The need for computer-based cryptography is increasing
The computer-based non-stop encrypting tools what are encrypting every single bit is more important than ever before. The modern combat robots and automatized location and weapon systems require safe and non-stop encryption for their data transmitting.
If somebody can break those safety algorithms that thing can cause the location of the own troops is going to the hands of the enemy. Or the enemy can hack and take control of the combat drones. In classic cryptology the data, what is protected contained only the messages, but now things like GPS-signals must encrypt because that denies using those systems against their manufacturers.
When we are protecting the data, we can approach this problem from the point of view of two ways.
1) We can try to deny that the codebreaker would not get the message in hands.
In this version, the message can send by using laser or maser radiation, where the message is carried by using extremely thin electromagnetic radiation. Or the cables where messages are traveling can isolate by using layer, what the electromagnetic radiation would not pass.
That means that all cables are covered with a layer, what the light or electricity cannot pass. In the future quantum cables, where the message is traveling inside the quantum fields of the atom line would deny that the observer cannot see data that is traveling in the quantum wire from outside.
Hiding the message from outsiders can be sinking the message to the giant data flow, where the attacker must pick the right bytes and connect them to the message. But then the attacker must break the encryption if the message is encrypted.
2) We can encrypt the message by using strong, multilevel coding where the ASCII-codes of the message would multiplicate by using the very long prime numbers. The strength of the encrypting can increase by using so-called quantum prime numbers, which are extremely long decimals from prime numbers.
The problem with this kind of encryption is that the quantum computer can break those codes immediately if the encryption is made by using the old fashion two-byte computer. So this is the problem with cryptology. The more powerful systems can break the codes that are made by using elder systems.
Breaking the code can be made by using three different way
1) The code breaker can use artificial intelligence, which would analyze the frequency of letters. These kinds of systems are the newest and most powerful tools in cryptology.
The idea is that the system isolates the encrypted marks from the data. Then those marks and their commonness will compile with the commonness of the marks of the language. The system requires knowing what is the language used in the message.
2) By counting the prime numbers what is used in encryption backward. The problem is that if those prime numbers are generated by using the Riemann's conjecture the system must find out what is the series of the prime numbers that are used in the encryption process. But that thing is the classic cytological method, what is effective if the codebreaker knows the prime numbers the sender of the message is used.
3) Effect the persons who are encrypting messages. That affecting can be playing boss in the workplace and asking the passwords. Effecting people can be blackmailing or using some narcotics for making the person give passwords or something like that. So this is why the USB stick is not so effective as we expect.
The article about the jewelry of cryptography:
https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/
Comments
Post a Comment