• About Us
  • Disclaimer for Pledge Times
  • T & C
  • Contact Us
Friday, March 31, 2023
Pledge Times
  • World
  • Business
  • Gaming
  • Tech
  • Entertainment
  • Science
  • Lifestyle
  • Health
  • Sports
  • World
  • Business
  • Gaming
  • Tech
  • Entertainment
  • Science
  • Lifestyle
  • Health
  • Sports
No Result
View All Result
Pledge Times
No Result
View All Result
Home World

Vulnerable in 53 hours and with a laptop a proposed password to avoid an attack with quantum computing

by admin_l6ma5gus
March 22, 2022
in World
0
Vulnerable in 53 hours and with a laptop a proposed password to avoid an attack with quantum computing

IBM quantum processor.

Security in the face of the next irruption of quantum computing —Jian-Wei Pan, the greatest expert in this science in China, believes that “the greatest advances will come in just five years”— is one of the great concerns of all protection systems of the world. The National Institute of Standards and Technology of the United States (NIST, for its acronym in English) has wanted to test seven encryption formulas to find out their vulnerability to new processing systems. Ward Beullens, from the IBM research center in Zurich (Switzerland), has managed to reveal an encrypted key in just 53 hours and with a simple laptop.

The challenge brought seven encryption models to the testbed. It was about creating an impenetrable technique to develop invulnerable transmission formulas. NIST received 69 proposals, of which only four encryption formulas and three secure signature formulas for identifying and carrying out financial transactions reached the final.

One of these last three models was Rainbow, a signature system that carries a secret key only known by the user and that can be verified by the recipient. Ward Beullens cracked the access system in just over a weekend, using only a laptop. And it is the second time that Beullens has achieved it. According to him, “the previous attack was also quite severe and it was already clear that Rainbow would not be standardized.”

See also  Bild said the failure of the German plan for the supply of LNG

The researcher, author of A study presented at the International Association for Cryptologic Research, explains: “Both attacks reduce the security level of the Rainbow proposal below the requirements established by NIST. However, our attacks are still exponential and Rainbow can be saved by increasing the parameter sizes by a relatively small amount.”

Ray Perlner and Daniel Smith-Tone, two mathematical researchers involved in the NIST standardization process, agree on the analysis, which analyzes candidate systems to provide security against the advanced threat of quantum computers. According both scientists stated at NISTprior to the current selection process, “none of Rainbow’s parameters meet the claimed level of security”, but admit that small changes are possible so that you can meet them.

However, Dustin Moody, also of the National Institute of Standards and Technology, believes that “the attack on Rainbow has been proven and, now, it is unlikely that the method will be chosen as the final signature algorithm.”

Quantum computers are exponentially more powerful at breaking many encryption techniques than classical computers

Mark Webber, University of Sussex

Quantum computing is a race in parallel to the security problems it will generate. On the one hand, this science has enormous potential. According to the physicist from the University of Seville Adán Cabello, “it will allow quantum physics to be verified in regions that were inaccessible until now”. But they also pose a risk. For Mark Webber of the University of Sussex and lead author of an investigation in AVS Quantum Science“quantum computers are exponentially more powerful at breaking many encryption techniques than classical computers.”

See also  Japanese Foreign Minister receives an invitation to visit China

Webber warns that the ciphers used by Bitcoin (elliptic curve digital signature algorithm) will one day be vulnerable to a quantum computing attack, although he clarifies: “Today, even the largest supercomputer could never pose a serious threat.”

A current conventional computer uses the bit as the basic unit of information (which can take two values). In a quantum computer, the basic unit is the quantum bit, or qubit, which has an infinite number of states. According to Webber, state-of-the-art quantum computers today only have between 50 and 100 qubits and, according to his team’s research, it would take up to 300 million physical qubits to break Bitcoin’s security.

