In 2010, the United States government, after accessing encrypted files by means of physical intervention, exposed ten Russian sleeper agents; in 2013, the United States government, without any means of physical intervention, surreptitiously collected and promptly decrypted many previously encrypted (Wood). Within this decade, concerns regarding the dubious security of contemporary cryptography will begin to emerge as the secrets of quantum computing quickly unravel. Companies that rely on Moore’s law, which asserts that computing power doubles every eighteen months, to justify using the theoretically weak cryptography scheme known as RSA will succumb to the risks posed by unforeseen developments in this branch of computer science. Such an occurrence resides not too far in the future, and when the stasis between the two opposing forces of cryptological and quantum development breaks, it will upend all encryption techniques presently practiced. In order to ward off the impending risk of nil action, businesses must invest in more dependable technologies.
All of the the modern world’s electronic security relies on a system developed before the dawn of microprocessors known as “public-key cryptography,” which encrypts information with a lock that only the handler can unlock using a so called ‘public key’. When first conceived in the 1940s, everyone lauded the idea of using inextricably convoluted code to obfuscate information. As a result, society built most of modern day cryptography upon this foundation. Looking to improve upon this architecture in the 1970s, Ron Rivest, Adi Shamir, and Leonard Adleman developed a new cryptographic scheme called “RSA” that works in a similar...
... middle of paper ...
... the gravity of an oncoming crises and possibly diffuse it entirely.
While the future arrives quickly, and quantum computing technology develops at an unprecedented rate, the development of a complete and fully functional quantum computer will engender the world with both luxuries and hazards. Even so, quantum computers don’t harbor danger in and of themselves -- only the people who find it useful to abuse them harbor danger. Individuals and policy makers can not avoid this by condemning the use and development of this technology. By investing in other encryption technologies, companies can secure their digital assets from a brute-force attack. In a time when the government already puts cyber-security at stake, progression remains as the only conceivable option. For better or for worse, the computing power the government has today, the people will have tomorrow.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Investigation Into the Creation of a Research Facility for the Development of a Quantum Computer We are nearly five years into the new century and we still have not found a solution to the breakdown of Moore's law. After ten years of continually shrinking the chip size surely we are now ready to move on in a different direction. The age of the silicon computer is coming to an end. It is time for us to move on. The future is in the development of the quantum computer. We must begin research now before it is too late.... [tags: Papers]
914 words (2.6 pages)
- introduction A quantum computer is one which exploits quantum-mechanical interactions in order to function; this behavior, found in nature, possesses incredible potential to manipulate data in ways unattainable by machines today. The harnessing and organization of this power, however, poses no small difficulty to those who quest after it. Subsequently, the concept of quantum computing, birthed in the early 80's by physicist Richard Feynman, has existed largely in the realm of theory. Miraculous algorithms which potentially would take a billionth of the time required for classical computers to perform certain mathematical feats, and are implementable only on quantum computers, as such ha... [tags: quantum physics computer]
1351 words (3.9 pages)
- ... As one can imagine, such a cipher was easy to break just from analyzing the ciphertext, and thus more complicated ciphers involving mathematical theory were created. However as the advancement of cryptography continued, so did its contrary field of cryptanalysis, the interpretation of protocols. This arrived at the discovery of frequency analysis; the process in which the repetition of certain characters in a language is greater than those of other characters. Thus the frequency of certain meaningless characters in a ciphertext would be higher than those of other ones.... [tags: communication, cipher, computers]
1585 words (4.5 pages)
- Missing figures With today's technology we are able to squeeze millions of micron wide logic gates and wires onto the surface of silicon chips. It is only a matter of time until we come to a point at which the gates themselves will be made up of a mere handful of atoms. At this scale, matter obeys the rules of quantum mechanics. If computers are to become smaller and more powerful in the future, quantum technology must replace or reinforce what we have today. Quantum computers aren't limited by the binary nature of the classical physical world.... [tags: quantum physics computer]
924 words (2.6 pages)
- Quantum Cryptography Keeping secrets and passing information that is undetected has long been the goal of cryptographers. Codes have been written and then broken keeping cryptographers in constant search for the unbreakable code. Until recently, that goal seemed unreachable; however, a solution to the once impossible question seems to have surfaced. Quantum cryptography delves down into the world of very small particles, where there are entirely new ways of building ciphers. ("Arrives" 2) Quantum cryptography is a relatively recent discovery in the world of cryptography and is still being tested by the government for distance and practicality.... [tags: Codes Cryptography Symbols Essays]
978 words (2.8 pages)
- Sophistication has advanced as people learnt new ways of developing various physical resources such as materials, forces and energies. The history of computer technology has involved an order of changes of physical understanding, from gears and relays to valves to transistors and integrated circuits and so on. Today's advanced lithographic methods can squeeze portion of micron wide logic gates and buses onto the surface of silicon chips. Soon they will carry even smaller parts and eventually get to a point where logic gates are so minute that they are built out of a handful of atoms.... [tags: Technology ]
1413 words (4 pages)
- A Closer Look At Cryptography Ever since the earliest days of writing, people have had reasons to limit their information to a restricted group of people. Because of this, these people have had to develop ideas of making their information unable to be read by unwanted people. The general techniques used to hide the meaning of messages constitute the study known as cryptography. "Ciphers, in general fall into three major classifications: 1. Concealment Cipher, 2. Transposition Cipher, and 3. Substitution Cipher" (4).... [tags: Writing Cryptography History Papers]
2016 words (5.8 pages)
- Quantum Computers The beginning of quantum computers came at the turn of the twentieth century when there was a scientific revolution and quantum mechanics was born. Quantum computers are based off of the mathematical framework of quantum mechanics and have a multitude of uses that are applicable in today’s world and the futures. Quantum computers have the possibility of processing numerous complicated efficient algorithms at one time by harnessing the power of the atom. Current quantum computers have the ability to be used in today’s world, however, their true power has not yet been harnessed because several complications with the use of atoms.... [tags: Mathematics Technology Essays]
1041 words (3 pages)
- 2.1 Introduction Cryptography is an interesting field in the world of computer security. This has been boosted by the increase in computer attacks emanating from the Internet. With large and confidential data being transferred over the Internet, its security must be addressed. It is because of this that encryption techniques are continually evolving. With computer hackers being IT experts who are hungry to get at personal data on the Internet, IT security experts have also made sure that they come up with products to combat and stay ahead of the hackers.... [tags: Information Technology]
823 words (2.4 pages)
- Cryptography Part one---Why do we need to learn cryptography Now is a time which the information is extremely development. A lot of datas are stored by the form of electronic messages. The transmission of the information is often through electronic medium such as mobile phone communication, electronic commerce, the on-line chat service etc. Unfortunately, those way of transmit the information are not safe. The message that we delivered is possible be stolen or monitored. If we have no appropriate protect measure, so once the important messages leaks out, the result may be inconceivable.... [tags: Computers]
2194 words (6.3 pages)