Skip to main content

The laptop computer broke in 53 hours an encryption code, which prevented to deny the quantum-computer attack.




This thing shows the weakness of quantum computers. The error handling and disturbing handling are not yet effective enough. And another thing is that quantum computers are not so usual things that they will turn to regular tools for programmers. 

The thing is that there are no programmers on Earth who have so-called large-scale experience of working with quantum computers. So without error-handling. There is a large number of errors in the program code and algorithms. That is made by using quantum computers. 

What part of the broken algorithm was made by using the quantum computer? That thing is not mentioned in the news. That is linked below this text. The fact is that the encryption codes that are made by using binary computers are useless against the quantum computer. 

There is the possibility that quantum computers are used only to generate the prime number that is used in the encryption process. If the algorithms are made by using binary computers. There would be no problem for breaking it with a quantum computer. 


x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x


The zero-point in the Riemann hypothesis causes the re-estimation of the encryption that uses prime numbers. 


The computers are using Riemann conjecture that is also known as Riemann conjecture for that purpose. There are zero points in that conjecture or "Zeta function". So there should be found some other way to create prime numbers. 



Image: Zero-points in Riemann hypothesis. 


"The real part (red) and imaginary part (blue) of the Riemann zeta function, along with the critical line Re(s) = 1/2. The first nontrivial zeros can be seen at lm(s) = ±14.135, ±21.022, and ±25.011". (Wikipedia/Riemann hypothesis)

Even if there is a zero-point in Riemann's conjecture in the point Re(s) 1/2. There is a possibility to generate prime numbers by using this formula. If there are only a couple of zero points. Into the program code must just involve a command. That denies using of those points. ("Don't use the point Re(s)=1/2)" would be the command). 

But as you see from the film at the top of this text there are five zero points in the Riemann zeta function that is also known Riemann hypothesis and Riemann conjecture. There is the possibility that there are more zero points. And if the Riemann Zeta function is used in the encryption algorithm. Those points should involve to "don't use list". 

But in higher-level encryption that is needed in the most secured data transmission, there is the possibility that Riemann conjecture or hypothesis is not enough to reach the Pretty Good Privacy level in the highest secured data transmission. 


x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x-x



The hacker cannot predict time what breaking the algorithms takes. 


When we are thinking that the hacker uses 53 hours to crack some algorithm we must remember one thing. Before the code-braking process, the hacker cannot predict how long that process takes. So when the code braking process begins the system can handle that problem from one minute to 10000 hours. And as you see code-braking requires patience. 

But maybe quantum computers are not very common systems yet. Yet those systems are not creating the large-scale risk for the things like crypto-currencies. Those computers are in well-guarded laboratories. But in the future, the situation will change. 

The quantum computers turn more common. And those systems turn private-owned. Also, the experience of programming and error-handling in quantum computing will advance. And that makes it possible that quantum computers will scale themselves across the internet. When we are thinking about quantum computers. They will repeat the history of computers. The first computers were in laboratories. 

And they were used by very highly trained people. But then those systems turned more common, cheaper and finally, even ordinary people could find those things. The Apple's Lisa and IBM PC (Personal Computer) was the first breakthrough for computers. The second breakthrough was the pocket-size mobile devices or "smartphones". That allows people to be connected to the internet all the time. 

And then we might think that the quantum computers are following this way. Maybe sooner than we think we can see the quantum-personal computers in the supermarkets. 


https://english.elpais.com/science-tech/2022-03-24/using-just-a-laptop-an-encryption-code-designed-to-prevent-a-quantum-computer-attack-was-cracked-in-just-53-hours.html


https://en.wikipedia.org/wiki/Riemann_hypothesis


Image:https://en.wikipedia.org/wiki/Riemann_hypothesis


https://miraclesofthequantumworld.blogspot.com/

Comments

Popular posts from this blog

The LK-99 could be a fundamental advance even if it cannot reach superconductivity in 400K.

The next step in superconducting research is that LK-99 was not superconducting at room temperature. Or was it? The thing is that there is needed more research about that material. And even if it couldn't reach superconductivity in 400K that doesn't mean that material is not fundamental. And if LK-99 can maintain its superconductivity in 400K that means a fundamental breakthrough in superconducting technology.  The LK-99 can be hype or it can be the real thing. The thing is, anyway, that high-voltage cables and our electric networks are not turning superconducting before next summer. But if we can change the electric network to superconducting by using some reasonable material. That thing can be the next step in the environment. Superconductors decrease the need to produce electricity. But today cooling systems that need lots of energy are the thing that turn superconductors that need low temperatures non-practical for everyday use.  When the project begins there is lots of ent

Black holes, the speed of light, and gravitational background are things that are connecting the universe.

 Black holes, the speed of light, and gravitational background are things that are connecting the universe.  Black holes and gravitational waves: is black hole's singularity at so high energy level that energy travels in one direction in the form of a gravitational wave.  We normally say that black holes do not send radiation. And we are wrong. Black holes send gravitational waves. Gravitational waves are wave movement or radiation. And that means the black holes are bright gravitational objects.  If we can use water to illustrate the gravitational interaction we can say that gravitational waves push the surface tension out from the gravitational center. Then the other quantum fields push particles or objects into a black hole. The gravitational waves push energy out from the objects. And then the energy or quantum fields behind that object push them into the gravitational center.  The elementary particles are quantum fields or whisk-looking structures. If the gravitational wave is

The CEO of Open AI, Sam Altman said that AI development requires a similar organization as IAEA.

We know that there are many risks in AI development. And there must be something that puts people realize that these kinds of things are not jokes. The problem is how to take control of the AI development. If we think about international contracts regarding AI development. We must realize that there is a possibility that the contract that should limit AI development turns into another version of the Nuclear Non-Proliferation Treaty. That treaty didn't ever deny the escalation of nuclear weapons. And there is a big possibility that the AI-limitation contracts follow the route of the Nuclear Non-Proliferation Treaty.  The biggest problem with AI development is the new platforms that can run every complicated and effective code. That means the quantum computer-based neural networks can turn themselves more intelligent than humans. The AI has the ultimate ability to learn new things. And if it runs on the quantum-hybrid system that switches its state between binary and quantum states,