Skip to main content

Fully protected data systems are impossible to create.



All encryption systems have one weakness,  humans created them. And all humans make mistakes. How to send qubit in the long range? 


Can quantum cryptography be the next-generation communication tool? The answer is yes. The information that qubit involves may send in over long distances by using regular radios. The system works like this. Every single qubit's state will transmit to the receiver by using a unique radio frequency. 

In that system, the information will send to the receiver by using multiple radio frequencies, And the system cuts the message into pieces. That is sent precisely at the same moment. That means the ELINT men must capture messages from all frequencies that the transmitter uses. The use of multiple frequencies at the same time makes the message so short that part of it would not capture anyway. 

The receiving system will reassemble or resort to the information bites. The system can use serial numbers in the bites of the message. Those serial numbers allow the receiving system put those bites back in order. 


The diagram below portrays the model of the ultra-secure binary data transmission. 


*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

*=The encryption algorithm that can be unique for each data carrier byte. 

-=The data carrier byte. In that system, the receiving system can use the different encryption keys for opening every individual data-carrier byte. And those data-carrier bytes can send by using different radio frequencies. 


There is no unbreakable code. 


Modern encryption systems can cover all bytes that are traveling in the network by using unique code. In that model behind and after the information-carrier byte travels the encryption code. The ultra-secure quantum systems can involve multiple layers of encryption. The most out layer is the quantum system but also binary code can be protected by using encryption. And those systems still can be broken. 

The problem with all codes and encryption systems is. That they are all made by humans. This means that there is always a weak point in the encryption systems. If there is no weak point in the system itself. There are people, who are using computers. The attacker can track those people and use some drugs to make them tell what is in messages that certain computers or operators handle. 

Or the attacker can slip things like surveillance cameras into the computer room, and then that camera sends all data from the screens to the attacker. That means if you cannot go through the encryption you can always go around them and use alternative methods to break the code. And in this text term "breaking the code" means the ability to steal information. 

Stealing information is the objective of hackers. Cryptology is the race between code makers and code breakers. The first-generation systems were just kicking the intruders off the system when security tracked them. But the new AI-based systems use things called "honey pots". The honey pots are databases where is a certain type of information. But the vital part of that data is removed. Modern systems also inform their users about the anomalies of the user's behavior in the system. 


Honey pots are traps. They can send tracking cookies to attackers' computers.


But they can also make a profile of the intruder. The data that the intruder searches uncover what kind of data interests the hacker. And that data helps to find out the people who are cooperating with the hacker. The drug dealers and mafia men are interested in different types of information than the governmental security and intelligence services. 

The thing that makes quantum cryptology hard to break is that data is traveling in the form of the qubit. Qubit bases the superposition of the partciles. So in quantum systems data is packed in physical form. And the thing that makes quantum cryptology secure is that the data is lost from the qubit if somebody tries to steal it. 

So the user of the system knows if the qubit is stolen. And that gives a warning to the operators. But as I wrote the quantum systems can also leak. There is the possibility that somebody just drinks too much alcohol. And tells all secretive information to unauthorized people. 


https://gamesandtehories.blogspot.com/


Comments

Popular posts from this blog

The LK-99 could be a fundamental advance even if it cannot reach superconductivity in 400K.

The next step in superconducting research is that LK-99 was not superconducting at room temperature. Or was it? The thing is that there is needed more research about that material. And even if it couldn't reach superconductivity in 400K that doesn't mean that material is not fundamental. And if LK-99 can maintain its superconductivity in 400K that means a fundamental breakthrough in superconducting technology.  The LK-99 can be hype or it can be the real thing. The thing is, anyway, that high-voltage cables and our electric networks are not turning superconducting before next summer. But if we can change the electric network to superconducting by using some reasonable material. That thing can be the next step in the environment. Superconductors decrease the need to produce electricity. But today cooling systems that need lots of energy are the thing that turn superconductors that need low temperatures non-practical for everyday use.  When the project begins there is lots of ent

Black holes, the speed of light, and gravitational background are things that are connecting the universe.

 Black holes, the speed of light, and gravitational background are things that are connecting the universe.  Black holes and gravitational waves: is black hole's singularity at so high energy level that energy travels in one direction in the form of a gravitational wave.  We normally say that black holes do not send radiation. And we are wrong. Black holes send gravitational waves. Gravitational waves are wave movement or radiation. And that means the black holes are bright gravitational objects.  If we can use water to illustrate the gravitational interaction we can say that gravitational waves push the surface tension out from the gravitational center. Then the other quantum fields push particles or objects into a black hole. The gravitational waves push energy out from the objects. And then the energy or quantum fields behind that object push them into the gravitational center.  The elementary particles are quantum fields or whisk-looking structures. If the gravitational wave is

The CEO of Open AI, Sam Altman said that AI development requires a similar organization as IAEA.

We know that there are many risks in AI development. And there must be something that puts people realize that these kinds of things are not jokes. The problem is how to take control of the AI development. If we think about international contracts regarding AI development. We must realize that there is a possibility that the contract that should limit AI development turns into another version of the Nuclear Non-Proliferation Treaty. That treaty didn't ever deny the escalation of nuclear weapons. And there is a big possibility that the AI-limitation contracts follow the route of the Nuclear Non-Proliferation Treaty.  The biggest problem with AI development is the new platforms that can run every complicated and effective code. That means the quantum computer-based neural networks can turn themselves more intelligent than humans. The AI has the ultimate ability to learn new things. And if it runs on the quantum-hybrid system that switches its state between binary and quantum states,