Skip to main content

Cryptography is the race between advanced algorithms one create codes and the other break codes.



The image above is "the lattice cryptography relies on mathematical lattices — arrangements of dots in space". (Quantamagazine.com/ Cryptography’s Future Will Be Quantum-Safe. Here’s How It Will Work). The image could also introduce the model of cryptography where the system breaks information into pieces. And then it sends that data to the receiver by using different routes. 

The fact is this. Quantum cryptography seems invincible technology that turns cryptology into history. But then another fact is that also all other encryption methods seemed invincible when they were introduced to users. And sooner or later, there is found some kind of vulnerability. 

When cryptographical systems develop, developers use technology that is best in business at that time. And that thing causes mistakes. 

And that is a problem with the encryption process. Faster and more advanced computers can break the code. And there is a possibility that advanced systems can break even quantum cryptography. 

The idea is that if a qubit travels across two laser rays or quantum channels. The first laser steals information. And the second one will make the replacing qubit. So the system just reads information from the qubit. And then it will make the new qubit. 

The power of quantum cryptography is that the information is stored in a solid piece. That piece is the electron or photon. And that makes it almost impossible to read information from that qubit. The system detects if the qubit is lost or its energy level is changed. But there is the possibility that the attacking system can make a copy of the qubit.  

Systems are safe if they are done as they should.  If the qubits are not protected that can cause a situation where some kind of laser system can steal information and copy the qubit. So in that case the system cannot detect the missing qubit. But that is only theory. And the theory is a path to a practical solution. 

Even if algorithms cannot break codes or lasers cannot steal qubits there are always people working with systems. The attackers can use bribery, sodium pentothal, or some other method to make people give information. And that means there are always vulnerabilities. 


https://www.quantamagazine.org/cryptographys-future-will-be-quantum-safe-heres-how-it-will-work-20221109/


https://designandinnovationtales.blogspot.com/

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...

The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like.

.     The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like. Above is the image of the nano-submarine. There is introduced an idea, that this kind of system would equip with living neurons, which makes it like some kind of artificial bug or mosquito. The idea is that the robot can take the nutrient by using the robot tube, which acts like a proboscis. The neurons can get nutrients and the rest of the machine can use small fuel cells or the energy to that system can deliver by using the radio waves. Futurologists are thinking about the ideas, what the hybridization of the neurons and machine would look like? Could the hyper-technical civilization look like the group of midget submarines? Those submarines might take nutrients for the neurons, what is living in them. The purpose of the midget submarines, which might be size less than a couple of millimeters would maximize the survivability of the neurons. One of the most intere...