

The Possible Effects of Quantum Computing 153
craigj0 asks: "When quantum computers become more possible it will destroy our current encyption schemes but create a new type. My question is will it destroy non-factoring based encryption? And if it does what will the world be like during the transition stage from classic computers to quantum computers? How will the internet work when not all people have quantum technology and still want their digital privacy? Perhaps quantum plugin devices may be used to create hybrid computers?" Interesting issue here: What futures does Slashdot forcast when Quantum Computing becomes a reality?
haves vs. have nots...? (Score:1)
Illuminati. (Score:1)
Quantum Computers are not going to be something the general public is going to have access to - more likely, there's going to be some servers here and there, where people can rent time (I guess cycles won't work). Possibly HUGE systems that fex. resembles the Ray/Client stuff from Sun.
Heisenberg rides again (Score:2)
Plaintive customer: "My account can't be empty, I checked the balance this morning and it had over $1000 in it..."
...been up too long, sorry.
sorry Charlie (Score:1)
Non-factoring encryption (Score:1)
Privacy? Hah! (Score:2)
People only view privacy as a right because in the past the powers that be (be they PHBs or government spooks) hadn't got the wherewithal to spy on us all.
If you work on a computer, your email can be monitored, as well as your keystrokes and your high scores in tetris. If you walk through any city centre, you're probably on camera for 90% of the time.
Quantum computing will be the final nail in the coffin; encryption will let people hold out for a while, but once your VA Quark comes online, you can bend over and kiss your privacy goodbye.
I think only the quantum scientist can imagine (Score:1)
I'll just have to (crys) wait and see;-(
Afraid of Transitions ? (Score:2)
ENAIC to PIII 700
Ipv4 to IPv6
no encryption to 128 bit encryption
All have something in common... dramatic change.
But, all of them happened in phases... I don't
think quantum would be used by poeple like you and me in the first go. Most probably banks... then it would, over the years, permeate over to the public... it would be gradual... might take 5 to 10 years.... I don't think we should be afriad of change.
rkt
Quantum Encryption (Score:2)
Okay, I just did a quick search on Google and turned up a recent article [newscientist.co.uk] in New Scientist describing the process and the issues facing practical, widespread implementation. Still, it looks quite promising.
Cheers.
Quantum computing to go (Score:1)
Eventually some enterprising young scalawag will put go and put one of these new-fangled devices on a PCI card and solve all of our problems. Until then, the people that want to secure their data will just have to go back to good old-fashioned physical security.
Re:Heisenberg rides again (Score:2)
:)
Ramblings on the Quantum ramifications (Score:3)
So, most of us will be forced to use RSA, even when we know the the echelon system can crack our 4096-bit export-restricted keys in all of 2.3 ns (give or take a few orders of magnitude).
This will lead privacy-concerned Americans to do what is becoming popular in countries where strong crypto is illegal: we will turn to steganography. For those slashdotters who haven't read Simon Singh and aren't up on their cryptic (no pun intended) english, that's the art of hiding messages. We sometimes call it security through obscurity. We all know that it's not really no security. If I'm correct, it'll be the best security available to us.
I actually got to ask Simon Singh this question at a recent book reading, and his reply was quite interesting. He pointed out that in addition to the inroads on personal privacy and financial security, the real danger might lie in the realm of world politics. He suggested that the presence of governments that basically posess information omnipotence could drastically alter the balances of world power that we currently have. We all know that the Allied crack of the German cryptosystem was crucial to our victory in WW2. International-conspiracy theorists/prophets should have a field day with the possibilities.
One-time pads obsolete not? (Score:1)
I just don't get how it could render one-time pads obsolete. Not that they'd be really useful, but the outcome is essentially 'real random noise'. You'd have to test against guesses based on the nature of the pad generator used.
Oh NO! (Score:1)
not according to Mr. Schneier... (Score:2)
" And when it becomes a reality, it does not destroy all cryptography. Quantum computing reduces the complexity of arbitrary calculations by a factor of a square root. This means that key lengths are effectively halved. 128-bit keys are more than secure enough today; 256-bit keys are more than secure enough against quantum computers. "
Factorisation of Very Large values (Score:3)
It has taken years of research just to build a two or three bit machine, and increasing a RSA or DH key by just a few bits would require doubling the number of "parallel universe computing cells" that are required to crack it. I can't see massive, secret research on this being funded well enough - particularly as it is "cheaper" in most senses to use other methods to defeat keys (most of which require physical intrusion to the machine in question or subversion of trusted personnel, but that has always been a standard operating procedure).
At worst, I think we will see the minimum key sizes considered secure increase, maybe by an order of magnitude, but without a change to the fundamental schemes in use - after all, with QC we are talking faster application of existing techniques, not a entirely new field.
--
Re:sorry Charlie (Score:1)
Quantum Computing permits acting upon every possible input to an algorithm simultaneously. It'll render all current crypto-systems obsolete
Not as I understand the situation (which isn't perfect, I'll happily admit). By taking advantage of quantum mechanics, you can devise a system in which there is no theoretical way to eavesdrop on the communication succesfully (see the New Scientist article referenced elsewhere around here).
