Friends, first of all no encryption scheme is “unbreakable”; None. Its simply a function of time and effort. That being said, there is a computing revolution coming, although nobody knows exactly when. What are known as “quantum computers” will be substantially more powerful than the devices we use today, capable of performing many types of computation that are impossible on modern machines. But while faster computers are usually welcome, there are some computing operations that we currently rely on being hard (or slow) to perform.
Specifically, we rely on the fact that there are some codes that computers can’t break – or at least it would take them too long to break to be practical. Encryption algorithms scramble data into a form that renders it unintelligible to anyone that does not possess the necessary decryption key (normally a long string of random numbers). This is what lets us send information securely over the internet. But will quantum computers mean we can no longer create encryption techniques that can’t be broken?
For one system, known as symmetric encryption, quantum computing doesn’t pose much of a threat. To break symmetric encryption you need to work out which (of many) possible keys has been used, and trying all possible combinations would take an unimaginable amount of time. It turns out that a quantum computer can test all these keys out in one square root of the time it would take existing computers – in other words, slightly less time but not so dramatically that we need to worry. This, in part, is the reason we have been working hard on OTPSME; unbroken in over two years with over 6000 decryption attempts.
But for another type of encryption system, known as asymmetric or public-key encryption, it doesn’t look so good. Public-key systems are used for things like securing the data that comes through your web browser. They encrypt data using a key that is available to anyone but need another private key for decryption. Fortunately, we have already foreseen this pending disaster. Researchers across academia, government and industry are currently working hard to develop new public-key encryption techniques that rely on different, harder calculations that will be immune to the powers of a quantum computer. I am confident that these efforts will be successful, particularly since we already know some techniques that appear to work. By the time that quantum computers arrive, we will be ready. Below is a really good primer on Encryption in general as well as Quantum Encryption:
SOURCE – TheConversation.com
For a long time, some people have worried about the government eavesdropping on their communications. But, it wasn’t until Edward Snowden showed us how widespread and routinely this was being done that most people began to worry about eavesdropping. The latest global story about the San Bernardino iPhone was interesting because it showed how angry and agitated a government agency became because it could not easily read all of the messaging on one specific device used by one individual. All of the governmental surveillance agencies have expressed great concern over the idea that people can “go dark”.
Now it turns out that DARPA (Defense Advanced Research Projects Agency) wants you to develop a completely secure messaging app. The exact language they use to describe what they want is a “secure messaging and transaction platform”…”that can provide repudiation or deniability, perfect forward and backward secrecy, time to live/self-delete for messages, one time eyes only messages, a decentralized infrastructure to be resilient to cyber-attacks, and ease of use for individuals in less than ideal situations.” This all sounds very “dark” to me. And, not only do they wanted to use the current encryption and security in existing communications apps, they also wanted to incorporate a decentralized backbone (rather than point-to-point) that would make eavesdropping even more difficult. The official technology request from DARPA is here. BTW, if you’re looking for perfect encryption, look no further than here. Perhaps the crypto-system used in the VooDoo network will meet DARPA’s needs…
SOURCE – dzone.com
The NSA is worried about quantum computers. It warns that it “must act now” to ensure that encryption systems can’t be broken wide open by the new super-fast hardware. In a document outlining common concerns about the effects that quantum computing may have on national security and encryption of sensitive data, the NSA warns…
“public-key algorithms… are all vulnerable to attack by a sufficiently large quantum computer.”
Quantum computers can, theoretically, be so much faster because they take advantage of a quirk in quantum mechanics. While classical computers use bits in 0 or 1, quantum computers use “qubits” that can exist in 0, 1 or a superposition of the two. In turn, that allows it to work through possible solutions more quickly meaning they could crack encryption that normal computers can’t.
It’s unclear if any public encryption algorithms are quantum computer-proof. In the document, the NSA explains that “while a number of interesting quantum resistant public key algorithms have been proposed… nothing has been standardized… and NSA is not specifying any commercial quantum resistant standards at this time.” Instead, it suggests that companies and government departments concerned about the threat of quantum computing use one of a number of algorithms that don’t use a public key to encrypt data where possible. By the way, OTPSME is not a public-key encryption system.
SOURCE – Gizmodo.com
Federal investigative agencies like the FBI have long argued that encryption and other new technologies severely hamper their ability to spy on terrorists and other criminals, putting our safety at risk. A new report from Harvard debunks that “going dark” claim, concluding that the rise of network-connected devices will lead to more, not fewer, opportunities for surveillance. Harvard’s Berkman Center for Internet & Society convened a group of security and policy experts to explore questions of surveillance and encryption at a time when major tech companies like Apple and Google are encrypting their phones and other products by default. The 37-page report, released Monday, concludes that the feds’ “going dark” argument falls flat on its face.
FBI Director James Comey, in an October 2014 speech, argued that the law hasn’t kept pace with technologies, like encryption, that have become “the tool of choice for some very dangerous people.” What it means is this: Those charged with protecting our people aren’t always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority,” Comey said. “We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so.”
SOURCE – NBCNews.com
If you didn’t hate Math already… A university computer in Missouri has found the new largest prime number. It is made up of 22,338,618 digits, nearly 5 million more than the previous record. The figure was identified after 31 days of non-stop computing on a machine used by Curtis Cooper, a professor of computer science at the University of Central Missouri, who has now detected four of these record-breaking primes. The new prime number, also known as M74207281, is calculated by multiplying together 74,207,281 twos then subtracting one. It is almost 5 million digits larger than the previous record prime number, in a special class of extremely rare prime numbers known as Mersenne primes. It is only the 49th known Mersenne prime ever discovered, each increasingly difficult to find. Mersenne primes were named for the French monk Marin Mersenne, who studied these numbers more than 350 years ago. GIMPS, founded in 1996, has discovered all 15 of the largest known Mersenne primes. Volunteers can download a free program to search for these primes with a cash award offered to anyone lucky enough to compute a new prime. Full Disclosure – The VooDoo is a GIMPS contributor.
SOURCE – Time.com / Mersenne.org