Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»Cryptography Without Using Secret Keys – White Paint as an Unclonable Key
    Technology

    Cryptography Without Using Secret Keys – White Paint as an Unclonable Key

    By W.R. van der Veen, University of TwenteOctober 27, 2019No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit

    Cryptography Without Using Secret Keys
    Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: who will guarantee that the key doesn’t get stolen or hacked? Using a physical unclonable key (PUK) – which can be a stroke of white paint on a surface – and the quantum properties of light, researchers of the University of Twente and Eindhoven University of Technology present a new type of data security that does away with secret keys. They present their method in the journal Quantum Science & Technology.

    Information security, in online banking for example, often works with a combination of a public key and a private key. The public key is known to everyone, but for creating a digital signature, a private key is necessary. This is a cryptographic method that only works if private keys are kept secret. But are we certain that these keys can’t be intercepted, by negligence or by a computer hack?

    The alternative the researchers present in their paper, is a physical key that cannot be cloned, a PUK (Physical Unclonable Key). This can be a stroke of white paint that strongly scatters light because it consists of many nanoparticles. The result is a unique speckle pattern. Making a key with exactly the same scattering properties is impossible: no paint surface will be the same. The PUK’s properties can be publicly available, but only the owner of the key is capable of scattering the light in the right way.

    Quantum

    Using a complex spatial pattern, the sender transmits light pulses to the receiver’s key. These pulses consist of a small number of photons which are in a quantum state. By the laws of quantum physics, this quantum state will be disturbed as soon as it is measured. This means that, without having the PUK, no one will be capable of determining the quantum states of the photons. The key, however, will effortlessly translate the photonic signal into comprehensible information. Anyone can send light to the PUK, but only the PUK owner will be able to decrypt the light pattern to information that makes sense.

    In this way, a secret message can be sent without the need for storing secret keys. The receiver, in turn, can also indicate that he knows the information stored in the light pulses, and authenticate himself. So, using standard cryptography, signing a message is possible as well. The PUK is different from other hardware keys on the market, like the Yubikey or readers used by banks, which still use secret digital keys.

    The use of quantum physics makes it possible to develop cryptographic tricks that are unthinkable classically. The protocol is the latest in this development. Although the first quantum cryptographic tool date from the early eighties, this research shows that still essentially new applications are possible using quantum optics.

    Glass fiber

    Although the programming of light and the scattering is complicated, there is no need for exotic technology: the PUK is cheap, and creating the light patterns can be done using a light modulator that is part of a regular beamer. The technique now works over one meter of free space. An important future application the researchers now work on, is the secure transmission of data over a glass fiber.

    The research has been done at UT’s MESA+ Institute and Faculty of Science & Technology, together with colleagues of the Faculties of Computer Science and Electrical Engineering of Eindhoven University of Technology.

    Reference: “Asymmetric cryptography with physical unclonable keys” by Ravitej Uppu, Tom A W Wolterink, Sebastianus A Goorden, Bin Chen, Boris Škorić, Allard P Mosk and Pepijn W H Pinkse, 15 October 2019, Quantum Science and Technology.
    DOI: 10.1088/2058-9565/ab479f

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Cryptography Quantum Cryptography Quantum Mechanics University of Twente
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    A 56-Qubit Quantum Computer Just Did What No Supercomputer Can

    Discover the V-Score: The Secret Weapon in Quantum Problem Solving

    Revolutionary Quantum Compass Could Soon Make GPS-Free Navigation a Reality

    Just Three Atoms Thick – Scientists Have Developed the World’s Thinnest Lens

    Microscopic Marvel: A Photonic Device that Could Change Physics and Lasers Forever

    New Quantum Dot Technology Improves Solar Cell Efficiency

    Revolutionary Qubit Technology Paves Way for Practical Quantum Computer

    Space Age Security: How Satellites Could Extend Quantum Encryption Globally

    Practical Quantum Devices Now Closer to Reality – Scientists Unveil Room Temperature Photonic Chips

    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    Scientists Say This Natural Hormone Reverses Obesity by Targeting the Brain

    35-Million-Year-Old Mystery: Strange Arachnid Discovered Preserved in Amber

    Is AI Really Just a Tool? It Could Be Altering How You See Reality

    JWST Reveals a “Forbidden” Planet With a Baffling Composition

    The Protein “Sabotaging” Aging Muscle Recovery Could Be Key to Surviving Aging

    This Diet–Gut Interaction Could Transform Fat Into a Calorie-Burning Machine

    Scientists Discover Hidden Virus Linked to Colorectal Cancer

    Scientists Discover 132-Million-Year-Old Dinosaur Tracks on South Africa’s Coast

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • Beyond “Safe Levels”: Study Challenges What We Know About Pesticides and Cancer
    • Researchers Have Found a Dietary Compound That Increases Longevity
    • 5 Things Experts Say You’re Getting Wrong About Protein
    • Scientists Create “Optical Tornadoes” That Twist Light Into a Swirling Vortex
    • Scientists Uncover Hidden Superconductivity in Material Once Thought Only Magnetic
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.