EvilZone
Other => Found it on the Webs => : DeXtreme May 15, 2013, 12:35:35 AM
-
I came across this article and just had to share it ;D .They think they can stop us
http://www.businessweek.com/articles/2013-05-13/a-hack-proof-internet-exists-thanks-to-quantum-physics (http://www.businessweek.com/articles/2013-05-13/a-hack-proof-internet-exists-thanks-to-quantum-physics)
-
Given that quantum computing is so fundamentally different from any electrical hardware-based computing we know of now (atoms instead of transistors), and that the field of quantum mechanics itself is a highly complex, abstract and largely hypothetical science, then "hack-proof" is perhaps not such a far-fetched claim in this case as it usually is.
What's really crafty is how the transport-layer security is effectively guarded by the observer effect and quantum superposition. Also, if this cryptographic scheme in question resembles that of one-time pads, you have a pretty secure deal here.
Quantum computing is far from practical at this stage though, and its primary purpose has always been cryptanalysis since its first hypotheses anyway. Very niche field.
-
Should this technology become practical,we would have a real challenge on our hands but is that not drives us.It drives me anyway.
-
I honestly wouldn't concern myself with it much at this point. I guess by the time it's practical we'll be seeing some pretty monstrous mining and cracking rigs...
-
Where quantum physics is concerned, am lost. But am sure of one thing that there will always be other was around all that since it still will be humans at the other end of the machines.
-
Thats what they said 10 years ago.
Everything thats created by humans can be broken by humans.
-
Everything thats created by humans can be broken by humans.
Except for one-time pads.
-
Except for one-time pads.
these are also as secure as there userIn cryptography (https://en.wikipedia.org/wiki/Cryptography), the one-time pad (OTP) is a type of encryption (https://en.wikipedia.org/wiki/Encryption) which has been proven to be impossible to crack (https://en.wikipedia.org/wiki/Cryptanalysis) if used correctly.
-
Except for one-time pads.
one time pads are only "theoretically" secure. Thats not even mentioning when they have been broken do to part of the text being known or suspected(cribed), or an error in the random generation of the one time key.
Also should point out that even the article says that its theory, and lets face facts every "secure" communication we have ever come up with, has been broken, i doubt this will prove different.
-
WEP = wired equivalant protection.
How about that :P
-
One time pad is information-technically secure as far as I remember. It was the situation that if you eliminate the potential of human errors and such, you can prove mathematically that the OTP cannot be broken.
Here the situation is actually similar. I won't go into a lot of detail due to the complexity of quantum mechanics (more information on how this works can be found here: http://evilzone.org/science/10-science-facts-per-day!/msg54856/#msg54856), but basically the idea is as follows:
A quantum computer uses the principle of quantum entanglement. This process is something that scientists are very successful in replicating, and we've established impressive records with this.
Quantum entanglement works as such: two particles separated by space can be "linked" together by a laser. When they become linked, or "entangled", any amount of space you put between them will not break this link.
Each particle has a property called "spin" which can be of two types: up and down. Down is 0, up is 1. The link makes sure that if I "poke" one of the particles and make it spin UP, it's entangled partner will INSTANTLY switch to a DOWN spin.
What does this mean? Well this is wireless communication. Imagine the following scenario: 10 particles on Earth are entangled with 10 particles on a spaceship. If I have the Earth particles as 0000000000, their entangled counterparts will have values of 1111111111. A simple quantum NOT-gate will insure a similar value for the qubits (quantum bits).
Now, if I modify my initial state of qubits to, lets say 0100011111, this state will be INSTANTLY (it's been measured that the speed of quantum entanglement is at least 100.000 faster than the speed of light) transmitted to the spaceship.
Why is this so secure you ask? Well the mechanism that quantum entanglement functions on is completely unknown. Speculation has been made by top scientists, but we're no closer to answering the question until we figure out the basic elements that everything is made of.
Basically this means we need to prove M-theory (most likely candidate so far) before even attempting to figure out how quantum entanglement works.
Given the above info, the simple deduction can be made that there is no way to intercept the communication. It's amazing to think about it, but it's almost as if the entangled particles are not two different entities, but rather just opposites of the same particle (i.e. one is the North of a magnet, one is the South of a magnet. Opposed but the same) which exist in two places at the same time.
No interception of the signal = no possibility to find info, crack info or modify info.