But I may be wrong :-)
Phil
Technology Forecast (Score:2)
Ubiquitous spell checking... I hope.
The true effects of quantum computers (Score:5)
First, I'd like to point out that quantum computation and quantum encryption are two almost completely separate concepts. Quantum encryption is based on the fact that quantum states cannot be measured without altering. The most common example is the polarization of a photon, but it will work for any quantum state, so long as there exist, effectively, two unique states that can transmit the data.
Quantum computation, however, is much more complex and much more interesting. Quantum computers are based on the concept of quantum entanglement, the ability of a quantum state to exist in a superposition of all of its mutually exclusive states: It's a 1 and a 0. However, this is not as easy to use as one might think. While it's true that if you have n quantum logic gates you have the ability to input 2^n data values simultaneously (as opposed to only 1 piece of data if you have n digital logic gates), this is not going to be the end of classical computing for a few reasons. First, quantum computers have to be perfectly reversible. That means for every output there's an input and vice versa. And there has to be no way of knowing the initial states of the data. You don't process data, you process probabilities in a quantum computer; if you know exactly what any one value is throughout the computation, you can find out all of the values: the superposition ends and you're stuck with a useless chunk of machinery. This means YOU CAN ONLY GET ONE RESULT FROM ANY QUANTUM COMPUTATION, THE END RESULT. You can't see what the data in the middle is or the computer becomes useless. (Landauer's principle makes heat loss data loss. When your processor gets hot, it's losing data. If the same thing happened to a quantum computer, it wouldn't be quantum anymore.) Decoherence is what happens when you randomly lose data to the environment by design, not by choice, and the superposition ends. This is bad for Q.C. Oh, and quantum computers can only do *some* things faster, like prime factorization and discrete logarithms. Not multiplication or addition. Plus, the circuits that would do basic arithmetic would be bigger and slower than what you've currently got.
So what does this all mean? It means that quantum computers are going to provide some advantages (real quick big number factorization), and some disadvantages (that whole RSA standard). The most realistic initial use of quantum computers will be as add-ons to existing super-computers to resolve certain types of NP-Complete headaches that regular math can't simplify yet. At best they will someday be an add-on to your PC; but they will never replace the digital computer.
- HyLander
If you want more info, check out http://www.qubit.org, it's got some decent tutorials, or email me at hylander42@hotmail.com.
quantum computing != quantum encryption (Score:2)
First time I heard of quantum encryption, I thought that they were considering Bell's theorem: get random pad information by manipulating a pair of twins. Though you cannot communicate using the twins themselves, the random noise that you can get by analyzing states (simultaneously?) can be used as a one-time-pad.
Quantum computing will not break symmetric ciphers. It can, however, search key space much faster, reduce complexity by the factor of a square root. That is, once it becomes feasible... Stupid quanta are not cooperating.
With assymetric ciphers, including El Gamal-type elliptic log thingies, RSA's large primes, and all those broken and ready-to-be broken knapsack problem, quantum computing will be far more effective. Ideally, QC will be able to reduce these NP complete and NP-hard problems to solvable in polynomial time.
Also, I'd like to point out that the complexity of RSA does not double with each additional bit... 4096 bit encryption RSA does not have 2^3968 or so more possible keys than 128 bit TwoFish... It supports large prime products as big as 4096 bits (or was it large primes?) The spacing of primes at big numbers and our almost-decent sieving schemes...bla bla bla.
Now, if quantum computing can reduce the amount of power used by my puters, or if it allows me to build either a quantum death ray or time machine, I think its time for me to transform into a rabid koala.
Back to reading Parzifal...
Quantum Cryptography... (Score:2)
Also, we do have a reasonable idea on what can and cannot be done using quantumn computing. For example, it is unlikely that it can solve NP-complete problems such as the travelling salesman problem. (Ok, I will not be too shocked if somebody discovered a way to solve NP-complete problems using a qm/c... but it cannot do much "more".)
How far are we? Quite far from replacing the current chips, we are currently able to experiment with about 100-200 gates. Maybe in ten years, we can hope to have a reasonable machine which can do useful things.
Encryption Still Safe (Score:1)
Quantum Cryptography and Quantum Computing (Score:1)
Quantum computing is a whole different ball game. It uses qubits as well, but several of them. The most qubits that have been used successfully as far as I know is 8. The qubits work like binary bits, except they can be both on and off at the same time. This allows all possible outcomes of a computation to be detected at once. The advantage that quantum computing will have for cryptography is the ability to factor extremely large numbers REALLY quickly. More quickly than any current computer. I recall from a book that a quantum computer with a relatively small number of qubits (32 or something) could factor a number in minutes, that would take a supercomputer millions of years to do. There are lots of great books on the subject too.
Wrong. (Score:2)
Having things 'online' is in itself still relatively new. Back in the 80's you could hack most places simply by dialing in! They didn't see the need for things like passwords, etc. Why, back when Bellsouth was first discovering major hacks done to it's system, they couldn't understand that people would want to abuse their system like that. It was all wide open then. In the future, things will be more like "Gee grandpa, you mean most of your transmissions were done in plaintext?" and "JETSON! Stop using such a fraggin weak encryption! I don't care if it's just an email to your hottie wife!"
