, Chelsea Manning
Edward Snowden "We #39;ve Seen U.N. Reports Say Mass Surveillance Is NOT Permissible!"
December 12, 2014 C-SPAN http://MOXNews.com.
By: CSPANJUNKIEd0tORG
Excerpt from:
Edward Snowden "We've Seen U.N. Reports Say Mass Surveillance Is NOT Permissible!" - Video