HOWEVER, it might be theoretically possible to entangle your own quantum computer with one of the other two! So in that case you would be receiving information as well. That's a problem, but it's been basically solved. All we need is a fully working quantum computer to test it out (quote taken from Wikipedia, and the names of the tech are links, so you can click on 'em):
Currently post-quantum cryptography is mostly focused on four different approaches:
- Lattice-based cryptography (http://en.wikipedia.org/wiki/Lattice-based_cryptography) such as NTRU (http://en.wikipedia.org/wiki/NTRU) and GGH (http://en.wikipedia.org/wiki/GGH_encryption_scheme)
- Multivariate cryptography (http://en.wikipedia.org/wiki/Multivariate_cryptography) such as Unbalanced Oil and Vinegar (http://en.wikipedia.org/wiki/Unbalanced_Oil_and_Vinegar)
- Hash-based signatures such as Lamport signatures (http://en.wikipedia.org/wiki/Lamport_signature) and Merkle signature scheme (http://en.wikipedia.org/wiki/Merkle_signature_scheme)
- Code-based cryptography (http://en.wikipedia.org/w/index.php?title=Code-based_cryptography&action=edit&redlink=1) that relies on error-correcting codes (http://en.wikipedia.org/wiki/Error-correcting_code), such as McEliece encryption (http://en.wikipedia.org/wiki/McEliece_cryptosystem) and Niederreiter signatures (http://en.wikipedia.org/wiki/Niederreiter_cryptosystem)
This was created by means of the PQCrypto conferences which started in 2006 and inspired many scientists to create algorithms that do not rely on mathematical phenomena in order to create security (i.e. RSA and modular arithmetic) but rather rely on the laws of physics in order to create a system that literally cannot be broken - as that would mean breaking a law of physics.
-
One time pad is information-technically secure as far as I remember. It was the situation that if you eliminate the potential of human errors and such, you can prove mathematically that the OTP cannot be broken.
A quantum computer uses the principle of quantum entanglement. This process is something that scientists are very successful in replicating, and we've established impressive records with this.
Given the above info, the simple deduction can be made that there is no way to intercept the communication. It's amazing to think about it, but it's almost as if the entangled particles are not two different entities, but rather just opposites of the same particle (i.e. one is the North of a magnet, one is the South of a magnet. Opposed but the same) which exist in two places at the same time.
No interception of the signal = no possibility to find info, crack info or modify info.
HOWEVER, it might be theoretically possible to entangle your own quantum computer with one of the other two! So in that case you would be receiving information as well. That's a problem, but it's been basically solved. All we need is a fully working quantum computer to test it out (quote taken from Wikipedia, and the names of the tech are links, so you can click on 'em):
This was created by means of the PQCrypto conferences which started in 2006 and inspired many scientists to create algorithms that do not rely on mathematical phenomena in order to create security (i.e. RSA and modular arithmetic) but rather rely on the laws of physics in order to create a system that literally cannot be broken - as that would mean breaking a law of physics.
The new crypto created for this, i will admit is new to me, and means i need to go do some reading, so thanks for that.
and again i get that one time pads are theoretically secure, and i DO know about quantum entanglement, though i doubt as much as you. Though it does beg the question of will we see a new age of super nasty virus's that "force" the entangled bits to transfer? As a "internet connection" will be unneeded for such a transfer it COULD create a scenario where once entangled you are always vulnerable to what you are entangled with.
Still that being said i was not taking into consideration how secure such a transfer is, even though it was rattling around my head, it just did not occur. Still time will tell if any of this provides true security, or if its just another dream.
-
and again i get that one time pads are theoretically secure, and i DO know about quantum entanglement, though i doubt as much as you. Though it does beg the question of will we see a new age of super nasty virus's that "force" the entangled bits to transfer? As a "internet connection" will be unneeded for such a transfer it COULD create a scenario where once entangled you are always vulnerable to what you are entangled with.
If you will do a bit of advanced reading on quantum mechanics everything will become clear! Quantum superposition is broken when a particle is observed (a measurement is performed on it) hence a virus or any other type of "software" can never actually operate the qubits. Quantum computer algorithms are a series of logic gates over which a frontend is applied, however the hardware is what operates with qubits at the quantum superposition/entanglement level; and this hardware passes results to the software just for simple data display and processing. A quantum virus would break the laws of physics literally.
Of course you can still infect the frontend in order to obtain some data, but that means you can at most snoop, never manipulate.
-
Read this
http://www.nature.com/news/2010/100829/full/news.2010.436.html (http://www.nature.com/news/2010/100829/full/news.2010.436.html)
Even quantum systems can be compromised.
-
Thanks Axon.
Im glad about this.
Those that claim things are secure wear suits not hoodies.
:D :P :)
-
Um. This is not really relevant to hacking.
I mean, yes, quantum computing and quantum communications could make it very very hard to intercept and capture data, but that does nothing to make the computer "hackproof". After all, data is still sent, received, processed, and user interacts with it in one way or another. Hacking does not have to take place during the transfer stage of data where quantum computing could make it impossible to capture the data along the way.
At the end, you will still need a connection. At the end there will still be software that manages the connection. There will be software listening to the connection and communicating over it. There will be a stupid user setting it up and configuring it.
