Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Quasars Used for Encryption 53

space_mongoose writes "According to this NewScientistTech story, intergalactic radio signals from quasars could emerge as an exotic but effective new tool for securing terrestrial communications against eavesdropping"
This discussion has been archived. No new comments can be posted.

Quasars Used for Encryption

Comments Filter:
  • Quasars occur when galaxies collide (or at least that's the theory). Quasars we see now are billions of years old. Now, galaxies aren't really as close together anymore, so new quasars are extremely rare. Might not be many in the distant future with which to encrypt signals.

    Anybody think this seem odd? An early April fools perhaps?
    • Actually, the most recent theory I've read is that Quasars are simply galaxies where the central black hole is actively consuming gas and other material at the center of the galaxy, creating a hot, energetic mass around the black hole..

      They only appear as quasars to us when the galaxy is pointing in the right direction.
    • Re:Hmm (Score:3, Informative)

      by thePig ( 964303 )
      For one thing they are just using the data to create random numbers .. i.e. all.

      Logic being that, any random number we create is *not* random. i.e all.
      And most (all??) encryption (RSA onwards) is based on random numbers.

      Even if there is only one quasar the freq of the signal at any time would be very random indeed. Even if it is as created using known scientific functions, chaos theory predict that we wont be able to regenerate the same any time soon.

      For that matter, they could even use any of the natural p
      • An encrypted transmission path between two parties relies on the same random data being available to both parties at the same time, which means it is either precomputed and both parties have a copy with them, or (in this case) it is a stream of data that both parties have access to in real time.

        Not sure how well it would work if both parties were on opposite sides of the world though...

        • Re:Hmm (Score:3, Informative)

          by dmatos ( 232892 )
          From the article:

          Umeno believes astronomical cryptography could appeal to anyone who requires high-security communications. He adds that the method does not require a large radio antenna or that the communicating parties be located in the same hemisphere, as radio signals can be broadcast over the internet at high speed.

          Basically, he just wants to use the quasars as a source of true randomness, instead of /dev/random, which, although influenced by random events, is largely computed using pseudo-random proc
          • He would make more money building and selling little black boxes of randomness.
            Their signals can be sent across the internet in the same way.

            There are no lack of random signals available at all points in life, however communicating that randomness is the problem.

            I've always thought a brilliant random key would be taking a snapshot of a range of websites at a preselected time, that way 2 individuals anywhere could have their keys.
            For instance, use the article headers from slashdot.org and bbc.co.uk at 11pm G
  • so... (Score:3, Interesting)

    by gcnaddict ( 841664 ) on Wednesday March 29, 2006 @10:27PM (#15022955)
    We use really fast neutron stars which generate radio waves in order to encrypt our content?

    So if someone has a list of all quasars and their radio frequencies, can't they brute force the message and break it in, what, 20 seconds?
    • Re:so... (Score:2, Informative)

      by Anonymous Coward
      The idea is that its impossible to record all of the transmissions of a quasar to retroactively decrypt a previously seen message (because the quasar is emitting 10^9 or 10^12 random bits/sec)
    • Re:so... (Score:1, Informative)

      by Frozen Void ( 831218 )
      RTFAA they use them to extract random data(noise).Good for one-time pads.
      • Re:so... (Score:1, Redundant)

        by mboverload ( 657893 )
        This is such a stupid idea I can't even begin to express my shock.

        Yeah, lets get our onetime pad data from a source that anyone can record! I mean...jesus christ.

        • by lordcorusa ( 591938 ) on Wednesday March 29, 2006 @11:16PM (#15023226)
          All one time pads are recorded from random data. You record a long stream of truly random input, then make two copies of the recording. Tne sender gets one copy, the receiver gets the other. Starting at the beginning of the pad, the sender uses each bit of the pad exactly once, then discards it. When the sender runs out of bits, he can not send any more data. The receiver decrypts decrypts likewise, discarding each pad bit after it has been used once. As long as the sender and receiver start with the same pads and don't skip or reuse any bits, they stay in syncronization.

          Many perfectly good one time pads are drawn off of data "that anyone can record." For example, many pads are created from atmospheric noise. Anyone can record the same data, but unless you know exactly where and when the recording was done, it is computationally infeasible to record all possibilities, let alone brute force them.