Quantum comptuers are a different animal... (Score:2)
The simple fact of the matter is this: Quantum computers are different tools, and they have different applications. Coincidentally, some of those applications are ``hard problems'' to regular computers.
It's like quantum mechanics: if you want to explain the motions of planets about the sun, I don't suggest you try to solve Schordinger's equation for all the particles in the system. That's a really hard problem in QM. But it converges to Newton's laws in the macroscopic, so using these ``classical'' techniques becomes not only faster, but correct.
Additionally, QCs will need glue to talk to the world; I assume eventually people will want to connect them to networks, and IP addresses are not superpositions. So we will use ``classical computers'' for a long time, just as we still use ``classical mechanics'' for problems which crack well under their scrutiny.
Eric
Re:Privacy? Hah! (Score:1)
Re:Factorisation of Very Large values (Score:1)
-"S"HM
That's where the software come in... (Score:1)
However, it's an interesting problem in computer science to think that there could be a computer that is fast enough to shred even our most "secure" algorithms. But, realize that even non-factoring-based encryption methods will be vulnerable, for a quantum computer could essentially solve any problem by brute force. However, there are computer scientists studying truly "quantum" encryption methods. The basis behind these algorithms, though, is the assumption that we have super-fast networks, too. For, I assume, they require a much, much larger cyphertext-to-text ratio.
So, instead of relying on our hardware to be slow, we will need to establish good theory (and software) to provide security and privacy.
Transendental Encryption (Score:2)
I find this of interest: A straight line on a standard Euclidean distance metric can pass through an infinite number of algebraic numbers, that being, numbers that are a combination of a finite number of finite roots of primes. Whereas a line in contact with this algebraic line may pass through an infinite number of transendental numbers (ie. pi). These two lines may not differ by a real amount, ie. any number added to one or the other results in something larger than the difference of any two points on either line (respectively the same distance from the origin).
Anyway, I think it's neat because one can create a transendental number, extract points at some finite distance down the line (ie. 2^120,000) of it's digits, and you may have a unique number sequence. Without knowing the transendental number, it is quite a difficult problem to solve. But it can be approximated . . . for now, SFAIK.
All algebraic numbers can be expressed as the roots of primes. With finite precision numbers, transendental numbers can be approximated as the roots of primes.
Interesting, nonetheless . . .
Re:Technology Forecast (Score:1)
That's a future I could be proud to live in.
Re:Non-factoring encryption (Score:1)
LOL Well said. But then it'd take years and LOTS of ink to transcribe the byte-sequence of a JPEG file, and hours of wrist-wrenching typing to reconstruct the file on the receiving end! :-)
Factoring.. (Score:2)
Currently the best we can do is solve NP problems in exponential time - we just try all the answers serially (sure, we can exclude a lot of possibilities, but not enough to REALLY get things fast). It hasn't been proven that NP problems cannot be solved determinisitically in less than exponential time, but most people think it's probably true.
The whole reason to switch over to quantum computing is that it provides nondeterminism. That doesn't mean we can theoretically calculate anything we couldn't before (this is proven), just that some calculations may get easier. Such as NP problems, which by their very definitions are solvable in polynomial time, using nondeterminstic techniques.
Any encryption algorithm that relies on NP problems being extremely difficult to solve will be broken by quantum computing. I'm no crypto-whiz or nuthin' but it seems likely to me that all common crypto relies on this assumption.
There are computational problems that are harder than NP problems, but they're not all that common, and really hard, so they haven't gotten a whole lot of attention. I imagine that if quantum computing took off, these would see a lot more research.
Re:Ramblings on the Quantum ramifications (Score:2)
Nah, the core of a quantum crypto system is supercooled atoms arranged in a line, just a handful of microns.
The real problem is that serious QC might be impossible. In theory, a QC can crack an X-bit key in seconds, you just need an equal number of Qubits (laser-excited atoms) in the line. In practice, building a large QC might be exponentially difficult -- if it gets twice as hard to keep things straight every time you add one Qubit, then QC will never be usable.
governments that basically posess information omnipotence could drastically alter the balances of world power that we currently have.Depends. QC could do arbitrarily horrible things to any E-commerce that uses standard encryption. Which only means that if QC ever works, the banking industry will pay whatever it takes to get quantum encryption. But there are still plenty of valid ways to protect information. Aside from one time pads, groups could keep their important data on privately owned fibre. Can't crack what you can't access.
For example, the US government already has information omnipotence relative to countries like Yugoslavia or Iraq. I'm confident that the NSA can crack any encryption scheme they use. Nevertheless, we still can't track down Iraqi anthrax, or blow up Milosevic in his sleep. All the computers under Fort Meade can't read a sheet of paper in a sealed envelope in an officer's pocket.
Re:sorry Charlie (Score:2)
Re:Most probable answers (Score:2)
As a physicist interested in the foundations of quantum theory, I am bothered by a lot of the literature I have seen on quantum computing--not all that much, but I've spent a morning reading through a site here and another morning reading through a site there, etc. There is a lot of overly literal adherence to the pretty old fashioned Copenhagen interpretation, which a lot of people have serious differences about. (Not that this should affect the results when they are finally obtained, but it seems that possibly faulty mental models of what is going on may hinder progress.)