At the end, its still the same. Tools might change, methods might even change, but at the end, its still the same game.
Doesn't matter if the computer is binary, quantum, or neural. If it does processing, you can "hack" it. One way or another.
-
@mord - i get what your saying, but kind of axon has already proven, we will find a way. You speak of this field, and its machines as if all is already known, when we have yet to even build a true quantum computer. How many discoveries, insights and inventions are necessary STILL to even get one of these up and running. To think that these things wont change, and improve our knowledge of quantum mechanics is ludicrous. At the same time with those changes, to think they wont create new security holes is equally absurd. It may be impossible with our current understanding and knowledge, but that does not mean that the knowledge does not exist, or the path to the knowledge doesnt exist that can allow quantum states to be altered or effected in ways we have yet to discover. So i think my "idea" if you will stands, its a interesting possibility, no it isnt feasible right now, but the system it would be operating on isnt even feasible right now.
Also feel i should point out that your talking about the "forced" transfer being detected, NOT prevented.
also also: any books/articles you recommend on the subject? if not i can just troll the interwebz, but i do want a bit of a deeper understanding of our current knowledge of this. (side note here: i had already read your 10 quantum facts, and feel it needs to be said: where are the rest of the promised daily facts damn it! i wants more.)
anyway look forward to the reply :)
-
@axon
I know that article. It's not actually really legit stuff to be perfectly honest. The issue is that currently the commercial (in the article you can see: "Quantum hackers have performed the first 'invisible' attack on two commercial quantum cryptographic systems) quantum computers and systems are pretty broken and incipient (I hope I'm using this right). Numerous physicists are claiming that although the efforts are useful for furthering the designs for systems, the fact that these companies claim they have literal quantum encryption systems is very misleading. They have experimental hardware.
And you can tell, because the quantum entanglement measurements are not done "for real". They say: "The cunning part is that while blinded, Bob's detector cannot function as a 'quantum detector' that distinguishes between different quantum states of incoming light. However, it does still work as a 'classical detector' — recording a bit value of 1 if it is hit by an additional bright light pulse, regardless of the quantum properties of that pulse. " The problem is that, as far as I understand how these systems work, this is not the method of operation of a standard quantum entanglement "sensor". If you would blind it with a laser, the sensor would behave erratically and not like a standard system. Also I think there is a particular way in which we can measure whether or not entanglement has been broken in the detector or not. This means that I could potentially see if I'm being tricked by checking whether or not I'm the one breaking the entanglement. If yes, I'm safe; if no, I'm being MitM'ed. I'm not quantum physicist though, so I can't be sure that this is 100% correct. I'm currently reading actually on this particular subject this thesis: http://www.physics.ox.ac.uk/qubit/carolina/content/Carolina_Thesis.pdf (http://www.physics.ox.ac.uk/qubit/carolina/content/Carolina_Thesis.pdf)
@namespace7
At the end, you will still need a connection. At the end there will still be software that manages the connection. There will be software listening to the connection and communicating over it. There will be a stupid user setting it up and configuring it.
Well yeah you can assume that. But then again if the connection is via quantum entanglement, then you need to somehow break that. Actually that's kinda the point; although of course you can infect the actual software on an end-point and get data out that way.
@Darkvision
I dunno what to say about that. Maybe the actual design will have flaws and such, but in regards to quantum knowledge, the missing points that refer to a computer are related to entanglement. Other unknowns don't affect a quantum computer cause they are about gravity, unified theory etc etc. I mean to say that we know the theory behind a quantum computer almost completely, except for the understanding of how entanglement actually works (the processes and phenomena behind it).
Now of course this can be called speculation given that there's no experimental evidence to back it up, but then again the mathematical and physics elements necessary to build a working quantum computer have been proven theoretically and have been tested via experiments (http://www.nature.com/nature/journal/v489/n7415/full/nature11472.html (http://www.nature.com/nature/journal/v489/n7415/full/nature11472.html)). It is true that these experiments were independent from each other, and we need to merge them, but a lot of smart people have been working on this, and the consensus currently is that it's doable in a secure way.
Check this out: http://www.technologyreview.com/view/514581/government-lab-reveals-quantum-internet-operated-continuously-for-over-two-years/ (http://www.technologyreview.com/view/514581/government-lab-reveals-quantum-internet-operated-continuously-for-over-two-years/)
But yes indeed. Maybe claiming information-technically secure for a quantum computer is not really correct. I do believe though that the security as compared to our current situation will be exponentially improved, at least.
L.E. : and feel it needs to be said: where are the rest of the promised daily facts damn it! i wants more.)
Thesis and shit bro. Can barely manage to keep myself alive <.< I'll put more stuff when it lightens down in a few days.