          There are many, many quasars that we record in the sky. All of them give off constant streams of random data. So it would be computationally intractable to record all possibilities or brute force a particulr message, because the attacker would have to know exactly which quasar was recorded, and exactly which instant the recording began. He would also have to know exactly which bit of the pad the sender was on when the sender started sending the message that he intercepted. All theoretically possible, but computationally intractable.
          • the length of the "one time pad" is large, but the number of them available? I mean the number of quasars that are good enough receivable to use for this purpose. I have no idea, but I doubt if its more than 2^32. In that case, brute force would be quite easy: just try each of the available quasar signals.:

            Record the signal of each of them at time T, also record the encrypted message at time T, and try them all out in a fast computer. Then you'll know which one you need to use for the rest of the encypted s
            • by Raphael ( 18701 ) on Thursday March 30, 2006 @05:41AM (#15024859) Homepage Journal

              The length of the "one time pad" is large, but the number of them available? I mean the number of quasars that are good enough receivable to use for this purpose. I have no idea, but I doubt if its more than 2^32. In that case, brute force would be quite easy: just try each of the available quasar signals.:
              Record the signal of each of them at time T, also record the encrypted message at time T, and try them all out in a fast computer.
              [...]

              Well, you have a big problem with your time T. How do you know it? If you do not know the source (which quasar is used), it is also unlikely that you know the exact time T used for the start of the random stream. It is unlikely that you know it with a better precision than a few seconds. If the two parties do not exchange messages frequently or do not re-negociate the start of the random stream frequently, then you may not even know T with a precision of a day.

              The NewScientistTech article does not give details about the amount of data available from the quasars, but other articles mention that quasars are typically observed in relatively high frequencies (20-40 GHz). Even if the signal strength is sampled with a low resolution and only a few truly random bits are extracted from the stream, you would still have a stream of bits that is in the Gbps range. This is a reasonably large amount of random data.

              So even if the number of usable quasars is rather low (say, a few thousands: 2^10 instead of 2^32 as you mentioned), you would need a lot of antennas and petabytes of storage to record all these random streams. You would have to store something in the order of 2^40 bits per second for several seconds or even days (the uncertainty on T). This is not impossible if you have a large budget, but this is difficult and expensive.

              It could even be much worse than 2^40: a recent catalogue of quasars from March 2006 [obs-hp.fr] mentions 85221 of them, with new findings doubling this number every second year: 48921 in 2003 [obs-hp.fr], 23760 in 2001 [obs-hp.fr], etc. Let's say that 2^15 of them are usable (and that you have 2^15 antennas at your disposal). If the signal strength is sampled with a medium resolution of 8 bits at a frequency of 30GHz and your uncertainty interval on T is about one hour, you would need to store 2^15 * 2^3 * 2^35 * 2^12 = 2^65 bits of data before starting your brute force attack. Good luck!

              Once you have all this data, you still have to do the brute force attack. You wrote "just try each of the available quasar signals." This is correct but you ignore the fact that the random stream is unlikely to be used as is. It will probably be used to seed a stream cypher. In the simplest case, the random stream would be hashed a couple of times before being xor'ed with the data. You will need a huge amount of computing power to perform all these operations and try each of the available signals at each possible time offset.

              Note: it is unlikely that both parties can get the signal and be synchronized with a nanosecond or picosecond resolution. So they would probably negociate a time window (say, with a resolution of one second or so) and some kind of unique marker within that time window in order to know exactly when to start. If you are the attacker and you cannot know which source is used, you probably do not know the time window nor the marker. But even in the unlikely case that you would have a way to obtain one or both of these, you would still have the problem of storing the huge amount of data from all quasars until you know which part of it should be analyzed.

              So although a brute force attack based on recording all qasars is not impossible, it is not really easy. And anyway, my first reaction when I started reading this story was exactly like the comment mad

              • 30 Ghz = 30 billion times per second, 8 bits each time = 240*10^9 bps
                240,000,000,000 bps * 3600 = 864,000,000,000,000 bits of data
                That is over 2^49 possible starting points for one antenna, given an hour of uncertainty

                With 2^15 antennas you now have 2^64 possible starting points.

                This still doesn't take into account that if 2 people are sampling the same random data at the same frequency they need to pick the data at exactly the same time. One person's 30 Ghz sample could be offset from another person's 30 G

              •   Wow. Thanks for the explanation.

                  That there is a damned brilliant idea. I wonder if there are any easier to observe atronomical sources that would be just as good? Neutron stars, perhaps? (strip out the pulses and use the noise and pulse variations?)

                SB
          • ...than using the noise from your soundcard disconnected mic?
            It is just as random and does not require a radiotelescope the size of a small house...
            • ... I'd point a Geiger counter at some uranium.

              Radioactivity is about as random as you'll get in this universe, and it sure beats setting up a huge dish on the roof of the NSA building and pointing it at some quasar...

            • using the noise from your soundcard disconnected mic? It is just as random and does not require a radiotelescope the size of a small house...

              There are two problems:

              • It is not just as random. The electrical noise amplified by your soundcard may be influenced by what you are doing on your computer, for example.
              • It does not allow two parties located far away from each other to get the same signal at the same time (or almost the same time). The nice thing about quasars is that anyone on Earth or in spac
              • mhm (no, I did not read TFA), how is this more sure than a one time pad? You have to agree on the time window to use as pad, witch is conceptually identical to exchanging the pad itself.

                The only point is that the attacker need a telescope...
      • > RTFAA they use them to extract random data(noise).Good for one-time pads.

        No, not good for "onetime pads". Since BOTH parties have to get the exact same signal, it can not include random noise. If it does not include random noise, then anyone can record the quasars and see what fits.

        Even then, I'm sure using simple geometry and an ultra-precise laster rangefinder anyone could figure out where the dish is pointed.
        • Re:so... (Score:5, Informative)

          by B3ryllium ( 571199 ) on Wednesday March 29, 2006 @11:12PM (#15023204) Homepage
          The KGB used CBR (Cosmic Background Radiation) to produce reams and reams of codebooks/ciphers. They would create two copies, and dispatch one of the copies to the remote location for encryption, then keep one copy at Lubyanka Square.

          Obviously, if one side of the cipher was intercepted, then the communication would be suspect - but for most communication, it was the most secure available to them. I don't see this quasar issue as being much different than that.

          Now, if they were using quantum states to dynamically generate the ciphers in two seperate places at the same time, THAT would be something to behold.
        • Even then, I'm sure using simple geometry and an ultra-precise laster rangefinder anyone could figure out where the dish is pointed.

          Which dish? It'd be easy to set up an array of dishes, each following a different quasar. Second, exactly when does the recording start? Third, unless you intercept every single communication, you're not going to be in sync with the incription.

    • You're thinking of pulsars, I believe. Neutron stars that blip out a radio pulse with every rotation are pulsars.

      Quasars are currently believed to be massive black holes at the center of young galaxies which accelerate the incoming matter swirling to its doom up to relativistic speeds. The result is a broadband and powerful noise source.
  • This reminds me of a proposal I saw to use pulsars as a sort of "Interstellar GPS," making use of their signals to determine one's location. The description from Selenian Boondocks: [blogspot.com]

    The other [Microcosm proposal] that appeared even more interesting to me was the idea (which I'll dub X-ray Pulsar Positioning System [smad.com] or XPPS for short) of using naturally occuring signals from X-ray Pulsars to provide positioning and attitude data anywhere in the solar system, not just inside the orbit of existing GPS satellites
    • Depending on foreign stellar radio sources would be a bad idea in the event of an intergalactic war against the Frzznots, as they will immediately toggle the "private" switch on their XPS system, which they installed there in the first place.

      Don't blame me.
  • uh (Score:4, Insightful)

    by sentientbrendan ( 316150 ) on Thursday March 30, 2006 @12:33AM (#15023675)
    There doesn't seem to be anything special about a quasar here... essentially all they are saying is that large amounts of random data can be used for quick and easy one time pad encryption, which to my knowledge is unbreakable, although I am not particularly well versed in cryptography...

    For those that don't know, the idea behind a one time pad is that your key is random, and the same size as the data being sent. For example, if binary data is sent, simple xor encryption can be used as follows

    unencrypted data: 10110000
    pad data : 10111001

    xor the pad against the key and you get

    encrypted data : 00001001

    xor the same pad against the *encrypted* key again to get

    original data : 10110001
    tada

    One time pads have two major problems
    1. Both parties need the key.
    2. The key is large, thus cumbersome to carry around and likely to be discovered.

    Problem 2 can be solved, while losing some randomness, by using a popular book as the pad. Then you could just head down to the library and check out catcher in the rye, or whatever book you agreed upon beforehand, and begin decoding.

    I suppose that this could be used in conjunction with public key cryptography, so that public key cryptography is used to encrypt the coordinates of the quasar you want to use... but I really don't see why you need the quasar at all. Also, aren't there only 12,000 of them visible? If this technology became widespread and quasars were persistently used as sources of random data... someone with enough resources could just monitor them all and decrypt any data transmitted by checking it against all the data received from pulsars at that time.
    • One time pads (Score:5, Informative)

      by Beryllium Sphere(tm) ( 193358 ) on Thursday March 30, 2006 @03:11AM (#15024356) Journal
      They are indeed unbreakable, with a theoretical proof of unbreakability -- in the land of spherical horses [inflection-point.com], where you're allowed to make huge assumptions.

      One underappreciated assumption about one-time-pads is that the recipient will (and can!) destroy the keying material after use so thoroughly that the adversary can't reconstruct it. There are several other issues, of which key distribution is one of the easiest. Just put a 500GB external drive in the diplomatic bag once and you've covered communications for a long time.

