Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published December 18, 2013 | Supplemental Material + Published + Submitted
Journal Article Open

Physical key-protected one-time pad

Abstract

We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm^3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture.

Additional Information

© 2013 Nature Publishing Group, a division of Macmillan Publishers Limited. This work is licensed under a Creative Commons Attribution 3.0 Unported license. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0. Received 23 September 2013; Accepted 2 December 2013; Published 18 December 2013. The authors thank Ying Min Wang for constructive discussions, as well as Mark Harfouche and Richard Chen for helpful manuscript feedback. R.H. acknowledges support in part by the National Defense Science and Engineering Graduate (NDSEG) Fellowship Program. B.J. is recipient of the Sir Henry Wellcome Fellowship by the Wellcome Trust. Author contributions: R.H., B.J. and I.V. and C.Y. conceived and developed the initial idea together. I.V. conceived the final protocol. R.H. designed the experiment, built the setup, and collected the data. R.H. and S.A. performed data and security analysis. All authors collectively wrote the manuscript.

Attached Files

Published - srep03543.pdf

Submitted - 1305.3886v2.pdf

Supplemental Material - srep03543-s1.pdf

Files

srep03543-s1.pdf
Files (8.0 MB)
Name Size Download all
md5:e19030c040d45d1a184815f9c4abba16
3.2 MB Preview Download
md5:47b5e721b8aa7fc7a27d7239fd8bf3d0
860.8 kB Preview Download
md5:2c8badb58e1c5ec0c5a49da49305a69e
4.0 MB Preview Download

Additional details

Created:
August 22, 2023
Modified:
October 25, 2023