One of the more interesting possibilities is that there are methodologies related to the present quantum computing paradigm which may be more immediately accessable. For instance, encryption can be thought of as a series of translations and dilations of the number system--take the number representing some item of information and subject it to a series of addition and multiplication processes. The study of invariance under translations and dilations in ordianry data is usually undertaken with wavelet analysis. Wavelet analysis uses similar mathematical tools to quantum theory (expansions in overcomplete sets of basis vectors), and in fact you can analyze at least some quantum state vectors using wavelet analysis in a fully quantum compatible formalism. )I.e., a probabilistic formalism results.)
There are a lot of mathematical tools out there which have never been (publicly) used in the crypto context, and it may be that quantum computing may ultimately result in an awareness of methods equivalent to quantum computing which are easier to implement. Thus, rather than technologically challenging q-computers, there may be algorithms which enable you to implement a non-sequential computation algorithm (i.e., avoid the von Neumann bottleneck, as well as completely rewrite the concepts of computability and even decidability) on a sequential device. It may thus be possible to do something like an integer wavelet transform on a signal, put up some kind of display, and **look** for visual patterns in the display which would indicate a complete or possible partial solution, etc., reducing computation time from millenia to hours.
Re:Illuminati. (Score:2)
Hmm, not at first. The economics of the thing will probably preclude this form of "free" usage - ie you pay only for downloading the banner. If you charge a nominal fee, say a few quid a month, it will prevent the masses from _really_ wanting it - I don't think people on the net as a whole _really_ understand what's at risk. Still, give it a few years, and maybe the populace will be more privacy-savvy - we can only hope...
Re:Privacy? Hah! (Score:1)
Hello, U.S. government, which way is it?
Quantum Spam (Score:2)
(I'll go lie down now.)
Regards, Ralph.
Setting Up A Quantum Computer (Score:1)
The obvious comparison is to the Sidney Harris cartoon showing a professor who has written on a blackboard: 1)[complicated equation] 2)"Then, A Miracle Happens", 3)[another complicated equation].
In view of the difficulties experienced to date in setting up quantum computers to solve trivially easy problems, has it been proven that the entire quantum computing process is in fact easier than classical computing?
/.
Doesn't Matter (Score:4)
All hardware sucks. All software sucks. Everybody is considered a jerk by somebody. Lusers get LARTed, BOFHs get drunk. The sun rises, the sun sets, the Sun crashes. It is the way of things.
-A Sysadmin Having a Bad Day
Re:sorry Charlie (Score:2)
Last time I looked at quantum algorithms it was far from clear that random search problems can be sped up like that. Some forms of database search go from O(n) to O(sqrt(n)), but that's not a fenomenal speedup for searching encryption keys.
RSA is in trouble, of course, since there actually exists an efficient algorithm for factoring.
As I understand it, the tricky part of quantum computing is to actually extract useful information when you finally observe your quantum state. Just being able to operate on a vast number of initial states gives you nothing if you can't extract something at the end.
If you have a reference to the result you claim I'd be very interested.
They can('t?) read MY messages... (Score:1)
Easy enough for a human to understand, but a pain the butt for computers - and with that kind of scheme, they'd be likely to get multiple "possible" unencrypted messages if their dictionary allowed this kind of stuff.
Of course, they can just read directly off my monitor as it is anyway. :^)
Overstating the case (Score:1)
It is easy to demonstrate that the cardinality of the algebraic numbers is equivilant to that of the integers, so the cardinality of the transendental numbers is equivilant to that of the continuum. However, it is also not to hard to prove that the cardinality of all numbers describable in a finite language is equivilant to that of the integers. This includes not only every number that every human has thought of and every number that every computer has computed, but every number that any human or computer might ever consider. So for cryptographic purposes, the existance of a lot of transendental numbers is useless, beceause no human or computer will ever access them.
The fact that our theories about real number lead us to believe that numbers exist that we cannot access has troubled a lot of people. Weil rejected the class of number unaccessble to humans. Cantor thought that as he theorized about bigger and bigger infinite sets he was learning to understand God.
Re:Factoring.. (Score:1)
how will that work? (Score:1)
How could
"Some will own a Quantum Computer and offer free (quantum) encryption" work. I.E. how would the user transmit data to the "free encription service" offered above... by conventional encription surely....
and this will not be safe.
AntiNeutrino
aron.fischer@gmx.net
Re:Non-factoring encryption (Score:2)
Re:Quantum Encryption (Score:1)
Re:Factoring.. (Score:1)
Multiplication is O(N^2), O(N^lg(3)) (and
ranges inbetween) and O(n log n) using
the fast fourier transform technique.
There is no multiplication algorithm that is O(N)
for the general case.
Re:sorry Charlie (Score:1)
Re:Heisenberg rides again (Score:1)
"there is no spoon" -Neo
"there simultaneously IS and IS NOT a spoon." -Schoedinger.
I wish I had a nickel for every time someone said "Information wants to be free".
