Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Encryption Promises Unbreakable Codes
AP ^ | Nov. 16, 2003 | BRIAN BERGSTEIN

Posted on 11/17/2003 11:36:17 AM PST by Cultural Jihad

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last

1 posted on 11/17/2003 11:36:18 AM PST by Cultural Jihad
[ Post Reply | Private Reply | View Replies]

To: msdrby
ping
2 posted on 11/17/2003 11:42:24 AM PST by Prof Engineer (This is NOT the government the Founders intended. ~ Golden Corral supports troops and veterans)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
In some super-high-security settings, people sharing passwords and other information must have the same key . . .

WRONG! The AP screws up again.

3 posted on 11/17/2003 11:45:08 AM PST by LibWhacker
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mitchell
Ping
4 posted on 11/17/2003 11:46:06 AM PST by Allan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ.

Silently, the cracker smirks, and begins his work.

5 posted on 11/17/2003 11:47:32 AM PST by per loin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
Any guesses on how long it will be before someone breaks these codes. If you build a better mouse trap the world builds a better mouse. All codes are breakable.
6 posted on 11/17/2003 11:47:43 AM PST by RiflemanSharpe (An American for a more socially and fiscally conservation America!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RiflemanSharpe
Not Enigma!

Herman Goering
7 posted on 11/17/2003 11:51:03 AM PST by don'tbedenied
[ Post Reply | Private Reply | To 6 | View Replies]

To: RiflemanSharpe
They won't be broken until new laws of the physical universe are discovered. Quantum mechanics has been verified to exacting detail.
8 posted on 11/17/2003 11:52:08 AM PST by glorgau
[ Post Reply | Private Reply | To 6 | View Replies]

To: per loin
The weakest point of any, and I do mean ANY encryption scheme is the humans at each end.

Enigma was broken because the transmission format used by the Germans had each station use their 3 digit call sign to start the message.
9 posted on 11/17/2003 11:52:48 AM PST by taxcontrol (People are entitled to their opinion - no matter how wrong it is.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Cultural Jihad
Sigh. The title should be:

"Cracker and Hackers Rejoice, something new to figure out! first one wins a prize!"

10 posted on 11/17/2003 11:54:23 AM PST by whattajoke (Neutiquam erro.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
Any encryption key that is used more than once is breakable, without exception. It could take an extremely long time to get broken, but it is doable.
11 posted on 11/17/2003 11:56:28 AM PST by jpl
[ Post Reply | Private Reply | To 1 | View Replies]

To: per loin
uh - silently the NSA smirks because they know the backdoors to anything like this in case it becomes a Tool for Allah.
12 posted on 11/17/2003 11:57:08 AM PST by epluribus_2
[ Post Reply | Private Reply | To 5 | View Replies]

To: Cultural Jihad
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code.

OK.... So basically they're claiming that if I put a splitter in the line, and hook up the alternate line to my stolen box, the photon will be altered and I can't read the message? Somehow I doubt it.

Also, any fiber-optic line losses would undoubtedly include the occasional encryption photon -- so clearly there's gonna have to be some sort of error detection/correction algorithm involved.

(sniff sniff) Is that marketing I smell....?

13 posted on 11/17/2003 12:00:33 PM PST by r9etb
[ Post Reply | Private Reply | To 1 | View Replies]

To: RiflemanSharpe
I note that this seems to rely on the fact that any attempt to copy a message will destroy the message to the originally designated recipient. Thus the seemingly best strategy is to intercept and make to copies doing a retransmission to the original designated recipient.
14 posted on 11/17/2003 12:02:20 PM PST by harpseal (stay well - Stay safe - Stay armed - Yorktown)
[ Post Reply | Private Reply | To 6 | View Replies]

To: LibWhacker
Same public key, not private key.
15 posted on 11/17/2003 12:03:47 PM PST by stainlessbanner
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cultural Jihad
Man made it, man can crack it.
16 posted on 11/17/2003 12:06:01 PM PST by mtbopfuyn
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cultural Jihad
The theory follows the Heisenberg Uncertainty Principle. Of course, adding relay points along the way can interrupt signals. Also, as any computer hacker can tell you, social engineering and compromising the box are methods that work quite well.
So what if you can't listen-in on the conversation. Attack the end point boxes and you should get plain-text copy. Also, exploit the fragility of the system by purposely messing with it so that it becomes "unreliable". If you can consistently or even inconsistently disrupt the "secure" channel, then the black boxes become unreliable and will need to be replaced.
17 posted on 11/17/2003 12:08:27 PM PST by yevgenie (Byte me. Or is that yBetm .e ? Which end of the egg do you break first?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sourcery
ping
18 posted on 11/17/2003 12:10:16 PM PST by Libertarianize the GOP (Ideas have consequences)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Cultural Jihad
There have always been unbreakable codes, and 98C T9's to break them.
19 posted on 11/17/2003 12:13:20 PM PST by ASA Vet ("Right-wing Internet wacko")
[ Post Reply | Private Reply | To 1 | View Replies]

To: epluribus_2
There is No Such Agency.
20 posted on 11/17/2003 12:16:46 PM PST by ASA Vet ("Right-wing Internet wacko")
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson