[21667] in cryptography@c2.net mail archive
webcam encryption beats quasar encryption
daemon@ATHENA.MIT.EDU (Heyman, Michael)
Thu Mar 30 09:07:56 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 30 Mar 2006 08:45:55 -0500
From: "Heyman, Michael" <Michael.Heyman@sparta.com>
To: <cryptography@metzdowd.com>
Internet webcam signals from webcams could emerge as an=20
exotic but effective new tool for securing terrestrial=20
communications against eavesdropping.
Scientists have come up with a method for encrypting=20
messages using the internet objects, which emit signals=20
and are thought to be powered by DC voltage.
Scientists at the National Institute of Cool Security=20
Ideas (NICSI) propose using the signals emitted by=20
webcams to lock and unlock digital communications in=20
a secure fashion.
=20
The researchers believe webcams could make an ideal=20
cryptographic tool because the signals they emit are=20
impossible to predict. "Webcam-based cryptography is=20
based on a physical fact that such a webcam signal=20
is random and has a very broad frequency spectrum."=20
NICSI scientists suggest using an agreed webcam signal=20
to add randomness to a stream cipher.
Each communicating party would only need to know which=20
webcam to monitor and when to start in order to encrypt=20
and decrypt a message. Without knowing the target webcam
and time an eavesdropper should be unable to decrypt=20
the message.
NICSI scientists believes voyeur-cryptography could=20
appeal to anyone who requires high-security communications.
He adds that the method does not require a large radio=20
antenna like quasar encryption because the signals exist=20
already on the internet. Plus quasar signals are really=20
boring compared to many webcam signals.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com