"Cryptography without Using Secret Keys"

Researchers from the University of Twente and Einhoven University of Technology have developed a new method that secures data without using secret keys. The cryptographic keys used by most security applications must be kept confidential so that they do not get lost, stolen, or compromised. However, there is no guarantee that these keys cannot be intercepted. The alternative method to securing data proposed by the researchers involves the use of a PUK (Physical Unclonable Key) and the quantum properties of light. This article continues to discuss the use of cryptographic keys and the alternative data security method proposed by researchers that uses a PUK to send secret messages.

TU/e reports "Cryptography without Using Secret Keys" 

Submitted by Anonymous on