      Here's the problem. The only things secret here are which quasar (13, 14 bits of uncertainty), when the sampling started (?? There won't be very many possible seconds that the adversary has to scan but sampling could start on a fraction of a second), and the sampling algorithm (but you have to assume in crypto that the adversary knows your algorithms). It's going to be easier to brute-force than a 6-word Diceware [diceware.com] passphrase unless atmospheric effects somehow make the quasar signal look different everywhere on earth.
      • Additionally, there may be filtering of the signal to select various frequency ranges, which would change the random sequence it produced (although may not matter if you could capture the whole signal anyway, but you'd need to know it to actually do the decryption)

        Anyway, once i've figured out all the parameters, all I need to do is send a box away from the origin of the quasar faster than the speed of light, so that it can effectively go back in time relative to the signal and capture it.

        I believe that thi
    • by Ckwop ( 707653 ) *

      which to my knowledge is unbreakable, although I am not particularly well versed in cryptography

      That's right, it is unbreakable - provided you never use the same key twice. And here's why:

      Any message is a series of bits which can be represented as a number. Any key of the same length is a series of bits that can be represented as a number. Therefore, we can define the following function that operates on the entire message at once:

      CipherText = PlainText XOR Key

      The first thing to notice about th

      • This is why lots of spys used to use one-time-pads.

        Believe it or not, there are still quite a few espionage-related radio transmissions - numbers stations [wikipedia.org] - in use today, particularly by Israel (Mossad), the UK (MI6), Cuba, and others. The transmissions consist of lists of numbers being read aloud (the process is usually automated today rather than read by an actual person), and it is assumed that the lists are messages encoded through the use of one-time pads. While the stations still exist and still tra
    • Re:uh (Score:2, Funny)

      by Threni ( 635302 )
      >unencrypted data: 10110000
      >pad data : 10111001
      >
      >xor the pad against the key and you get
      >
      >encrypted data : 00001001
      >
      >xor the same pad against the *encrypted* key again to get
      >
      >original data : 10110001

      The final step is to subtract 00000001 from the decrypted data...
    • by yarbo ( 626329 )
      books are terrible sources of random for a one time pad. All you have to do is drag around some common words like "the" and then you'll start to get the plaintext/ciphertext. IIRC, this approach is called crib dragging. With a little guesswork (which a professional is capable of), they can figure out the source book in no time.
  • Lava Lamps (Score:3, Interesting)

    by spiralscratch ( 634649 ) on Thursday March 30, 2006 @03:09AM (#15024348)
    What, lava lamps [wired.com] aren't good enough anymore?
  • Ladies and gentlemen, uh, we've just lost the picture, but what we've seen speaks for itself. The Corvair spacecraft has apparently been taken over- 'conquered' if you will- by a master race of giant space quasars. It's difficult to tell from this vantage point whether they will consume the captive Earthmen or merely enslave them. One thing is for certain: there is no stopping them; the quasars will soon be here. And I, for one, welcome our new electron overlords. I'd like to remind them as a trusted slas
  • by CrosbieFitch ( 694308 ) <crosbie@cyberspaceengineers.org> on Thursday March 30, 2006 @06:30AM (#15024977) Homepage
    If Quasars are correlated photon emitters, then perhaps they can be used for encryption in the same way as quantum entanglement is used already?

    All you have to do is ensure that both commnuicating parties sample ENOUGH of the particles arriving at earth, and presumably enough of them will be entangled such that any other observer would have a statistically observable effect on their communication, i.e. detectable as an interceptor.

    OK, that's sounds hopeless.

    How about if there was one day found to be a way of communicating via entanglement? Then perhaps quasars might well be great sources of entangled particles.

    Remember, science is not advanced by claims of "Impossible!", but by "I wonder if..."
  • So there is at least proof of alien life, look in the sky they abondoned their cryptograpic devices in space. (we call quasers)

    But what if they didn't left them, they could decrypt everything we send. Since they hold the master scramble key.

    ohno I smell an evil alien ufo story here..
  • by Illbay ( 700081 )
    Talk about new uses for old equipment [wikipedia.org].
  • If this were done (using quasar emissions as a random number source for encryption), what would prevent a third party from surreptitiously generating pseudonoise locally that would mask the quasar emissions? I.e.:

    Assume a spy Alice and her controller Bob are both based in the city Xerces, and are using quasar emission encryption [QEE] (I'm copyrighting that acronym-- you have a non-exlcusive license to use it in any way you want). If Xercians broadcast an apparently random stream that drowned out the quas

  • (Disclaimer: I have not rta)

    Isn't a problem with one time pads transmitting the large keys without raising suspicion? A smaller key can be embedded / transmitted without being detected (I realize this is security through obscurity which the purists will tear apart - but I'm sure its used more often then we realize). The smaller key could simply be the quasar and time to start recording the one time pad. Then both parties each have the key that is ultimately used to encrypt the message.

    Isn't this a little bi
  • intergalactic radio signals
    What? We've actually discovered radio signals from space? ..and I thought my 50k seti@home packets had just been a waste of time....

The use of money is all the advantage there is to having money. -- B. Franklin

Working...