Unauthorized Access of Pentagon Network

solarz

Brigadier
I got the idea you are saying the modern encryption simply depending on the scarce of big Prime Numbers... that's true. Manipulating prime numbers is all what computer science do.

I didn't get the "P=NP" stuff, "Prime=Non-Prime" ? That one day non-primes can be used as encryption seed?

Please, Log in or Register to view URLs content!


If P = NP, then any encryption that can be verified in polynomial time can also be solved in polynomial time.

However, "P = NP" is not so much a problem that needs to be solved, but rather a hypothesis that needs to be definitively proven or disproven.

Now the real challenge to encryption is quantum computing. Once that happens, we can just brute force any encryption.
 

Red___Sword

Junior Member
Thanks solarz.

"Quantum computing" in my own understanding, is a description of computiation capability, rather than a specific computation method, as such, let's look at the brighter side, it would crack any current encryption with rather small amount of time with brutal force attack - but in quantum age, I think the quantum encryption could also be like real-time computational encryption, simply say, encryption do not depending on anything like "keys" but the realtime computaion of encryption METHOD on its own.

How it feasible, I have no idea, but I am sure this would be the key to the future interstellar communication, where there is no way any kind of "connection" can be established at a materistical level, but only logical level of synchronized quantum computation.
 

solarz

Brigadier
Thanks solarz.

"Quantum computing" in my own understanding, is a description of computiation capability, rather than a specific computation method, as such, let's look at the brighter side, it would crack any current encryption with rather small amount of time with brutal force attack - but in quantum age, I think the quantum encryption could also be like real-time computational encryption, simply say, encryption do not depending on anything like "keys" but the realtime computaion of encryption METHOD on its own.

How it feasible, I have no idea, but I am sure this would be the key to the future interstellar communication, where there is no way any kind of "connection" can be established at a materistical level, but only logical level of synchronized quantum computation.

I think you're confusing encryption with encoding. Encoding means turning a meaningful message into electronic signals that can travel along your medium of choice. Usually, that means signals that are interpreted as 0's and 1's.

Encryption means garbling that message into something incomprehensible unless you know the "key" that allows you to ungarble it.

Please, Log in or Register to view URLs content!


Really at this point, we can only speculate on how powerful quantum computers would be. Maybe they will be fast enough to completely change the way we view computing, or maybe they will only be a change in computation power of a few orders of magnitudes.
 

Red___Sword

Junior Member
I think you're confusing encryption with encoding. Encoding means turning a meaningful message into electronic signals that can travel along your medium of choice. Usually, that means signals that are interpreted as 0's and 1's.

Encryption means garbling that message into something incomprehensible unless you know the "key" that allows you to ungarble it.

Please, Log in or Register to view URLs content!


Really at this point, we can only speculate on how powerful quantum computers would be. Maybe they will be fast enough to completely change the way we view computing, or maybe they will only be a change in computation power of a few orders of magnitudes.

I am aware the difference between encoding and encryption, what I stated, is a speculation of future encryption, when in front of quantum computation power, our current understanding of "encryption" which virtually based on computation difficulty, means little. So I provide one opinion that what future encryption dose, is just simply non-stop, non-pattern, quantum computation, which provides endless encryption keys in real time, which only decryption, is the same synchronous quantum computation, to "count" what key is supposed to be used now for this secrured transmission, at this time.

It's a little bit like "The Perfect cipher" where cipher (and keys) runs endless - the supposed perfect cipher is still block cipher running from a certain pattern of encryption - quantum computation may be can provide us even more... But I admit I have no idea how we comprehend such thing in our current perspect of "encryption"...

In short, quantum computaion dose sparks dreams.
 

xywdx

Junior Member
I think quantum computation sparks misunderstandings.
It does not offer more processing power per say, in fact it probably offers less for the same amount of resources invested. The reason it is pursued is because of its ability to solve certain problems faster than the classical computer, this is because quantum computers can store, recognize, and process data in a way that is impossible for classical computers.

Let me give you a grossly simplified example, let's say you are trying to calculate 42548294 * 53247681 on your calculator by performing 53247680 additions, whereas I perform a single multiplication on my calculator.
It takes me far less time to get the answer, but it doesn't mean my calculator is more powerful than yours.
 

no_name

Colonel
Asperger’s Added to British Hacker’s Defense

The case of the British conspiracy buff who hacked his way onto the wrong side of American law at a particularly sensitive time would seem to have reached a crucial point.

After several legal twists and turns, Gary McKinnon seems to have run out of ways to avoid extradition to the United States, where a prosecutor accused him of “the biggest hack of military computers ever detected,” but his defense is beginning to emphasize the suspect’s recent diagnosis to influence the proceedings.

The European Court of Human Rights was asked to step in on the grounds that Mr. McKinnon faced the possibility of “inhuman or degrading treatment” if he ended up in an American prison. The request was denied today, ending his attempt to stop the extradition in court.

