Skip to main content

Mathematics plays a big role in encryption algorithms.



When hackers broke the Pentagon's top-secret quantum encryption algorithm in less than an hour. We are facing one thing. People who are making algorithms are not good at mathematics. 

Theoretically, extremely long (quantum) prime numbers are effective tools for ASCII code multiplication and division. They should make the code unbreakable. 

But there is one thing that we must realize: if the prime number is easy to guess even the best of the algorithms are useless. The heart of the encryption software is the prime number generator. That prime number generator is the equation that forms prime numbers. And then the system multiplicates ASCII codes with those prime numbers. 

The equation that creates the prime number is normally the Riemann hypothesis (conjecture). If the user waits too short a time. The computer will not generate enough prime numbers. And in that case, the attacker can use brute force for breaking the code. In that case, the attacking computer just creates prime numbers. Then it just tries those prime numbers to message that operators want to break. 

There are encryption programs that use different prime numbers for each letter. And that makes encryption harder to break. But the fact is that Riemann's conjecture is at the end of its route. Faster and faster computers can make brute force attacks easier than elder computers. 

The problem with algorithms is that they must make very carefully. If there are errors in the code that algorithm will not work. And the heart of those algorithms is a mathematical formula that must make by using pinpoint accuracy. And if there are errors in that formula the entire algorithm is useless. 

Binary computers handle only numeric data. And this is the thing that makes coding the encryption algorithms very hard to make. If there are some kind of errors or the chosen formula is wrong for that purpose, the algorithm cannot protect information. If one multiplication mark turns into a division mark. That thing turns the algorithm useless. 

Also, algorithms can turn weak if the people who are using them must call things like passwords from some computer center. And those things cause a big risk that somebody can break the code simply by asking passphrase by using the telephone. 

That kind of backdoor offers the possibility. That somebody breaks the code or steals the information by using some other method than regular brute force. And if there are errors in electrical or physical protocol there is the possibility that somebody just cheats the data security team, and orders the username and password themselves. 


https://designandinnovationtales.blogspot.com/


Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of