When hackers broke the Pentagon's top-secret quantum encryption algorithm in less than an hour. We are facing one thing. People who are making algorithms are not good at mathematics.
Theoretically, extremely long (quantum) prime numbers are effective tools for ASCII code multiplication and division. They should make the code unbreakable.
But there is one thing that we must realize: if the prime number is easy to guess even the best of the algorithms are useless. The heart of the encryption software is the prime number generator. That prime number generator is the equation that forms prime numbers. And then the system multiplicates ASCII codes with those prime numbers.
The equation that creates the prime number is normally the Riemann hypothesis (conjecture). If the user waits too short a time. The computer will not generate enough prime numbers. And in that case, the attacker can use brute force for breaking the code. In that case, the attacking computer just creates prime numbers. Then it just tries those prime numbers to message that operators want to break.
There are encryption programs that use different prime numbers for each letter. And that makes encryption harder to break. But the fact is that Riemann's conjecture is at the end of its route. Faster and faster computers can make brute force attacks easier than elder computers.
The problem with algorithms is that they must make very carefully. If there are errors in the code that algorithm will not work. And the heart of those algorithms is a mathematical formula that must make by using pinpoint accuracy. And if there are errors in that formula the entire algorithm is useless.
Binary computers handle only numeric data. And this is the thing that makes coding the encryption algorithms very hard to make. If there are some kind of errors or the chosen formula is wrong for that purpose, the algorithm cannot protect information. If one multiplication mark turns into a division mark. That thing turns the algorithm useless.
Also, algorithms can turn weak if the people who are using them must call things like passwords from some computer center. And those things cause a big risk that somebody can break the code simply by asking passphrase by using the telephone.
That kind of backdoor offers the possibility. That somebody breaks the code or steals the information by using some other method than regular brute force. And if there are errors in electrical or physical protocol there is the possibility that somebody just cheats the data security team, and orders the username and password themselves.
https://designandinnovationtales.blogspot.com/
Comments
Post a Comment