“The appeal is lost,” Karen Todner, a lawyer for Mr. McKinnon, said, according to Reuters. “He is completely distraught, all of them are, his family, his girlfriend.”

Ms. Todner said that he could be put on a flight to the United States within three weeks unless a British official decides to reverse his earlier refusal to intervene in the case. Since the first decision, Asperger’s syndrome, which is considered a form of autism, was diagnosed in Mr. McKinnon.

Long before the medical ruling, Mr. McKinnon and his lawyers have said that he meant no harm by hacking into nearly 100 United States government networks between 2001 and 2002. While prosecutors agree that he was simply searching for U.F.O.’s and other government secrets, they also said that Mr. McKinnon temporarily disabled crucial national security systems as the nation was wary of follow-up attacks to 9/11.

Those charges, which he denies, seem closer than ever to being presented in an American court. If the British government is not swayed by the Asperger’s diagnosis, an American judge may be.

Last month, a federal judge in the Pittsburgh area named Gustave Diamond refused to send a 20-year-old man convicted of building about two dozen pipe bombs to jail for any amount of time — let alone the prosecutor’s recommendation of 24 to 30 months. The chief reason? Asperger’s syndrome.

“I have no doubt that his makeup, in this case a definable disorder, led him to commit this crime,” he said, according to The Pittsburgh Tribune-Review. “He’s never committed an act of violence of any kind, nor has he threatened an act of violence of any kind.”

Please, Log in or Register to view URLs content!


McKinnon is accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, using the name 'Solo'. The computer networks he is accused of hacking include networks owned by NASA, the US Army, US Navy, Department of Defense, and the US Air Force.

The US authorities claim he deleted critical files from operating systems, which shut down the US Army’s Military District of Washington network of 2,000 computers for 24 hours, as well as deleting US Navy Weapons logs, rendering a naval base's network of 300 computers inoperable after the September 11th terrorist attacks. McKinnon is also accused of copying data, account files and passwords onto his own computer. US authorities claim the cost of tracking and correcting the problems he caused was over $700,000.

McKinnon has denied causing any damage, arguing that, in his quest for UFO-related material, he accessed open, unsecured machines with no passwords and no firewalls and that he left countless notes pointing out their many security failings. He disputes the damage and the financial loss claimed by the US as concocted in order to create a dollar amount justifying an extraditable offence. While not admitting that it constituted evidence of destruction, McKinnon did admit leaving a threat on one computer:

US foreign policy is akin to Government-sponsored terrorism these days … It was not a mistake that there was a huge security stand down on September 11 last year … I am SOLO. I will continue to disrupt at the highest levels …

US authorities claim that McKinnon is trying to downplay his own actions. A senior military officer at the Pentagon told The Sunday Telegraph: "US policy is to fight these attacks as strongly as possible. As a result of Mr McKinnon's actions, we suffered serious damage. This was not some harmless incident. He did very serious and deliberate damage to military and Nasa computers and left silly and anti-America messages. All the evidence was that someone was staging a very serious attack on US computer systems."
 

Red___Sword

Junior Member
I think quantum computation sparks misunderstandings.
It does not offer more processing power per say, in fact it probably offers less for the same amount of resources invested. The reason it is pursued is because of its ability to solve certain problems faster than the classical computer, this is because quantum computers can store, recognize, and process data in a way that is impossible for classical computers.

Let me give you a grossly simplified example, let's say you are trying to calculate 42548294 * 53247681 on your calculator by performing 53247680 additions, whereas I perform a single multiplication on my calculator.
It takes me far less time to get the answer, but it doesn't mean my calculator is more powerful than yours.

Yes, thanks for the very proper example.

Quantum computation in a sense dose offers unlimited (or at least astonishing) computational power, to, what we today have BIG problem with - logarithm computation.

Modern security of computer science pretty much is building on the foundation, of the hard to solve logarithm problems. A security mechnism is considered secure enough, if brute force attack can not breach it in a certain amount of desired time - The only reason only brute force can (have a chance) to breach it, is because reverse-engineering to solving the respective logarithm problem (to bypass the unknown keys) is as good as (as effectiveless as) brute force attack. Quantum computation supposed to throw that scene into dust bin.

But thank you, to remind me indeed quantum computer is not magic work, it dose not twist the world into something we can not live on like fictionly it dose.
 

nosh

Junior Member
I agree with this guy

Please, Log in or Register to view URLs content!


duduong wrote:
Judging the status of the global cyber war by public information will lead you to a very very wrong conclusion. In reality, numerous advanced OFFENSIVE efforts must have been undertaken by the CIA and the Pentagon over the years, probably yielding much more than any efforts by the Chinese or Russians. Just look at the Stuxnet Virus. It is so advanced that I cannot imagine any other nations on earth being able to match its level of sophistication.
 
Top