Skip to main content

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.


"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers)


Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.  

Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-espionage informants. 

"New advanced photonic chips have been developed that optimize light transmission for optical wireless systems. These chips, essential for future 5G and 6G networks, represent a shift towards energy-efficient analog technologies and have wide-ranging applications in high-speed data processing and communication. Credit: Politecnico di Milano" (ScitechDaily, Light-Speed Calculations: New Photonic Chips Are Changing Wireless Communication)



The photonic microchips can also used to hack the ultra-secured communication. The same microchips used as game-changers in wireless communication can also hack that system. 


The photonic microchips can also make it possible to analyze and break even the fastest and most secure communication. If that communication is protected using old-fashioned computers. 


There is a golden rule in use of the encryption software. The time that the system uses to generate the binary number is directly proportional to the time that the system uses to generate the binary number. Riemann's conjecture is a recursive function, that should make very much binary numbers. The Achilles heel in the simple Riemann programs or encryption programs was that the system just calculated a series of binary numbers. 

And that makes the algorithm vulnerable to brute force attacks that make using faster computers. In modern versions, there should be a point in the Riemann series where the computer can start to generate those binary numbers. Then the system can put them in the matrix, and number those binary numbers. The system may use the individual binary number for each letter. In that model, the algorithm uses random numbers that it selects from the matrix. The thing that makes this algorithm vulnerable is that the receiving system must have data. That allows us to decode the information. That means if the receiving system is hacked, that causes real catastrophes. 

That thing means that the attacker gets new settings all the time. If they sent through the Internet. The main problem with Riemann's conjecture is that it's a very used tool. And that means the developers must create more secure ways to communicate than some Riemann's conjecture. That has been a long time the cryptography's cornerstone. But modern ultra-fast computers make it non-secured.

But the other thing is that the new photonic microchips can make data networks insecure. They are faster and more effective data handlers than regular microprocessors. Things like AI-boosted photonic microprocessors are extremely good tools for hackers. Those systems are so fast that they can find the binary number, created using Riemann's conjecture quite quickly especially if the the encryption software user doesn't generate a binary number that encrypts the information. 


https://scitechdaily.com/light-speed-calculations-new-photonic-chips-are-changing-wireless-communication/


https://scitechdaily.com/todays-most-secure-communications-threatened-by-future-quantum-computers/


https://scitechdaily.com/unlocking-the-future-of-security-with-mits-terahertz-cryptographic-id-tags/


https://www.verdict.co.uk/quantum-computing-breaking-security-encryption/


Comments

Popular posts from this blog

The LK-99 could be a fundamental advance even if it cannot reach superconductivity in 400K.

The next step in superconducting research is that LK-99 was not superconducting at room temperature. Or was it? The thing is that there is needed more research about that material. And even if it couldn't reach superconductivity in 400K that doesn't mean that material is not fundamental. And if LK-99 can maintain its superconductivity in 400K that means a fundamental breakthrough in superconducting technology.  The LK-99 can be hype or it can be the real thing. The thing is, anyway, that high-voltage cables and our electric networks are not turning superconducting before next summer. But if we can change the electric network to superconducting by using some reasonable material. That thing can be the next step in the environment. Superconductors decrease the need to produce electricity. But today cooling systems that need lots of energy are the thing that turn superconductors that need low temperatures non-practical for everyday use.  When the project begins there is lots of ent

Black holes, the speed of light, and gravitational background are things that are connecting the universe.

 Black holes, the speed of light, and gravitational background are things that are connecting the universe.  Black holes and gravitational waves: is black hole's singularity at so high energy level that energy travels in one direction in the form of a gravitational wave.  We normally say that black holes do not send radiation. And we are wrong. Black holes send gravitational waves. Gravitational waves are wave movement or radiation. And that means the black holes are bright gravitational objects.  If we can use water to illustrate the gravitational interaction we can say that gravitational waves push the surface tension out from the gravitational center. Then the other quantum fields push particles or objects into a black hole. The gravitational waves push energy out from the objects. And then the energy or quantum fields behind that object push them into the gravitational center.  The elementary particles are quantum fields or whisk-looking structures. If the gravitational wave is

The CEO of Open AI, Sam Altman said that AI development requires a similar organization as IAEA.

We know that there are many risks in AI development. And there must be something that puts people realize that these kinds of things are not jokes. The problem is how to take control of the AI development. If we think about international contracts regarding AI development. We must realize that there is a possibility that the contract that should limit AI development turns into another version of the Nuclear Non-Proliferation Treaty. That treaty didn't ever deny the escalation of nuclear weapons. And there is a big possibility that the AI-limitation contracts follow the route of the Nuclear Non-Proliferation Treaty.  The biggest problem with AI development is the new platforms that can run every complicated and effective code. That means the quantum computer-based neural networks can turn themselves more intelligent than humans. The AI has the ultimate ability to learn new things. And if it runs on the quantum-hybrid system that switches its state between binary and quantum states,