Skip to main content

The RSA encryption algorithm has fallen.

Chinese researchers used quantum computers to break the RSA encryption. That thing means that the base algorithm has lost its trustworthiness. So to deny hackers' actions we should rethink our internet and its encryption quite soon, or we will be in trouble. 

Quantum computers and AI are tools that can break any code. That made using binary systems. When we think about principles. That the China has in the quantum race, we must ask how long they have cracked those protection algorithms. Quantum computers are tools that can bring the arms race into the new spheres. 

And that sphere is the cyber attack that can take down at least communication and positioning systems. The quantum computer can also hack things like GPS encryption. And that makes it possible to create effective spoofing attacks. Against global positioning systems. That kind of attack might have unexpected consequences. And it can cause danger to both, civil and military operations. 



That means we should protect data more effectively. 


The thing is that we should develop more effective encryption methods. One of them is that the transmitting system can use different physical routes for transmitting information. That system shares those data bites between two or more routes. That makes it hard to collect that data back to its entirety without encryption keys. 

And of course, those attackers must know physically, where the data cables that transport data are. The system can also use optical cables where the outside glass fibers transport only light that protects data from the outsider's eyes. In some other versions, the data travels in the hollow laser ray. 

That electromagnetic wormhole denies the outsider to see the information. In some other versions, the radio masers transport data through nanotubes that form a Faraday cage around that radio beam. That cage protects information that travels in those wires. 

In quantum network technology denies the attacker to see the information. The system involves a photonic system, that drives information storing it to photons. The photonic system can share data on different routes. And that makes it harder to steal information. 

Things like electromagnetic protections deny that the recon robots cannot send unauthorized signals from data centers. That thing also denies the mobile telephone messages. The protector can put data travel through the controlled relay stations. 





The new threat is the physical robots. 


Things like neural computers and other kinds of tools are things that can collect data from large areas. The new AI-based systems that can operate as physical and virtual modes are tools that leave everybody without protection. The small quadcopters and other robots like robot hovers can collect data from their environment. 

The robot hovers that computer viruses are infected and can pollute other systems. Those hovers can also send information about their entirety. Or they can transport the spy robot. 

The AI-controlled drone can connect itself to data cables. The system can have a toolbox that it can use to cut the data cable. And then it can connect those data cables to travel through itself. Then it can route all data through its modem, and attackers can get all data from that system into their hands. 

Those small systems can also observe screens and send data to other drones or receivers using radio masers or IR and UV lasers. And those physical systems require sharp and effective code. 


https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html

Images created by Bing. 

Comments

Popular posts from this blog

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with th

Nanoparticles are excellent tools for medicine transporters.

"Researchers have developed a new therapy for pancreatic cancer involving nanoparticles that stimulate immune responses and improve drug delivery. This innovative method has led to significant tumor reduction in mice and holds potential for treating other cancers. Credit: SciTechDaily.com" (ScitechDaily, New Nanoparticle Cancer Treatment Successfully Shrinks and Eliminates Pancreatic Tumors) Nanoparticles can carry medicines into wanted cells. The idea is that the same system that feeds those cells transports those nanoparticles into cells that need medicine. When a nanoparticle goes, into a cell, it releases the chemicals into the targeted cells. Because nanoparticles don't let medical molecules interact with a body that makes it possible to create new and more powerful cytostatics. Nanoparticles can transport things like ricin molecules into wanted cells.  Ricin is one of the most poisonous chemicals. That chemical is useful for next-generation cytostatics, if researche

Mythic Planet X is an interesting thing because that allows the way to the perfect stealth technology.

  Mythic Planet X is an interesting thing because that allows the way to the perfect stealth technology.  Could a hypothetical Planet X tunnel all radiation?  The myth of Planet X still lives. Nobody ever saw that planet, and the thing that supports the theory of previously unknown large-size planets in Kuiper's belt are mysterious anomalies in Neptune's trajectory. The thing is that nothing else supports the theory of the existence of the "invisible planet". The size of the planet must be very big. And its gravitational field strong that it can affect Neptune's trajectory.  And the search for that mysterious planet is very long work. In some visions, the mysterious gravitational source is mentioned as the small black hole, but nobody understands why that black hole doesn't seem to interact.  In some other theories, Planet X is a glimpse of dark matter. And that thing makes it invisible. But there is one weakness. The dark matter object must have some kind of