Security and Encryption

JohnDB

Platinum Member
Jun 16, 2021
12,296
8,523
1,138
From your personal Bank account to Crypto Currency there now exists a problem.

Forgery and theft.

With the advent of quantum computing the encryption protecting the security of everything from launch codes to your personal check book and of course crypto currency are now obsolete....solvable by the new chips being developed faster than ever before.

Before, people would not bother to try and solve the encryption of bitcoin or banks because it would require decades of the fastest networked computers to solve the encryption.

That is no longer true. What used to take decades to compute is now under 5 minutes with quantum computing. No encryption is good enough.


Digital security is at an all time low.

 
We use these quantum chips to create make more complicated cipher ... military-grade encryption is unbreakable ... what civilians use is more accurately called paraphrasing, and yeah, that's always been easy to break ... why it's illegal to use in the military ...

Windoze is designed to have a back door ... why banks etc. don't use it ...
 
We use these quantum chips to create make more complicated cipher ... military-grade encryption is unbreakable ... what civilians use is more accurately called paraphrasing, and yeah, that's always been easy to break ... why it's illegal to use in the military ...

Windoze is designed to have a back door ... why banks etc. don't use it ...
They are not "unbreakable " anymore....that's what I'm trying to explain.
It's not as simple as you are making it.

These quantum chips have cracked the code for crypto currency and did it in 5 minutes.
 
They are not "unbreakable " anymore....that's what I'm trying to explain.
It's not as simple as you are making it.

These quantum chips have cracked the code for crypto currency and did it in 5 minutes.

How long is crypto currency's key stream? ... how often is the key stream changed? ...

Most important: how are they transmitting the key? ... military code requires two separate media for key and cipher ...

One time key pads are unbreakable ... you should know that ...

======

You dodged my point ... we use the best computer in the world to CREATE key ... the best computer in the world takes decades if not centuries to break ...
 
How long is crypto currency's key stream? ... how often is the key stream changed? ...

Most important: how are they transmitting the key? ... military code requires two separate media for key and cipher ...

One time key pads are unbreakable ... you should know that ...

======

You dodged my point ... we use the best computer in the world to CREATE key ... the best computer in the world takes decades if not centuries to break ...
Obviously we need to own this....that's a given. If we expect to retain security.

But blockchain encryption is no longer sufficient. The new quantum computing systems can Crack it in 5 minutes....it used to take in surplus of 6 decades to decrypt....now it's something done on a coffee break.

But the issue is still "How long can we keep quantum computing away from competitors?"
Especially if they want to use it for nefarious purposes?
 
Obviously we need to own this....that's a given. If we expect to retain security.

But blockchain encryption is no longer sufficient. The new quantum computing systems can Crack it in 5 minutes....it used to take in surplus of 6 decades to decrypt....now it's something done on a coffee break.

But the issue is still "How long can we keep quantum computing away from competitors?"
Especially if they want to use it for nefarious purposes?

The military doesn't use blockchain ... problem solved ... just use systems like theirs ... unbreakable ... just have to send the key through different media ...

Anything less is insecure ...
 
The military doesn't use blockchain ... problem solved ... just use systems like theirs ... unbreakable ... just have to send the key through different media ...

Anything less is insecure ...
The military does not discuss their encryption methods.

However we have China stealing literally billions by front running in Argentina's markets or outright theft through its North Korean hacker network.


North Korea doesn't have the necessary tools to do this sort of thing....it's in truth CCP using North Korea as a scapegoat.
 
The military does not discuss their encryption methods.

Former Air Force cryptographer here ... our military uses the cryptographic algorithm ... DoD Regulation 5200.01 Vol 1 contains a good part of the unclassified portions of military cryptography ... obviously much more is fully classified and can't be discussed here ...

Plenty of civilian publications about the crypto algorithm ... what it is and who uses it ... it's unbreakable ... but it's useless if we transmit key and cipher in the same message, no matter how much we paraphrase ... why paraphrasing is illegal in the military in all cases ...

Remember Hillary and her classified e-mails? ... this was the problem ... she used browser encryption instead of military, which is prohibited ...
 
Back
Top Bottom