Free Republic
Browse · Search
General/Chat
Topics · Post Article

We must not permit a quantum computer gap!

Fixing things will be tricky.

Time to start stocking up on liquid nitrogen?

And maybe you thought the bitcoin miners had some high-zoot hardware?

1 posted on 10/24/2018 8:19:53 AM PDT by DUMBGRUNT
[ Post Reply | Private Reply | View Replies ]


To: DUMBGRUNT

Q is missing.


2 posted on 10/24/2018 8:23:05 AM PDT by DannyTN
[ Post Reply | Private Reply | To 1 | View Replies ]

To: DUMBGRUNT

There’s not enough computing power on the planet that thwart the Block Chain technology behind Bit Coin and other cryptocurrencies (that’s a fact).


4 posted on 10/24/2018 8:27:57 AM PDT by Scythian_Reborn
[ Post Reply | Private Reply | To 1 | View Replies ]

To: DUMBGRUNT

Just use a quantum computer to create new encryption.


6 posted on 10/24/2018 8:36:21 AM PDT by cuban leaf
[ Post Reply | Private Reply | To 1 | View Replies ]

To: DUMBGRUNT
Very soon no ones Secret Ballistic Launch Codes will be safe!


7 posted on 10/24/2018 8:36:56 AM PDT by Delta 21 (.....been here this long you actually expect me to read the article....)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: DUMBGRUNT

From the article:

For example, in 1996 researchers reported the first weaknesses in md5, a type of widely used cryptographic algorithm called a hash function. A drop-in replacement was readily available in the form of another algorithm called sha-1. After more than two decades of exhortations to upgrade, though—not to mention high-profile cyber-attacks exploiting md5’s weaknesses—the older algorithm is often still used.

I would point out that a default configuration of Microsoft Active Directory uses an un-salted MD5 hash of the passwords. So if a domain is using such an AD configuration, and a hacker is able to capture a log in sequence, the hash of the password is transmitted. The hacker can then OFFLINE crack that password.

I have built a custom cracking rig for my company and we offer a service called PASS that tests the strength of passwords. To give you and idea of the performance, against a target set of 2,000 accounts in the AD, we tested 2.1 billion passwords that we scraped from the darkweb in less than 5 minutes. When testing our client’s AD accounts, we normally have a success rate of 20 to 25% for guessing passwords.

You may want to consider replacing AD with OpenLDAP and used the crypt or salted SHA hash to protect passwords. However, be aware that migrating from AD to OpenLDAP is a significant project.


12 posted on 10/24/2018 8:57:13 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies ]

To: DUMBGRUNT

The quantum computer runs on Windows 10 and no one knows what it might be capable of, since it has been installing updates since it was turned on.


15 posted on 10/24/2018 10:49:28 AM PDT by Dalberg-Acton
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson