Hacker News new | past | comments | ask | show | jobs | submit login

It's not amount of data but latency. A signal to buy is just one bit, but you need to get it before everyone else does.



Could an adversary send buy/sell fake signals and profit?

Given the low bandwidth I assume they can't use very sophisticated authentication mechanisms


It would be extremely trivial to transport a time-keyed, completely random one-time-pad out of band (e.g. over a commodity internet link/vpn) so long as there is sufficient difference in bandwidth, and then simply XOR the data with it.. good luck cracking that.

and that's just what a few seconds of thinking came up with.


How do you use a one-time pad on a single bit of data?

(Actually I see how that's possible, A XOR B, upticks are 1, etc.)

If the pad is coming via a side-channel then the speed increase is limited by that side-channel, you lose all your gains by waiting for the pad, then lose more by decrypting and verifying.

That aside my first thought was someone could jam the signal by blasting the receiver with noise; I wonder how they mitigate that.


A one-time pad is the right idea. I would send it on fiber at night before the markets open and then use bits from it as the market trades. A few MB per day would be plenty, given the dialup-like speeds of shortwave. That would go through a 10 gbps fiber in milliseconds.

The actual encryption of each bit just require an XOR on each end of the link. That's about half a nanosecond on a Xeon or one clock cycle on your FPGA.

A jammer wants to be close to the receiving antenna so he can use less power. Yet he wants to be far away so he's less likely to be caught. Willfully interfering with any any radio service is illegal in any regulatory domain AFAIK.


There is no need for a one-time pad. Any good stream cipher works just as well, same as for any other link. Message integrity is a fun question, since you don't want to spend the bits that you'd need for typical levels of security there; but that question is again independent of a one-time pad vs. normal crypto.

Jamming a licensed radio link vital to rich people who routinely deal with the government doesn't sound like a great idea to me.


Good point, a one-time pad is not needed.

Either way, the likelihood of loss between TX and RX means that you can't advance the cipher as bits arrive. I'm thinking you'd have to advance based on GPS-sync'd clocks. Given that each bit is at least 10's of microseconds, GPS sync is plenty good.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: