GPS World - November 2007 - (Page 35)
Security/Survellance | MILITARY & GOVERNMENT Security for Insecure Times Geoencryption with Loran Location-based encryption can prevent stolen data from being decrypted outside a particular facility. Modernized Loran, hard to spoof and hard to jam, with good repeatable position accuracy and signal availability, shows strong potential for securing sensitive data. Di Qiu, Sherman Lo, and Per Enge Stanford University T he emergence of the Internet and personal computers has produced unprecedented information content and access and placed volumes of data at practically anyone’s ﬁngertips. While the spread of such technology has increased efﬁciency and knowledge, it has also made information theft easier and more damaging. One common form of information theft is the unauthorized copying and distribution of copyrighted material. Today, one can obtain pirated versions of the latest movies, often before release, by making a quick visit to a ﬁle-sharing network or a less-than-reputable shop. Surprisingly, the pirated material often comes from Hollywood insiders, such as the employees of the post-production shop, or individuals who receive prerelease screener DVDs. Theft of equipment containing sensitive or valuable information has also become widespread. Laptops containing personal information such as social security numbers, personal ﬁnancial information, credit-card numbers, and so on make attractive targets. These thefts can happen in the most surprising places. Qualcomm CEO Irwin Jacobs left his laptop unattended for a few minutes to ﬁeld questions from a business audience after a speech — and it disappeared. These emerging problems have stimulated interest and signiﬁcant growth in the ﬁeld of information security. Geoencryption or location-based encryption furnishes a means to enhance security, and is suitable to these two scenarios, digital ﬁlm distribution and laptop security. The terms geoencryption and location-based encryption refer to a security algorithm that limits the access (decryption) of information content to speciﬁed locations and/or times. More generically, the restriction can be based on any set of navigation parameters. The algorithm does not replace any of the conventional cryptographic algorithms, but instead adds an additional layer of security. In its basic form, location-based encryption can ensure that data cannot be decrypted outside a particular facility. Any attempts to access the secure information at an unauthorized location will result in a failure of the decryption process. For example, a digital movie ﬁle can only be decrypted inside the theater to which it is sent. In the scenario of laptop security, the valuable information on the laptop or hard drive can be encrypted so that it can be accessed only at the laptop owner’s home or ofﬁce. The theft of such data has the potential of jeopardizing personal and national security. Geoencryption increases security by augmenting current cryptosystems, such as passwords. Even today, many people do not employ very strong passwords. Eight-character passwords of mixed numbers and letters can be recovered within 60.5 hours on supercomputers that have a speed of 1 billion passwords per second. Even with very strong passwords, geoencryption provides extra security because it prevents authorized users from accessing sensitive data at unsecured locations. Digital Film Distribution Logan Scott, Dorothy Denning, and colleagues at Geocodex proposed and developed the idea of geoencryption for digital ﬁlm distribution. FIGURE 1 shows a modiﬁed version of the system. A content provider (sender) distributes November 2007 | GPS World www.gpsworld.com 35
Table of Contents for the Digital Edition of GPS World - November 2007
GPS World - November 2007
Out in Front
Letters to the Editor
Go Faster, More, Cheaper on GPS III
Big Acquisitions the Order of the Day
Let’s Go Downtown! Let’s Go Indoors!
Security for Insecure Times
Meeting of the Minds
Time for a Better Receiver
Advertisers Index & Company Directory
Seen + Heard
GPS World - November 2007
If you would like to try to load the digital publication without using Flash Player detection, please click here.