What we really have to worry about... (Score:1)
In Nanosystems, Drexler showed that it is possible to create a nanometer scale CPU that runs at 1 GHz, but fits into a 400 nm cube. According to my handy dandy TI pocket calculator, that means we could fit approximately 4.03225 * 10^13 of those little CPUs in a one inch square (which isn't exactly true, as you would have to connect them all, give them memory to use, etc., which I have not allowed for, but it gives you a very loose, ballpark figure), and that's only putting them one layer deep. Think about that. OVER FORTY TRILLION CPUs, all running at 1 GHz, all networked together, doing a distributed attack on a keyspace, and all of it fits in a square inch. With one of those suckers, you could crack any current encryption scheme using brute force, and it would most likely take less than a second (or at least, so I guess).
Granted, eventually the public would have such machines at their disposal (although we're talking a long way off here, as it would be quite a while before even a prototype could be built), but the NSA would always have the ability to build them much much much bigger (if they already have rooms full of Crays, imagine rooms full of these nanoprocessors!), and you know that they definitely would have them first, being that the kind of money it would take to design such a beast would be prohibitive for anyone else. By the time the design is done, surely we will have molecular manufacturing, and such a machine will cost nearly nothing to build, and the NSA could start churning them out by the thousands. Scary.
Mechanik
Quantum computers (Score:2)
Working quantum computers with a reasonable number of qubits will render all current public-key encryption techniques useless, regardless of the key length used. Peter Shor has exhibited explicit algorithms for solving the factorization and discrete logarithm problems in polynomial time using a quantum computer. Since all major current public-key systems (El Gamal, RSA, Diffie-Hellman) are based on one of these two problems (sometimes a generalization of dicrete log to elliptic curves) they are all then breakable in polynomial time. Which means breaking them is a very easy problem given fast quantum computers, not much more difficult than encrypting/decrypting a message using them. The algorithms involved use some nifty randomization techniques, quantum Fourier transforms, and basic group theory; see the paper on quant-ph [lanl.gov] if you're interested.
As far as symmetric ciphers go, I don't know of any algorithms to break them using a quantum computer. It doesn't seem to be an especially difficult problem, however, and I wouldn't be surprised if the NSA or someone had already written up a few to crack 3DES, Blowish, etc.
Quantum encryption will possibly provide a secure alternative; basically the idea here is that the two parties involved use a shared quantum source to generate identical one-time pads. Artur Ekert showed that the parties involved can use the Bell inequality to detect any interference in the shared quantum data; it appears this is generally true for any sort of interference in the commonly generated data. Now quantum encryption is provably impossible to break as it provides a completely random one-time pad; and it seems likely that if quantum computers become a reality we will have stable enough quantum systems to make quantum encryption a reality.
So the net result of the whole quantum thing will probably be the destruction of all previous cryptographic schemes and the use of quantum cryptography. That's assuming we ever build a useful quantum computer, which is by no means assured, given the large difficulties currently faced in the field.
Also, it's unlikely that quantum computers will ever become a device for common use; simply because they're not a replacement for the classical computer. A quantum computer would require a ridiculous amount of classical control and error-correction hardware to run at all. Also, you wouldn't be able to just program it. Quantum computation requires special algorithms that can be parallelized correctly to work at all; it takes people who know quantum very well to come up with these algorithms.... you can't just plug a program into a quantum computer and expect it to run quickly.
So most likely, even if they become widespread, quantum computers will just be used as an "add-on" sort of module to do massively parallelizable computationally intensive things, like Fourier transforms, prime factorization, etc.
A great deal of the usefulness of quantum computers depends on whether they can solve NP-complete problems. This is as yet unknown, but some preliminary work indicates that using special nonlinear aspects of quantum behavior, systems may be developed which can do this. There is evidence indicating standard quantum computers will not be able to generally solve NP-complete problems.
Ali Soleimani
alis@caltech.edu
Caltech Phys/Math
Re:What we really have to worry about... (Score:1)
Ali Soleimani
Re:They can('t?) read MY messages... (Score:1)
A better method might be to compress the text first, but then you are vulnerable to attacks on the formatting used by the compression method (looking at the headers, symbol tables, etc).
Re:One-time pads obsolete not? (Score:2)
Re:What we really have to worry about... (Score:1)
The nanoscale processors to which I am referring are not QCs at all... just simple RISC machines. Their power lies in sheer numbers... if you have a roomful of those little suckers (read: more processors than you can possibly imagine), you can crack pretty much anything you want. Granted, if the public has such powerful machines too they can use more and more complex encryption algorithms (read: larger keysizes), but the NSA will always have the money and resources to build something bigger that can crack that too. If they do things really cleverly, the nanoscale manufacturing robots would just keep building and building and building, adding more and more processors to the network 24 hours a day, with only a miniscule cost in raw materials required. That's the power of molecular manufacturing; once you set things in motion, the systems build themselves, and practically for free.