Although it seems unattainable, the Sussex quantum researcher warns that future advances may further reduce the requirements for improvements in both quantum algorithms and error correction protocols: “Four years ago, we estimated that a trapped ion device would need 1 billion physical qubits to break RSA encryption [la encriptación utilizada para la mayoría de comunicaciones seguras], which would require a 100 by 100 meter device. Now, with improvements across the board, this could see a dramatic reduction to an area of ​​just 2.5 by 2.5 metres.”

See also  The new Abu Dhabi University campus in Al Ain is named after Tahnoun bin Mohammed

And for Bitcoin it will also be a problem. According to Webber, “Bitcoin network could perform secure quantum encryption techniques, but this may result in network scaling issues due to higher memory requirement.”

For Jian-Wei Pan, security has to be a significant aspect of the development of quantum computing, but he believes that the latter should be the priority: “Building a practically useful and fault-tolerant quantum computer is one of the great challenges for the human being I am more concerned with how and when we will build one. The most formidable challenge in building a large-scale universal quantum computer is the presence of noise and imperfections. We need to use quantum error correction and fault-tolerant operations to overcome noise and scale the system.”

You can write to us [email protected]will follow THE COUNTRY TECHNOLOGY on Facebook and Twitter and sign up here to receive our weekly newsletter

Exclusive content for subscribers

read without limits


#Vulnerable #hours #laptop #proposed #password #avoid #attack #quantum #computing

admin_l6ma5gus

admin_l6ma5gus

Related Posts

All conscripts of the spring conscription will serve in Russia

All conscripts of the spring conscription will serve in Russia

by admin_l6ma5gus
March 31, 2023
0

Tsimlyansky said that all conscripts of the spring draft in 2023 will serve in RussiaAll conscripts of the spring conscription...

The Russian military eliminated the Ukrainian drone “Valkyrie”

The Russian military eliminated the Ukrainian drone “Valkyrie”

by admin_l6ma5gus
March 31, 2023
0

Russian servicemen prevented an attempt by the Armed Forces of Ukraine (AFU) to conduct reconnaissance in force in the South...

A Ukrainian official reveals the extent of Kiev’s control over Bakhmut

A Ukrainian official reveals the extent of Kiev’s control over Bakhmut

by admin_l6ma5gus
March 31, 2023
0

"Ukraine controls a third of Bakhmut, as confirmed by international observers," Leshchenko said during a press conference broadcast by the...

What explains why sake is becoming popular in the United States?

What explains why sake is becoming popular in the United States?

by admin_l6ma5gus
March 31, 2023
0

When Shinobu Kato first tasted sake as a young man in Tokyo, it tasted strong. But a colleague told him...

The doctor called the time of increased risk of contracting sexually transmitted diseases

The doctor called the time of increased risk of contracting sexually transmitted diseases

by admin_l6ma5gus
March 31, 2023
0

Urologist Apolikhin: the risk of contracting a venereal disease increases during menstruationThe risk of contracting a sexually transmitted disease increases...

The police deactivate an explosive that some thieves had tied to a guard of a pawn shop in Guayaquil

The police deactivate an explosive that some thieves had tied to a guard of a pawn shop in Guayaquil

by admin_l6ma5gus
March 31, 2023
0

When it seemed that organized crime in Ecuador had shown its worst face with the detonation of car bombs in...

Next Post
The Omicron BA2 variant is “much more contagious” and “almost impossible” to avoid

The Omicron BA2 variant is "much more contagious" and "almost impossible" to avoid

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Vaccinated persons should pay attention to this before and after the spade

Vaccinated persons should pay attention to this before and after the spade

1 year ago
Skin diseases, more accurate diagnosis with digital image library and AI

Skin diseases, more accurate diagnosis with digital image library and AI

9 months ago

Popular News

    • About Us
    • Disclaimer for Pledge Times
    • T & C
    • Contact Us
    Email us: [email protected]
    No Result
    View All Result
    • World
    • Business
    • Science
    • Entertainment
    • Gaming
    • Movie
    • Music
    • Sports
    • Fashion
    • Lifestyle
    • Tech
    • Health