Hostname: page-component-8448b6f56d-dnltx Total loading time: 0 Render date: 2024-04-25T05:30:37.390Z Has data issue: false hasContentIssue false

The “Rock of Randomness”: a physical oracle for securing data off the digital grid

Published online by Cambridge University Press:  04 February 2019

Gideon Samid*
Affiliation:
BitMint, LLC, P.O. Box 1022, McLean VA 22101, USA
Gary E. Wnek
Affiliation:
Department of Macromolecular Science and Engineering, Advanced Films and Smart Packaging Systems Initiative, Case Western Reserve University, Cleveland, OH 44106, USA
*
Address all correspondence to Gideon Samid at gideon.samid@case.edu
Get access

Abstract

We propose a device to secure random data in analog format, so that it is taken off the digital grid. Such action will turn off the means by which remote hackers violate security. A physical “rock” manufactured through 3D printing technology, constructed on the basis of high-grade randomness, which is packed into the comprising materials of that rock. The rock functions as an oracle, and does not allow any massive copy of its content. Thus, a major claim of this Prospective is that materials science and engineering may hold the keys to the future of cryptography.

Type
Prospective Articles
Copyright
Copyright © Materials Research Society 2019 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

*

G. Samid is also an adjunct professor in the Department of Electrical Engineering and Computer Science, Case Western Reserve University. Correspondence: gideon@bitmint.com or gideon.samid@case.edu

References

1.Smart, N.: Cryptography: An Introduction, 3rd ed. (McGraw-Hill, New York, 2013), http://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf.Google Scholar
2.Stöcker, C. and Samid, G.: What a 100 years old idea can teach us about cyber security, The World Economic Forum, Davos, Switzerland (2017), https://www.weforum.org/agenda/2017/11/what-a-100-year-old-idea-can-teach-us-about-cybersecurity.Google Scholar
3.Shannon, C.: Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656 (1949), http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf.Google Scholar
4.Camesasca, M., Kaufman, M. and Manas-Zloczower, I.: Quantifying fluid mixing with the Shannon entropy. Macromol. Theory Simul. 15, 595607 (2006).Google Scholar
5.Camesasca, M., Alemaskin, K., Manas-Zloczower, I. and Kaufman, M.: Entropic measures of mixing tailored for various applications, The 2004 NSF Design, Service and Manufacturing Grantees Research Conference Proceedings.Google Scholar
6.Samid, G.: US patent application US2008/0144432 A1 (2008).Google Scholar
7.Miyasaka, K., Watanabe, K., Jojima, E., Aida, H., Sumita, M. and Ishikawa, K.: Electrical conductivity of carbon-polymer composites as a function of carbon content. J. Mater. Sci. 17, 1610 (1982).Google Scholar
8.Huang, J.-C.: Carbon black filled conducting polymers and polymer blends. Adv. Polym. Technol. 21, 299313 (2002).Google Scholar
9.Sudduth, R.D.: A percolation threshold model that effectively characterizes the full concentration range for electrical-conducting polymer composites. J. Appl. Polym. Sci. 136, 47184 (2019).Google Scholar
10.Wnek, G.E.: Electrically conductive polymers. MRS Bull. 12(8), 36 (1987).Google Scholar
11.MacDiarmid, A.G. and Epstein, A.J.: Conducting polymers: past, present and future. Mat. Res. Soc. Symp. Proc. 328, 133144 (1994).Google Scholar
12.Hatchett, D.W. and Josowicz, M.: Composites of intrinsically conducting polymers as sensing nanomaterials. Chem. Rev. 108, 746769 (2008).Google Scholar
13.Gibson, I., Rosen, D. and Stucker, B.: Additive Manufacturing Technologies: 3-D Printing, Rapid Prototyping, and Direct Digital Manufacturing, 2nd ed. (Springer, New York, 2015).Google Scholar
14.Shusteff, M., Browar, A.E.M., Kelly, B.E., Henriksson, J., Weisgraber, T.H., Panas, R.M., Fang, N.X. and Spadaccini, C.M.: One-step volumetric additive manufacturing of complex polymer structures, Sci. Adv. 3 120, eaao5496 (2017).Google Scholar
15.Tumbleston, J.R., Shirvanyants, D., Ermoshkin, N., Janusziewicz, R., Johnson, A.R., Kelly, D., Chen, K., Pinschmidt, R., Rolland, J.P., Ermoshkin, A., Samulski, E.T. and DeSimone, J.M.: Continuous liquid interface production of 3D objects. Science 347, 13491352 (2015).Google Scholar
16.Babu, S.S., Love, L., Dehoff, R., Peter, W., Watkins, T.R. and Pannala, S.: Additive manufacturing of materials: opportunities and challenges. MRS Bull. 40, 11541161 (2015).Google Scholar
17.Samid, G.: User-centric cryptography—shifting power from the cipher designer to the cipher user, 2018 International Conference on Security and Management, August 2018, Las Vegas, NV.Google Scholar
18.Samid, G.: Randomness rising, 14th International Conference on Foundations of Computer Science (FCS'18: July 30–August 2018, Las Vegas, NV.Google Scholar
19.Samid, G.: Randomness as absence of symmetry, The 17th International Conference on Information & Knowledge Engineering (Ike'18) Las Vegas, NV.Google Scholar
20.Vernam, G.S.: US Patent 1310719 (1918).Google Scholar