The public can only play leapfrog with the NSA to a certain point... a nanometer scale CPU is basically as small as you can get, and the only way to make a more powerful machine is to network more processors together. It's not very feasible for Joe Public to have a computer the size of a gymnasium that could run an encryption algorithm that the NSA couldn't crack without a computer the size of a city, as Joe Public simply doesn't have the space and other resources required (especially money). If you start building a computer that big in your backyard (assuming you have one... many urbanites don't), Someone In Power is going to notice, and probably is going to come and ask you why the heck you think you need a computer that big. I wouldn't be surprised at that point if supercomputers were to become classed as munitions, like strong crypto is now.
Mechanik
Re:sorry Charlie (Score:2)
I don't know of anything that's nearly as convenient as RSA or DH for privacy/key exchange, except maybe Maurer's scheme where you need a satellite that transmits random bits to the world, and every receiver gets its own noisy copy.
Re:The true effects of quantum computers (Score:1)
I would like for someone to explain to me what is stopping a potential eavesdropper from listening in to the communication while stopping its continuation, then re-transmitting. Sure, since he measured the signal he distorted it. So what? If he "removes" the signal (think brick wall), and re-transmits the observed data, he would be 100% invisible. Wouldn't he?
Quantum Encryption and the Grav-net (Score:1)
Re:Ramblings on the Quantum ramifications (Score:1)
Nothing preventing you from making a bunch of CD's with one-time pads on them and giving them out to your co-conspirators. Of course, now you're vulnerable to real-world cracking (by compromising one of the CD's or perhaps one of your fellow conspirators), but at least your on-line communications will be safe.
--
Re:Why I view privacy as a right (Score:2)
The tools still need to exist (in Law Enforcement's eyes) in order to decode encrypted data upon issuance of a warrant. But just because those tools do or could exist does not mean that they will automatically be abused.
As more and more of the world goes digital (or whatever term you care to use), and especially as it pertains to "white collar" crime, pretty much all the evidence linked to a crime could end up being encrypted. For instances like that, there needs to be a means to access that data in relation to an investigation.
So long as you're not doing anything wrong, then there isn't any reason why anyone in a position to use such a machine would want to see what you've been reading or writing. If you are doing something wrong, then... tough luck, i guess.
Now don't get me wrong here. I value my privacy as much as everyone else. I just think that just because something can allow something to happen, doesn't automatically mean its going to be abused.
Re:Why I view privacy as a right (Score:1)
Re:Encryption Still Safe (Score:2)
And besides, "anything thats important to encrypt...". My thought says you shouldn't do it that way. Just encrypt everything so as not to have anything jump out as automatically being the "interesting" file....
Quantum Processing Unit. (Score:1)
Not only does it enable quantum operations, but it also sounds cool.
(At least, most hardware-companies seem to think Z X and Q are cool letters.)
Seriously though, that concept seem to work for Mac and Amiga.
They've both got PPC processor expansions though they originally used MC680x0.
Also, that should be the way to go, since most people will demand x86 compatability in the beginning to run their Wintel/Lintel platforms until Windows and Linux have been ported.
By the way: Shouldn't quantum processors be exceptionally fast?
Or is that only in certain computations?
Maybe quantum processing will be implemented as an extension of the FPU inside a normal CPU.
Re:Quantum Encryption (Score:1)
The answer to 2 is easy. If Eve captures a photon, all she has to do is somehow copy the photon (assuming this is possible, of which I'm not sure) and send it a few times to a 0 and a 45 degree filter of her own. The photons will not pass at all through one and randomly trickle through the other one. Thus Eve knows what Bob will know for every single photon. When Bob tells Alice which photons he got, Eve will be listening and therefore has the key.
This leads to number 1 though, in which Eve cannot be certain that she is correctly retransmitting the photon at the correct polarization. To which I answer with this, how much do we really know about Quantum Physics? If I understand correctly, it is a very dynamic field, full of changes. The article itself says "...because of the strange way that quantum particles work". I'm not sure if the scientists even know what is causing this shift in polarization (I'll admit I'm fairly ignorant on Quantum Physics, I'm just going on what I'm reading here.) What's to say that someone in the near future will not discover exactly how these polarities are shifting? If this happens, they will be able to faithfully retransmit the intercepted photons with Bob being none the wiser.
My point is this encryption is relying on unproven science. Since when has that stopped us though? Humans have been doing this for years. Back in ancient Rome, people drank from lead-line cups. Supposedly lead was good somehow for the cups, but they didn't know that lead killed people. A recent example is cell phones. Cell phones seem like a good technology, but recent research suggests that they are a cause of brain cancer and short-term memory loss.
I'll admit this argument is not based in today's science, but in the future possibility of something being discovered. The technology seems solid today though, if it will work exactly as described.
Re:Illuminati. (Score:2)
Or something. quantum quantum quantum (trying to increase the quantum content of this post.)
Hey, who hasn't slept in days? It's me! ;)
Re:Overstating the case (Score:1)
Yeah, but Cantor was a nut case, and everybody knows it. Don't get me wrong, set theory is my favorite branch of mathematics, so I am fascinated by Cantor, but he had mental problems his whole life. Maybe only a crazy man could come up with stuff like that.
