Skip to comments.
Encryption Promises Unbreakable Codes
AP ^
| Nov. 16, 2003
| BRIAN BERGSTEIN
Posted on 11/17/2003 11:36:17 AM PST by Cultural Jihad
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-42 next last
To: msdrby
ping
2
posted on
11/17/2003 11:42:24 AM PST
by
Prof Engineer
(This is NOT the government the Founders intended. ~ Golden Corral supports troops and veterans)
To: Cultural Jihad
In some super-high-security settings, people sharing passwords and other information must have the same key . . . WRONG! The AP screws up again.
To: Mitchell
Ping
4
posted on
11/17/2003 11:46:06 AM PST
by
Allan
To: Cultural Jihad
"There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ. Silently, the cracker smirks, and begins his work.
5
posted on
11/17/2003 11:47:32 AM PST
by
per loin
To: Cultural Jihad
Any guesses on how long it will be before someone breaks these codes. If you build a better mouse trap the world builds a better mouse. All codes are breakable.
6
posted on
11/17/2003 11:47:43 AM PST
by
RiflemanSharpe
(An American for a more socially and fiscally conservation America!)
To: RiflemanSharpe
Not Enigma!
Herman Goering
To: RiflemanSharpe
They won't be broken until new laws of the physical universe are discovered. Quantum mechanics has been verified to exacting detail.
8
posted on
11/17/2003 11:52:08 AM PST
by
glorgau
To: per loin
The weakest point of any, and I do mean ANY encryption scheme is the humans at each end.
Enigma was broken because the transmission format used by the Germans had each station use their 3 digit call sign to start the message.
9
posted on
11/17/2003 11:52:48 AM PST
by
taxcontrol
(People are entitled to their opinion - no matter how wrong it is.)
To: Cultural Jihad
Sigh. The title should be:
"Cracker and Hackers Rejoice, something new to figure out! first one wins a prize!"
10
posted on
11/17/2003 11:54:23 AM PST
by
whattajoke
(Neutiquam erro.)
To: Cultural Jihad
Any encryption key that is used more than once is breakable, without exception. It could take an extremely long time to get broken, but it is doable.
11
posted on
11/17/2003 11:56:28 AM PST
by
jpl
To: per loin
uh - silently the NSA smirks because they know the backdoors to anything like this in case it becomes a Tool for Allah.
To: Cultural Jihad
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code. OK.... So basically they're claiming that if I put a splitter in the line, and hook up the alternate line to my stolen box, the photon will be altered and I can't read the message? Somehow I doubt it.
Also, any fiber-optic line losses would undoubtedly include the occasional encryption photon -- so clearly there's gonna have to be some sort of error detection/correction algorithm involved.
(sniff sniff) Is that marketing I smell....?
13
posted on
11/17/2003 12:00:33 PM PST
by
r9etb
To: RiflemanSharpe
I note that this seems to rely on the fact that any attempt to copy a message will destroy the message to the originally designated recipient. Thus the seemingly best strategy is to intercept and make to copies doing a retransmission to the original designated recipient.
14
posted on
11/17/2003 12:02:20 PM PST
by
harpseal
(stay well - Stay safe - Stay armed - Yorktown)
To: LibWhacker
Same public key, not private key.
To: Cultural Jihad
Man made it, man can crack it.
To: Cultural Jihad
The theory follows the Heisenberg Uncertainty Principle. Of course, adding relay points along the way can interrupt signals. Also, as any computer hacker can tell you, social engineering and compromising the box are methods that work quite well.
So what if you can't listen-in on the conversation. Attack the end point boxes and you should get plain-text copy. Also, exploit the fragility of the system by purposely messing with it so that it becomes "unreliable". If you can consistently or even inconsistently disrupt the "secure" channel, then the black boxes become unreliable and will need to be replaced.
17
posted on
11/17/2003 12:08:27 PM PST
by
yevgenie
(Byte me. Or is that yBetm .e ? Which end of the egg do you break first?)
To: sourcery
ping
To: Cultural Jihad
There have always been unbreakable codes, and 98C T9's to break them.
19
posted on
11/17/2003 12:13:20 PM PST
by
ASA Vet
("Right-wing Internet wacko")
To: epluribus_2
There is No Such Agency.
20
posted on
11/17/2003 12:16:46 PM PST
by
ASA Vet
("Right-wing Internet wacko")
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-42 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson