. |
The need for computer-based cryptography is increasing
The
computer-based non-stop encrypting tools what are encrypting every
single bit is more important than ever before. The modern combat robots
and automatized location and weapon systems require safe and non-stop
encryption for their data transmitting.
If somebody can break
those safety algorithms that thing can cause the location of the own
troops is going to the hands of the enemy. Or the enemy can hack and
take control of the combat drones. In classic cryptology the data, what
is protected contained only the messages, but now things like
GPS-signals must encrypt because that denies using those systems against
their manufacturers.
When we are protecting the data, we can approach this problem from the point of view of two ways.
1) We can try to deny that the codebreaker would not get the message in hands.
In
this version, the message can send by using laser or maser radiation,
where the message is carried by using extremely thin electromagnetic
radiation. Or the cables where messages are traveling can isolate by
using layer, what the electromagnetic radiation would not pass.
That
means that all cables are covered with a layer, what the light or
electricity cannot pass. In the future quantum cables, where the message
is traveling inside the quantum fields of the atom line would deny that
the observer cannot see data that is traveling in the quantum wire from
outside.
Hiding the message from outsiders can be sinking the
message to the giant data flow, where the attacker must pick the right
bytes and connect them to the message. But then the attacker must break
the encryption if the message is encrypted.
2) We can encrypt
the message by using strong, multilevel coding where the ASCII-codes of
the message would multiplicate by using the very long prime numbers. The
strength of the encrypting can increase by using so-called quantum
prime numbers, which are extremely long decimals from prime numbers.
The
problem with this kind of encryption is that the quantum computer can
break those codes immediately if the encryption is made by using the old
fashion two-byte computer. So this is the problem with cryptology. The
more powerful systems can break the codes that are made by using elder
systems.
Breaking the code can be made by using three different way
1)
The code breaker can use artificial intelligence, which would analyze
the frequency of letters. These kinds of systems are the newest and most
powerful tools in cryptology.
The idea is that the system
isolates the encrypted marks from the data. Then those marks and their
commonness will compile with the commonness of the marks of the
language. The system requires knowing what is the language used in the
message.
2) By counting the prime numbers what is used in
encryption backward. The problem is that if those prime numbers are
generated by using the Riemann's conjecture the system must find out
what is the series of the prime numbers that are used in the encryption
process. But that thing is the classic cytological method, what is
effective if the codebreaker knows the prime numbers the sender of the
message is used.
3) Effect the persons who are encrypting
messages. That affecting can be playing boss in the workplace and asking
the passwords. Effecting people can be blackmailing or using some
narcotics for making the person give passwords or something like that.
So this is why the USB stick is not so effective as we expect.
The article about the jewelry of cryptography:
https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/
Comments
Post a Comment