Re:Quantum Encryption (Score:1)
Re:Illuminati. (Score:1)
I don't think so. As far as I understand it, quantum encryption is not simply a new layer of information that can be transmitted over standard channels. It involves the quantum state of the medium of information transfer, which can't be examined without modifying it (thus allowing one to be sure the information either has or hasn't been evesdropped on). Since existing modems, network cables, and so on don't preserve quantum state, quantum encryption can't work over them. You need something like fiber optics, where you can test the quantum state of the light as well as draw the encoded information out of it.
Brad
Re:What we really have to worry about... (Score:2)
Actually, it wasn't that long ago that it was illegal to export any computer that rated over 500MIPS out of the US... Of course, once everday desktops hit these barriers, it seemed kinda silly, but when only the massive machines could rate that high (on an admittedly semi-bogus scale), it almost made sense. With computing power still scaling near Moore's law, it's tough to put a reasonable limit on it, seeing that by the time it gets through Congress, it will already be as outdated as the hardware it was trying to protect...
Re:The true effects of quantum computers (Score:1)
Re:The true effects of quantum computers (Score:1)
First: what this means with respect to quantum encryption is that if someone's eavesdropping, you'll know they're eavesdropping because the error rates of your communication with the other person will skyrocket, and you'll know something's up.
Second, what you've described is the man-in-the-middle approach to defeating encryption. Charles Bennett, the researcher who proposed the current quantum encryption algorithm, states that you have to have two communication lines: one that is quantum, and one that is public, and you cannot have a man-in-the-middle on the public line. Why would this change anything? Well, you use the public line to exchange information in the data initiation sequence. You say "I sent this data and it was like this", and the other person notes it and corrects their data translation, and vice versa. Then, if someone intercepts it from then on, error rates go up. Otherwise, the person will have been there BEFORE they initiated contact. This means all the data they get will make NO SENSE WHATSOEVER, and they'll abandon the data line before they use it. But Bennett knew a man-in-the-middle in the public channel would screw this up, that's why he said avoid it. If that didn't clear anything up, lemme know.
Re:Quantum Processing Unit. (Score:2)
An industry-standard PCI QPU-card could be used with either platform (and let's not forget Alphas, either). The card itself doesn't usually care about the OS / host CPU, as long as the appropriate drivers / access methods are used.
Just my $(0.0004)^.5
The Wyrd (Score:1)
All of this "should" have happened consequent to Hamilton's discovery of the symmetry between changes in the state of the observer and the observed in physical systems (all the other key insights were in place by that time thanks to guys like Gauss and Maupertuis). But then, humans are social animals and rarely find themselves capable of departing far from the prevailing modes of perception.
Re:Smarter than humans and maybe self-aware (Score:1)
Only a matter of time. And it may not even require quantum computation, though QC would probably help. Do our brains depend on quantum computation? I doubt it.
Um, if it "evolves far ahead of humans", the real issue is, will it recognize and respect us as life.
Even Quantum Echelon can't crack 4096-bit keys (Score:1)
And steganography isn't the same thing as "security through obscurity". Steganography is the art of hiding one message inside another; "security through obscurity" is doing stupid things like XORing stored passwords with the programmer's birthday and hoping nobody notices. :)
If you're interested in alternatives to crypto, you should also check out chaffing and winnowing [mit.edu] -- it's a bit complex (and I don't claim to understand it completely) but basically it involves mixing real information with garbage in such a way that the receiving system will automatically be able to tell the difference but an eavesdropper won't. No keys required, ergo, no government-mandated "key recovery" schemes.
Re:sorry Charlie (Score:2)
Re:quantum computing != quantum encryption (Score:1)
Dumb 1st Post (Score:1)
Re:Factoring.. (Score:1)
Re:Factoring.. (Score:1)
Re:not according to Mr. Schneier... (Score:1)
Re:The true effects of quantum computers (Score:1)
Quantum computers will never replace the digital machines that we have now. You really can't run "software" on a quantum computer, just basically NP type stuff and the like.
However, to switch gears slightly, probably one thing that is up and coming is molecular computing.
This has the potential to possibly replace the digital computer because it still involves the same logic gates, but they are so much faster.
But alas I think it is still 5-10 years away, so I guess we will just have to live with our gigahertz machines for now...
Re:What we really have to worry about... (Score:1)
Re:Why I view privacy as a right (Score:1)
pretty far from there not being any reason for them to want to see what I've been reading or writing.
not that that makes it ok. if they can do their best to access my _PRIVATE_ data, I can do my best to keep that data private. as a programmer (and someone who knows where GPG is), I expect to win.
I got /4/ points from that?? (Score:2)
I forgot to give attribution to the Sysadmin Rant ("...the way of things.") part at the end of my post, though (Steve Conley).
I
There is a problem with Quantum encryption (Score:1)
Re:Quantum computers (Score:1)
As far as I can see quantum computers are not a huge threat to symmetric ciphers, which can only be attacked statistically, not by solving a set mathematical problem. The defining feature of public key cyphers is what makes them vulnerable - since everyone knows the public key, the attacker (Eve) has enough information for a break without any intercepts of cipertext. Once she knows the public key, in principle she can determine the secret key with pencil and paper. Quantum computers just make it practical.
