Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA seeks to build quantum computer that could crack most types of encryption
The Washington Post ^ | January 2, 2014 | Steve Rich

Posted on 01/02/2014 1:42:59 PM PST by Biggirl

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: Biggirl

What this needs is the agreement of several hundred very high volume data users to create massive random data flows to overflow even a massively parallel system.

That is, in effect, the NSA is hoping to develop a very fast brute force system. But if it tries to decrypt garbage, it must go all the way to the nth calculation to show that it is garbage, and even then it is never sure that it is garbage.

Eventually, maximum effort to produce minimal results will render it cost ineffective.

They are experiencing a similar problem right now by trying to monitor all communications all the time everywhere. So much garbage that anything of value in it is lost.


21 posted on 01/02/2014 2:44:30 PM PST by yefragetuwrabrumuy (There Is Still A Very Hot War On Terror, Just Not On The MSM. Rantburg.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Biggirl
The irony of building a quantum computer for decryption/factoring is that the complexity with building the computer is entangling the bits, keeping the bits entangled, then "reading" the bits.

Once that problem is figured out, the technology can be fairly readily adapted to build quantum encryption that can't be broken by a quantum computer.

So once the problem is solved, the solution creates a new greater problem.
22 posted on 01/02/2014 2:55:24 PM PST by Deek
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #23 Removed by Moderator

To: Biggirl

When do we get to see the guy from the old Apple commercial on the large screen?

I’ll bring the sledgehammer....


24 posted on 01/02/2014 3:10:33 PM PST by PATRIOT1876
[ Post Reply | Private Reply | To 1 | View Replies]

To: Biggirl

seeks to build = already built 5 years ago and the $$$$$$$$ is a laundering scheme.


25 posted on 01/02/2014 3:45:56 PM PST by bgill
[ Post Reply | Private Reply | To 1 | View Replies]

To: MeganC
One-time cipher pads are still pretty safe so long as you just use them once.

The problem is getting genuinely random numbers for the key. Computers produce only pseudorandom numbers, and even if the keys are genuinely random, keeping the "code book" secure is difficult.

26 posted on 01/02/2014 6:36:23 PM PST by JoeFromSidney (itYe)
[ Post Reply | Private Reply | To 9 | View Replies]

To: JoeFromSidney
I've looked into using tables of economic and demographic data, and telephone directories, as sources of random numbers. They "sort of" solve the problem of distributing the keys. The numbers pass several tests of randomness, but if "they" figure out which table you're using, the game is up.
27 posted on 01/02/2014 6:43:35 PM PST by JoeFromSidney (itYe)
[ Post Reply | Private Reply | To 26 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson