Skip to main content

The need for computer-based cryptography is increasing

 

 

.

The need for computer-based cryptography is increasing

 

The computer-based non-stop encrypting tools what are encrypting every single bit is more important than ever before. The modern combat robots and automatized location and weapon systems require safe and non-stop encryption for their data transmitting.

If somebody can break those safety algorithms that thing can cause the location of the own troops is going to the hands of the enemy. Or the enemy can hack and take control of the combat drones. In classic cryptology the data, what is protected contained only the messages, but now things like GPS-signals must encrypt because that denies using those systems against their manufacturers.

When we are protecting the data, we can approach this problem from the point of view of two ways.

1) We can try to deny that the codebreaker would not get the message in hands.

In this version, the message can send by using laser or maser radiation, where the message is carried by using extremely thin electromagnetic radiation. Or the cables where messages are traveling can isolate by using layer, what the electromagnetic radiation would not pass.

That means that all cables are covered with a layer, what the light or electricity cannot pass. In the future quantum cables, where the message is traveling inside the quantum fields of the atom line would deny that the observer cannot see data that is traveling in the quantum wire from outside.

Hiding the message from outsiders can be sinking the message to the giant data flow, where the attacker must pick the right bytes and connect them to the message. But then the attacker must break the encryption if the message is encrypted.

2) We can encrypt the message by using strong, multilevel coding where the ASCII-codes of the message would multiplicate by using the very long prime numbers. The strength of the encrypting can increase by using so-called quantum prime numbers, which are extremely long decimals from prime numbers.

The problem with this kind of encryption is that the quantum computer can break those codes immediately if the encryption is made by using the old fashion two-byte computer. So this is the problem with cryptology. The more powerful systems can break the codes that are made by using elder systems.

Breaking the code can be made by using three different way

1) The code breaker can use artificial intelligence, which would analyze the frequency of letters. These kinds of systems are the newest and most powerful tools in cryptology.

The idea is that the system isolates the encrypted marks from the data. Then those marks and their commonness will compile with the commonness of the marks of the language. The system requires knowing what is the language used in the message.

2) By counting the prime numbers what is used in encryption backward. The problem is that if those prime numbers are generated by using the Riemann's conjecture the system must find out what is the series of the prime numbers that are used in the encryption process. But that thing is the classic cytological method, what is effective if the codebreaker knows the prime numbers the sender of the message is used.

3) Effect the persons who are encrypting messages. That affecting can be playing boss in the workplace and asking the passwords. Effecting people can be blackmailing or using some narcotics for making the person give passwords or something like that. So this is why the USB stick is not so effective as we expect.

The article about the jewelry of cryptography:

https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/



 

 

 

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting armor has