Encrypt A Message In the Big Bang Afterglow

A diagram of the Big Bang expansion according to NASA

If you’ve got a secret you need to keep safe, look toward the skies. Physicists have proposed using the afterglow of the big bang to make encryption keys.

The security of many encryption methods relies on generating large random numbers to act as keys to encrypt or decipher information. Computers can spawn these keys with certain algorithms, but they aren’t truly random, so another computer armed with the same algorithm could potentially duplicate the key. An alternative is to rely on physical randomness, like the thermal noise on a chip or the timing of a user’s keystrokes.

Now Jeffrey Lee and Gerald Cleaver at Baylor University in Waco, Texas, have taken that to the ultimate extreme by looking at the cosmic microwave background (CMB), the thermal radiation left over from the big bang.

Random strings
There are several ways to extract numbers from the CMB. For example, you could divide a patch of sky into pixels and measure the strength of the CMB’s radio signal, which is never duplicated exactly. Over time, each pixel would generate a string of different strengths, which are just numbers, so putting the strings from each pixel together gets you a very large random number.

“An adversary measuring the same patch of sky exactly the same way and at exactly the same time could not get exactly the same values,” says Lee. “A matching pattern of digits in a CMB measurement cannot be obtained by any other observer, thus adding yet another layer of difficulty in breaking the encryption.”

Mads Haahr of Trinity College Dublin in Ireland runs a website called random.org, which uses noise from weather to generate random numbers. He says the big issue with CMB encryption would be setting up the hardware. “It would be interesting to learn how much a suitable radio telescope costs, how much space it would require and whether a clear view of the sky is necessary,” he says.

Lee agrees that setting up a radio telescope array is not something individuals can do, and the CMB might not offer better encryption than the weather, but using the big bang as a random number generator has its own appeal.

“It brings together two fields of study that don’t often cross-pollinate – early universe cosmology and cryptography,” Lee says.

New Scientist

« The True Cost of Surveillance
Can Big Data Help Climate Change? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Obrela Security Industries

Obrela Security Industries

Obrela Security manage cyber exposure, risks and compliance. We identify, predict and prevent cyber threats in real time. As a service, personalised, on demand.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.