TECH Covert Optical Communication - NSA Proof Encryption

Jonas Parker

Hooligan
Ham radio can't send anything encrypted by law. Transmissions must be in "clear language". That not withstanding, there are many data modes out there (PSK31, etc.) that would be difficult for a casual listener to receive and copy.
 

Meadowlark

Has No Life - Lives on TB
John has a long mustache
The chair is by the door
The eagle has landed
the fat man walks alone
 

delta38

Umbrella Corp.
Ham radio can't send anything encrypted by law. Transmissions must be in "clear language". That not withstanding, there are many data modes out there (PSK31, etc.) that would be difficult for a casual listener to receive and copy.

Jonas Parker is correct, with the exception of control signals (remote control of a device) and telemetry signals.

Tim
 

ittybit

Inactive
Not sure that the FCC has started to regulate the part of the electromagnetic spectrum which includes visible light. If so they had better send a notice to Ol' Sol, who I understand has an unlicensed transmitter.
 

L.A.B.

Goodness before greatness.
Like minds and all, another of my brainstorm ideas lost at sea or something...
 

Satanta

Stone Cold Crazy
_______________
Just develop your own language. Runes as an alphabet. Crack it? Sure but it would take awhile.
 

homepark

Resist
Alphabet substitutions are very easy to crack. You are probably wasting time with any encryption scheme unless it is to prevent locals from listening in. I would go with one time phrase use. However, even then, you need to be very careful. As was said above, "John has a long mustache".
 
Ham radio can't send anything encrypted by law. Transmissions must be in "clear language". That not withstanding, there are many data modes out there (PSK31, etc.) that would be difficult for a casual listener to receive and copy.

The question is not whether it is legal or illegal -- think of this as a mental exercise. So if it can be done, how might one go about application of this particular method over, um, let's say the ham network? The question is how could/would one apply it elsewhere.

It is far better to know, understand the use of, and have a tool available than to wish for one after it is needed.
 
Your article describes a perfect application for Covert Optical Communication to the tee -- I believe we're discussing nearly the same thing. This particular method is merely a delivery means of using varying gap lengths of light between normalized data signals as the data path. The actual encryption applied could be a quantum cryptography. As the photon detectors currently used to determine what type of data is being sent aren't completely accurate, it's taking advantage of the data less gaps -- read unmonitored -- in the stream to send an encrypted message.

As any encryption sent through the internet is nothing more than a beacon for anyone wishing to intercept, the actual transmission itself can and will garner attention. Depending on 'who' intercepts it will determine if and how quickly it can be cracked -- I'm oversimplifying a bit by ignoring the encryption algorithm used and the source of the software and algorithm.

This particular delivery method ensures there is no "send" ever detected by anyone observing/listening.
 
Not nearly as long as you might think. I've watched what appeared to be a difficult character cipher destroyed in under 10 seconds by today's computers. As silly as it seems, one of the most difficult ciphers to crack and still easiest to use is still the book cipher. Provided only the sender and receiver know the book title, they are still incredibly difficult to crack.

That being said, the more books are digitized and the faster computers become, we're eventually looking at sub 60 second crack times of those as well. Now, if you speak multiple languages and can reference multiple books in multiple languages, you might be safe for a few additional years. Of course that means both parties have to understand the languages used and have the books readily available.
 
One-Time-Pad.

A one-time-pad is a fantastic way to go but it can still be cracked. It merely comes down to the raw processing power available and what cipher is used. My question still remains.

As stated before though, any encryption sent over the internet or by other means is a beacon for someone listening/looking for encrypted communications. After interception it is merely a matter of cracking said encrypted message -- again, who wrote the algorithm, what software and what processing power is available to throw at it will determine how long it takes to break it.

With that being said, Covert Optical Communication is a means to send a message (encrypted or not) that cannot currently be intercepted. As there is not existing technology to detect transmission or receipt no flags are raised. I suppose it's similar to using the blanking signal for data transmission on the old analog TV channels -- although not quite as those were continuous and anyone looking would also see transmission occurring.

If it is possible, how can said covert method of transmission be applied to other communication methods? I'm curious if it could be used on the HAM network.
 
Top