Encrypt A Message In the Big Bang Afterglow

A diagram of the Big Bang expansion according to NASA

If you’ve got a secret you need to keep safe, look toward the skies. Physicists have proposed using the afterglow of the big bang to make encryption keys.

The security of many encryption methods relies on generating large random numbers to act as keys to encrypt or decipher information. Computers can spawn these keys with certain algorithms, but they aren’t truly random, so another computer armed with the same algorithm could potentially duplicate the key. An alternative is to rely on physical randomness, like the thermal noise on a chip or the timing of a user’s keystrokes.

Now Jeffrey Lee and Gerald Cleaver at Baylor University in Waco, Texas, have taken that to the ultimate extreme by looking at the cosmic microwave background (CMB), the thermal radiation left over from the big bang.

Random strings
There are several ways to extract numbers from the CMB. For example, you could divide a patch of sky into pixels and measure the strength of the CMB’s radio signal, which is never duplicated exactly. Over time, each pixel would generate a string of different strengths, which are just numbers, so putting the strings from each pixel together gets you a very large random number.

“An adversary measuring the same patch of sky exactly the same way and at exactly the same time could not get exactly the same values,” says Lee. “A matching pattern of digits in a CMB measurement cannot be obtained by any other observer, thus adding yet another layer of difficulty in breaking the encryption.”

Mads Haahr of Trinity College Dublin in Ireland runs a website called random.org, which uses noise from weather to generate random numbers. He says the big issue with CMB encryption would be setting up the hardware. “It would be interesting to learn how much a suitable radio telescope costs, how much space it would require and whether a clear view of the sky is necessary,” he says.

Lee agrees that setting up a radio telescope array is not something individuals can do, and the CMB might not offer better encryption than the weather, but using the big bang as a random number generator has its own appeal.

“It brings together two fields of study that don’t often cross-pollinate – early universe cosmology and cryptography,” Lee says.

New Scientist

« The True Cost of Surveillance
Can Big Data Help Climate Change? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.