This is not the case for symmetric cyphers - Eve knows nothing until she has some ciphertext, and with most cyphers that plaintext could in theory have been encrypted with any key. The only reason symmetric ciphers can be broken at all is that Eve can guess characteristics of the plaintext, and might discover some way these are reflected in characteristics of the ciphertext. If she doesn't have enough plaintext, or it doesn't have enough structure, then even in principle there is no way for her to break the cipher, since the ciphertext she has could be the result of encrypting many different messages with different keys. Symmetric cypher designers have a large space to explore to find ciphers where the cyphertext does not reveal characteristics of the plaintext, and say with DES it took decades before any attacks better than brute force were revealed in public. For short enough messages, even a substitution cypher is secure.
It is hard to see how a quantum computer would significantly speed up the statistical calculations used to break symmetric cyphers. Grover's search algorithm could speed up brute force searches, but only by a square root, doubling the key length would make the cypher as secure as it would be otherwise. With the attack on RSA, doubling the key length would only increase the difficulty of attack by a constant factor, which doesn't do you much good.
Re:Even Quantum Echelon can't crack 4096-bit keys (Score:2)
So far as I am aware the proposed use of quantum cryptography is to use it to pass, say, a 3DES key and then carry out the rest of the protocol using symmetric key encryption.
Oops (Score:2)
Re:Quantum computers (Score:2)
Re:Factorisation of Very Large values (Score:1)
I must admit to having trouble discovering where this massive breakthrough will come from - you are claiming that you can increase the number of parallel universe "ops" practically without limit and at very low cost, which even to my limited understanding seems unlikely.
--
Re:sorry Charlie (Score:1)
I dunno, but I have a hard time visualizing this. There are about 10^80 protons in the visual part of the universe. 10^80 is less than 2^300. I would like to know how you would generate all possible keys of a 300 bit keylength in trivial amount of time.
-- Abigail
Re:Technology Forecast (Score:2)
j.
Re:The true effects of quantum computers (Score:1)
If Mike blocks a proton, Joe isn't getting it. He tells Bob, so Joe and Bob will know the line is being eaves dropped on. Only if Joe and Bob are stupid, they will continue using the line.
-- Abigail
Re:What we really have to worry about... (Score:1)
In terms of architecture, they are just like any other RISC machine... the only difference is that the logic of the components is mechanical rather than electronic. You still have gates, you still have a bus, you still have registers, only all of these things are built mechanically rather than electronically.
Sorry if this is a brief reply, but Drexler wrote an entire book on this sort of thing, and it's really way too much info to condense into a post.
Mechanik
Re:quantum computing != quantum encryption (Score:1)
has a nice explanation of quantum "crypto". I prefer one-time-pads distributed through q. entanglement, if that is feasible...
well... off to the supermarket and movies... life of the slacker high school senior...
oh. if q. computers can decrypt stuff like:
Fennsense, fnnsonse, aworn! Tuck upp those wide shorts. The pink of the busket for sheer give. Peeps. Stand up to hard ware and step into style. If you soil may, puett, guett me prives...
i offer my soul and any others that i can get my claws on
Re:Doesn't Matter (Score:2)
Damn, they just keep popping up. 'scuse me, gotta clean my bat.
"Reasonable number"? (Score:2)
What do you mean, "reasonable number"? You are talking about at least 4 kilobytes, right? 16,000 bits / 3 for error correction / 2+ for Schor's factoring algorithm heck of a lot of qbits.
Assuming "forseeable breakthroughs", QC is probably going to be expensive and slow. Chances are, you're going to have serious cooling infrastructure, and radiation shielding, and possibly massive magnetic fields if you're using spin-based quantum states. You're going to have effective number of bits cut by at least a factor of three through error correction (and there's really NO way around that). In order to move data from place to place, you're probably going to have to either physically move something around or actually transfer data through a long chain of intervening bits from source to destination. And there are reasons why you won't want the clock rate to get too high.
Even assuming that we do get kilobyte- or megabyte- quantum computing, I don't think encryption would be useless. If "polynomial time" means "6 hours on a million-dollar machine", then I think it's still worth encrypting things. And if Moore's law holds for QC (I doubt it will; QC is too specialized a need to bring to bear the societal resources that have caused Moore's law) we wouldn't have QC on that scale for 20-40 years.
[A year or so ago, I amused myself by projecting Moore's law outwards for both classical and quantum computing. I believe both halves of this projection are overoptimistic, but it's fun. The answer I got was that the first time you would ever be able to solve any problem more cheaply using QC was in 2026.]
The last paragraph of the parent to this comment, though, is very important. We haven't even built linear quantum QC's yet, and already it's looking as if they'll only buy us a square root on NP-complete problems. When it comes to nonlinear quantum QC's, the algorithms are an order of magnitude more mindbending. This is really, really hard stuff, and nobody really knows what's possible. It may be that nonlinear effects make simple error correction exponentially hard, and then you're back where you started.
Re:Overstating the case (Score:2)
The major cryptographic interests w.r.t. quantum computing in this area is the ability to calculate transendental numbers to a given precision such that algebraic approximation is no longer a viable option. The question is the method of transendental number generation.
The area has interest.