-
-
-
--------------------------- - 1945 - Encryption is for everyone.
-
- With all this “hacking” going on there is bound to be some new interest in ‘encryption”. I used to have a top-secret crypto clearance. Codes I carried around in my head, because you could not write them down. The danger was getting caught and tortured. Today, a high school kid can steal information from his basement. Time to buy stock in encryption products.
-
- The democrats are spying on Trump. The FBI, CIA, NSA, and the Russians are spying on Hillary. Your TV, cell phone, and dishwasher are spying on you. Don’t leave your bedroom undressed.
-
- Encryption. It covers many different things. By imbedding photons in dollar bills can encrypt them from being counterfeited. Each bill could have its own photon serial number.
-
- The technique with photon encryption is called “Quantum-key distribution”. It encodes data using very sensitive light photons. This technique relies on physics. Most of today’s encryption relies on mathematics.
-
- How do you keep information safe that is going over the internet, or over cell phones? Today almost any encrypted code can be cracked using a super computer. Renewed interest in better encryption came about when Edward Snowden stole NSA files. Then Wikileaks has numerous releases of stolen secret files in today’s news
-
- Much research money is now directed into Quantum Encryption, using the properties of light photons. Today internet encryption uses a secret key to encrypt the message and a different key to decipher it. Both parties have to share keys. Everyone shopping on the internet would like their credit-card numbers encrypted. Right?
-
- These encryption “ keys” are derived from factors of very large numbers, prime numbers, integers divisible only by 1 and themselves. Finding prime numbers in reverse is nearly impossible without a computer.
-
- Today asymmetric keys are typically 1,024 bits long. NSA has upgraded to 2,028 bit keys.
-
- What’s next? A “ quantum computer”. Not just a 1 or zero machine. But, using “ qubits” where a single electron can be held in 2 spin states simultaneously. Spin up or spin down. With 1,000 qubits there are 2^1,000 possible quantum states. That total number exceeds the number of particles in the Universe.
-
- Quantum computers do not perform operations one step at a time like normal computers. They perform all operations simultaneously.
-
- Photon keys transmitted over glass fiber cables are nearly tamper proof. Any disturbance scrambles the photons. Keys at either end will reside in a device the size of a memory stick that plugs into the computer port.
-
- The state of the economy is in the “ urgent” mode. A hacker could feed bad data into a network and completely shut down a network or a power grid. Today NSA is saving encrypted data that they can not read. When they get a quantum computer in the future they can go back and read all these transmissions. Those transmissions the spies thought were secure.
-
- The game is a never ending cat and mouse . Today it is news headlines as break-ins are occurring in politics. They have already been occurring for years in businesses. But, that is their problem. No one else cares. But, now Hillary and Trump are the victims. Now hacking becomes dangerous, we need new encryption now. Quantum computers now. It is amazing what it takes to get a politicians’ attention that is not money.
-
------------------------------------------------------------------
-
- Note (1): How does photo encryption work? The sender sends a photon through a polarization filter ( one of four angles of light polarization). Each angle is assigned a 1 or a zero. The receiver can only resolve the bit value of each photon if it is passed through the same keyed filter. The string of bit values becomes the quantum key for deciphering the message.
-
- (2) When you buy and sell over the internet today the buyer and seller exchange a secret code. Both use the same code ( symmetric encryption) The plain text is passed through the code at each end Intercepted communications can not be read if they don’t have the same key code.
-
- --------------------------------------------------------------------------------------
---- Comments appreciated and Pass it on to whomever is interested. ----
--- Some reviews are at: -------------- http://jdetrick.blogspot.com -----
-- email feedback, corrections, request for copies or Index of all reviews
- to: ------- jamesdetrick@comcast.net ------ “Jim Detrick” -----------
- https://plus.google.com/u/0/ -- www.facebook.com -- www.twitter.com
----- 707-536-3272 ---------------- Friday, March 10, 2017 -----
------------------------------------------------------------------------------------------
No comments:
Post a Comment