Wikileaks and Quantum Kriptology - Fashion - Style - Trendy

Sunday, December 5, 2010

Wikileaks and Quantum Kriptology

Played over the place because of Wikileaks. So now you will not be able to make secret communication?

Sweat over the world played in the last few days. What you look at the newspaper, Wikileaks, which take the Wikileaks TV channel. Political tensions increased so that almost invited leaders will duel each other. In fact, the New York Times writer Thomas Friedman, in 2006 published 'The World Is Flat Soot' in his book, it seemed as if this happens that day gave me the news. Yes, the information technology world ediverdi straight, now everything is transparent, öğlesine deep secrets, mysterious stories, such as deep left to the state. Someone is watching us, one listens to us. Çıkanı mouth and ears hear, the biggest flaw of ignorance.

Sitting at a desk in a commander in the United States is leading an operation in Afghanistan or Iraq. Operations, albeit a bit exaggerated, resulting in the victory of all Americans, have been reflected in Hollywood films. Scenarios, there is a fact, not all fantasy. Yes, it really develops the technology makes it possible to manage such an operation. Classically, communication is done with electromagnetic waves. Earth orbit communications satellite placed in a large number of, for example, an incident occurred in the Philippines instantly view and reflect the New-York, to a screen. Barcelano-Real Madrid match, all of us, without thinking how it is performed, have watched with pleasure. The information carried by electromagnetic waves in the ocean from the atmosphere here. It is important that your ship in the ocean yüzdürebilmek, surfing to do. You stand there shouting such high quality athletes. The rest is nonsense faso. The World is flat, but for walkers

Some newspapers and TV channels Wikileaks event, the hacker (computer's hard drive by entering the information sızdıranlar) tied. Interestingly, if it proves such a notice, the same day Hürriyette (4.Aralık.2010) 'Turkish Hacker FBI caught' took place. A memory or a digital data warehouse, in particular the ministry of foreign affairs or intelligence agencies, such as by entering the information leak to a system very guarded, does not plausible. Now I grant caught out. Semi-amateur specialists, such as TV screens, said without a trace on a computer and enter the information leak, is not technically possible. They say is wrong. The man's ear tutuverirler immediately. Each circuit electric current passes, (computers, albeit at very low ampere of electric current runs), leaves a footprint. Very talented hackers on the basis of professional software experts, the program by typing the information to a digital hardware to seek out the answer to how sızdırılırın, but they know will leave a mark applied by the software. My software enabled them than yours, do the race. Google Enter password cracking programs encounter numerous. Wikileaks is not the job of a hacker as they say.

A question comes to mind now. From now on you will not be able to make secret communication? Answer yes, it is possible. Emerging information technology has solved the root of this problem with quantum mechanics. Solution of quantum computers and quantum cryptography. A lot of work going into technical details of how one can describe it in simple language.

Mobile phone screen when you open your 'Enter your pin code' message. This means you and between your phone and, you know that nobody else has a secret and this secret is expressed by a number. The four-digit password. Is one thousandth of an account of the possibility of breaking with the simple password. Very simple password cracker programs, or even more complicated with the way it is possible to break passwords. Pin code breaker program is an effective break with the order of minutes it takes time. A reliably transmit information with a password, but it is possible to be broken. Now we explain how to do that. Let us recall the prime numbers of high school mathematics courses. May have forgotten. Prime numbers, integers divisible by a bear and another called him. 2, 3, 5, 11, 13, 31, ... ... this series lasts forever, so there are infinitely many prime numbers. These numbers are very special in terms of cryptology. Now I want to open an encrypted file, you access a database. You see a number of interest, the same elevation as the pin, for example, 22165. You have to do is to separate this number is prime factorization. This equation gives you the opportunity to open the file 22165 = 31.13.11.5. 4864902174943856 ... ... ... ... ... ... ... Now in front of the number of digits in a number of 150 is given, it may not separate the prime factored in and you can not open the file. Classic is a super computer, in theory, to a maximum of 128-digit prime number factorization occupancy, and opens the file. Everyone in the hands of millions of dollars of such files according to the super computer is not likely to enter the zero. Quantum computers can break, but such a password. In my opinion, the cyber home of a super computer or quantum computer bulunduramayacağına Sollange pirate, according to the information to reach the password breaking out of question. Now what about how this information is leaked? The answer is obvious, every one who has either sent with or passwords is really easy to be broken.

Us in the near future, applications of quantum computers, we can not even imagine will take you to the world of surprises. Photons, particles of light that carries information in these technologies. Information is stored on the photons again. My site's bits, instead of megabytes on mathematics qbitler destined. Freedom of information technology on those who want to learn more about this ekranlanan look at the articles about quantum computers. Fiber optic cables, light the first examples of communication and information. Communication with the light on very old.

Information in light particles, photons and their quantum nature of the cause of özelikliler unbreakable passwords from the forwards. Quantum mechanics and information technology developed by using a mixture of this system is called quantum cryptography. The transmission process, the information orientation of photons of light particles to be installed, outside intervention, that is not possible to leak information. No one from outside can not intervene between the sender and recipient to a key is available. U.S. Federal Reserve banks and the National Security Agency (National Security Agency), communications, commercial tailored systems make quantum. Apparently, the ministry of foreign affairs in the hands of the United States do not have such a system.


Quantum cryptography, this method is being developed as ensure the security of information in the near future. Hacker always return empty-handed.

No comments:

Post a Comment