{"id":25924,"date":"2014-09-13T00:43:25","date_gmt":"2014-09-13T04:43:25","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25924"},"modified":"2014-09-13T00:43:25","modified_gmt":"2014-09-13T04:43:25","slug":"how-to-get-next-level-cryptography-with-a-crappy-old-nokia-phone","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/how-to-get-next-level-cryptography-with-a-crappy-old-nokia-phone.php","title":{"rendered":"How to Get Next-Level Cryptography With a Crappy Old Nokia Phone"},"content":{"rendered":"<p><p>    Remember the     Nokia N9? Probably notbut geek points if you dobecause it    was a smartphone that was DOA and used by pretty much no one.    But even a three-year-old smartphone is pretty sophisticated    piece of machinery. Using just an N9 and light, physicists have    found a way to generate the random numbers algorithms used to    encrypt data.  <\/p>\n<p>    Modern cryptology algorithms rely on inputs of random    numbersif the numbers aren't truly random, the encryption get    easier to crack. And computers, which are exquisitely    good at following directions, are not good at being    random.  <\/p>\n<p>    One way to get random numbers is taking advantage of variations    in the world of quantum mechanics, which usually requires bulky    lab equipment. Light has inherent randomness. \"According    to quantum mechanics,\" writes William Herkewitz in Popular Mechanics, \"it's    impossible to predict exactly when an atom will emit a particle    of light. And over a given amount of time, the exact number of    light particles any light source will produce is also    inherently random.\"  <\/p>\n<p>    The Nokia N9 with its 8-megapixel camera is sensitive enough to    detect this quantum variation. Each pixel of the camera    detects a slightly different number of photons, a variation    that gets translated into a stream of random numbers. The proof    of concept suggests that equipment for quantum random    generation can be radically shrunk down.  <\/p>\n<p>    \"If everybody on earth used such a device    constantly at 1 Gbps,\" the authors write in    their paper,\" it would take    1060times the age of the universe for    one to notice a deviation from a perfectly random bit    string.\"  <\/p>\n<p>    A physicist not involved in the study told Popular    Mechanics that there's no way to verify the randomness    comes from quantum behavior rather than other physical    properties. But it does seem like viable way to generate random    (or very very very close to random) numbers with some pretty    unremarkable technology. [Popular Mechanics, ArXiv]  <\/p>\n<p>    Top image: Nokia  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gizmodo.com\/how-to-get-next-level-cryptography-with-a-crappy-old-no-1634116016\/RK=0\/RS=5UvGwOpQPx062a38twQRUqgtHS4-\" title=\"How to Get Next-Level Cryptography With a Crappy Old Nokia Phone\">How to Get Next-Level Cryptography With a Crappy Old Nokia Phone<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Remember the Nokia N9? Probably notbut geek points if you dobecause it was a smartphone that was DOA and used by pretty much no one. But even a three-year-old smartphone is pretty sophisticated piece of machinery<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25924","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25924"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25924"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25924\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}