W I R E D | Logic Lock Encryption Copy-Cats Surface?

LLE_Logov4.5V2

It has been just 15 days since the IIICTECH announcement of LLE on luvatfirstbyte. Details about Logic Lock Encryption, the latest in cryptographic methodology have started turning up in cryptic announcements around the web.

What is LLE? It’s a new direction for physics-based encryption theory. It’s the foundation of  a carefully crafted & elegant alternative to the vulnerable, flawed, dominant & archaic tools popular for nearly half a century. Ironically, root processes, key pieces of LLE’s functionality were not revealed & remain secure & closely guarded following cyber attacks on IIICTECH online.

The WIRED article outlines LLEs functionality minus key steps required to build more than a hypothetical product concept. The article quotes a collection of researchers so eager to postulate with little more than an inkling of when or what they are chasing while openly discussing the lack of research to build anything that will function.

Call it puppy-dog tech-talk… playful, clearly not leading, but following none the less. It’s oddly reminiscent of Google’s sudden on the scene & then gone quest to kill the password with vague statements about deciding a physical, mobile authentication solution was ultimately required for our safety. Google quickly ditched the idea following IIICTECH’s January 28, 2013 announcement of BLINK… a physical, mobile authentication solution intended to eliminate passwords in a safer, faster & seamless innovation.

“It’s a new level of security that solves the shortcomings of traditional quantum cryptography,” said Stefano Pironio, of the Université Libre de Bruxelles in Belgium. “It’s a huge achievement.”

One technique offers a potential security boost to quantum cryptography, which has been marketed commercially for more than a decade… offers “unconditionalsecurity, guaranteed by the laws of physics… it creates a quantum cryptography protocol… preventing any potential information leak.

Some version of this protocol could very well be implemented within the next five to 10 years, predicted Thomas Vidick, post-doctoral researcher at the Massachusetts Institute of Technology & his former adviser at MIT, theoretical computer scientist Scott Aaronson.

When it comes to transmitting secret information, the fact that measurement alters a quantum system becomes a boon, not a curse: An eavesdropper can’t listen in without leaving noticeable traces. The quantum cryptography protocols developed to date offer perfect security… In this new protocol, two devices at opposite ends of the transmission share a collection of EPR pairs, on which they perform measurements that determine the bits of a secret key. No matter what tools a potential eavesdropper has at her disposal, nothing will allow her to predict anything about the secret key.

A classical being isn’t permitted to peek inside and “see what is happening behind the scenes,” Vazirani said. “But it turns out that in this indirect way, you can look behind the curtain.

Vidick remains optimistic, however. “Equipment is getting better very quickly,” he said. “To me, what’s most exciting is that it is possible to do this at all,” he said. “It need not have been this way.” Strangely, these comments foreshadow impending conflict, competition and creative application of science, art & technology.

Advertisements
Standard

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s