Saturday, May 10, 2014

Beyond Cryptography: Hiding Communications


Sometimes encrypting messages isn’t enough, and the very act of sending them must be hidden as well. Now physicists have discovered how to camouflage messages and guarantee that they remain hidden.

The world of cryptography has undergone a quiet revolution in recent years. That’s largely because of the advent of techniques that exploit the laws of quantum mechanics to send messages with perfect privacy. So-called quantum cryptography ensures that an eavesdropper cannot decode a message under guarantee by the laws of physics.

But sometimes perfect privacy isn’t enough. Sometimes the knowledge that a message has been sent is all that an adversary needs. So the question arises of how to hide a message so that an eavesdropper cannot tell whether it has been sent or not.

The discipline, known as steganography or covert communication, is as old as its cryptographic cousin but has received much less attention in recent years. But that changes today thanks to the work of Boulat Bash at the University of Massachusetts in Amherst and a few pals who have worked out how to camouflage messages in a way that is guaranteed mathematically.

And they’ve put their ideas into practice with a proof-of-principle demonstration. “We have built the first operational system that provides mathematically proven covert communication over a physical channel,” they say.

The technique is relatively straightforward, relying on a method of communication known as pulse position modulation. This divides each second (or other unit of time) into a number of time bands which each correspond to a symbol. Alice sends a message to Bob by transmitting pulses during bands that correspond to the required symbol, which Bob then looks up in the order he receives them.

There’s an important caveat, of course. This system requires the sender and receiver to agree on the band structure and the symbols they refer to. And this must be done in advance in secret.

This allows Alice and Bob to send encrypted messages (the length of which depend on the length of the information shared in advance).

The question is how to hide this information. And the answer is in plain view. Bash and co assume that the message is sent using photons and that the environment supplies a certain amount of noise against which their signal is camouflaged. For example, they assume that photon detectors are not perfect and so always produce a certain number of dark counts in which they register a photon without receiving one.

No comments: