Russian cryptologists have proposed super-protection of chats: even a quantum computer will not open

Russian cryptologists have proposed super-protection of chats: even a quantum computer will not open

[ad_1]

It will be necessary to sort out as many options as there are atoms in the universe

A new way to protect chats in popular messengers was proposed by scientists from the Department of Cryptology and Cybersecurity at the MEPhI Nuclear Research University. The method is based on the use of so-called post-quantum cryptographic algorithms.

– What is post-quantum cryptography?

– It’s no secret that a new generation of computer technology is being actively developed – quantum computers. And in the future, these computers will be able to quickly “open” the traditional cryptographic algorithms of our gadgets. To protect the programs installed in them, this protection will have to be transferred to the new cryptography.

– You have chosen to protect chats in messengers. Are they the most vulnerable?

– Firstly, these are very common tools that almost every person uses now. In the future, their role in information technology will only increase: for example, they will be used for automatic exchange of information by devices of the “Internet of things”, the work of autonomous drones and other “intelligent” objects will be based on them. Therefore, it is very important to provide cryptographic protocols for their protection already now.

– What is your potsquantum cryptography based on?

– On the “construction” of the so-called computational “barrier” in front of the enemy. Who knows the “key” (or password) – there is no barrier for him. He knows which of the many tasks his computer or phone must solve in order to reveal the information he needs. Anyone who does not know this “key” (let’s call it a potential adversary or attacker) is forced to enumerate a huge number of variants of the same type of tasks. The number of such variants may be greater than the number of atoms in the universe. That is, it practically becomes a mission impossible, even for a high-speed quantum computer.

– How soon can your technology be implemented?

– While we are developing the theory of such a protective system. If it is recognized as effective, it will be possible to download the appropriate program to the gadget and use it. True, the problem may be the lack of power of the device itself, required for such a program.

– How is post-quantum cryptography different from just quantum cryptography?

These are similar terms, but they mean different things. If in post-quantum cryptography an attacker needs to be prevented from picking up algorithm keys by encryption, in quantum cryptography the task is different. It is based on the physical methods of quantum mechanics. And it says that it is impossible to measure some value without affecting it. If someone tries to intercept the “key” during a communication session between two subscribers, he will definitely spoil it, and the participants in the protocol will notice this damage.

[ad_2]

Source link

تحميل سكس مترجم hdxxxvideo.mobi نياكه رومانسيه bangoli blue flim videomegaporn.mobi doctor and patient sex video hintia comics hentaicredo.com menat hentai kambikutta tastymovie.mobi hdmovies3 blacked raw.com pimpmpegs.com sarasalu.com celina jaitley captaintube.info tamil rockers.le redtube video free-xxx-porn.net tamanna naked images pussyspace.com indianpornsearch.com sri devi sex videos أحضان سكس fucking-porn.org ينيك بنته all telugu heroines sex videos pornfactory.mobi sleepwalking porn hind porn hindisexyporn.com sexy video download picture www sexvibeos indianbluetube.com tamil adult movies سكس يابانى جديد hot-sex-porno.com موقع نيك عربي xnxx malayalam actress popsexy.net bangla blue film xxx indian porn movie download mobporno.org x vudeos com