Searching for uncopyable key made of sparkles in plastic
Several months ago, I read about someone who was making a key that was difficult if not "impossible" to copy. They mixed sparkly things into a plastic resin and let them set. A camera would take a picture of the object and pass the location of the sparkly parts through a hash function to produce the numerical key represented by this hunk of plastic. That numerical value would unlock documents. This was thought to be very difficult to copy because the sparkly items were arranged at random. Arranging all of the sparkly parts in the right sequence and position was thought to be beyond the limits of precision for humans. Can anyone give me a reference to this paper/project? Thanks! -Peter
Several months ago, I read about someone who was making a key that was difficult if not "impossible" to copy. They mixed sparkly things into a plastic resin and let them set. A camera would take a picture
This boils down to difficulty of faking the analog interface. Anything that regular camera captures the attacker can also capture and reproduce it for the benefit of the camera. This means that camera has to be able to distinguish between the real thing and images of the real thing. This probably means going beyond optical image and somehow detecting 3D coordinates of particles, forcing the attacker to actually construct a new physical key carrier. At the current level of technology and economy, it's cheaper to hire an unemployed hardware engineer (no, s/w engs are not qualified,) to look at the key than to construct a 3D particle-sensing camera. ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
On Tue, 2 Sep 2003, Peter Wayner wrote:
Can anyone give me a reference to this paper/project?
Is it the MIT project with a laser and glass balls in epoxide resin? http://slashdot.org/articles/02/09/20/1217221.shtml?tid=172 http://www.nature.com/nsu/020916/020916-15.html
In message <20030902233422.81119.qmail@web40609.mail.yahoo.com>, Morlock Elloi <morlockelloi@yahoo.com> wrote:
Anything that regular camera captures the attacker can also capture and reproduce it for the benefit of the camera.
Please read the paper. What's sent is not a picture of the token, but a hash of a picture of the pattern produced by a laser shining through the token. Because the laser scatters through the token in three dimensions it is difficult to model or reproduce the token. By varying the angle of the laser you can produce a large number of possible patterns, too many to be stored -- it's claimed this can be as much as 7 TB of data. So you can have a useful level of security even with untrusted token readers, and an extremely high level of security with trusted token readers. -- Shields.
participants (4)
-
Michael Shields
-
Morlock Elloi
-
Peter Wayner
-
Thomas Shaddack