It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The technique varies the intensity of photons and introduces photonic “decoys,” which were transmitted over a 15-kilometre telecommunication fibre. After the signals are sent, a second broadcast tells the receiving computer which photons carried the signal and which were decoys. If a hacker tries to “eavesdrop” on the data stream to figure out the encryption key, the mere act of eavesdropping changes the decoys — a clear sign to the receiving computer that the data has been tampered with.
Originally posted by Rouschkateer
Whoever finds the "unhackable code" deserves a Nobel Peace prize. Ok, while it may take some time, I believe that any code is hackable.
Conventional encryption is based on the assumed complexity of mathematical problems that traditional computers can solve. But quantum cryptography is based on fundamental laws of physics — specifically, Heisenberg’s Uncertainty Principle, which tells us that merely observing a quantum object alters it.
Quantum key distribution is the most advanced application of quantum information theory. There have been many successful experiments in realistic circumstances. In all these experiments the two-state quantum systems exchanged by the communicating parties are realized by photons, the qubit being for example encoded in the polarization of the photon. Most experiments to date use optical fibers to transmit the photons. Currently, distances over tens of kilometers have been achieved at many places, for example, at Los Alamos (USA), BT Labs (UK), the University of Geneva (CH), and the University of Vienna. Another approach sends the photons through the air (see e.g. the Los Alamos Free-Space experiment, the ultimate goal being secure ground-to-satellite communication.
Originally posted by fingapointa
Conventional encryption is based on the assumed complexity of mathematical problems that traditional computers can solve. But quantum cryptography is based on fundamental laws of physics — specifically, Heisenberg’s Uncertainty Principle, which tells us that merely observing a quantum object alters it.
That's the difference that makes the difference. The mere act of intercepting the signal modifies it, so to crack it, you're going to need to get around that. Not to mention, you'll need a machine connected to a fibre optic network, as well as the hardware to decode and encode the photon's.
From the company that makes the hardware:
Quantum key distribution is the most advanced application of quantum information theory. There have been many successful experiments in realistic circumstances. In all these experiments the two-state quantum systems exchanged by the communicating parties are realized by photons, the qubit being for example encoded in the polarization of the photon. Most experiments to date use optical fibers to transmit the photons. Currently, distances over tens of kilometers have been achieved at many places, for example, at Los Alamos (USA), BT Labs (UK), the University of Geneva (CH), and the University of Vienna. Another approach sends the photons through the air (see e.g. the Los Alamos Free-Space experiment, the ultimate goal being secure ground-to-satellite communication.
magiqtech.com
So it still seems like a physical brute force attack would be the most viable, much like the recent U.K bank robbery, where they took a family hostage.
It's a bit beyond the talents of the average script kiddie.
"Quantum cryptographic protocols are so secure that they can not only discover tapping but also where and how much information is leaking out. Now, using telecloning, the identity and location of the eavesdropper can be concealed."
Telecloning and teleportation may no longer be theories, but we are still a long way from teleporting people.
Professor Braunstein said: "What we know is that it would be incredibly difficult and from the perspective of today's technology, a completely outrageous thing. But in 100 years, who knows?"
Originally posted by fingapointa
By a brute force attack, I meant an old school, real, physical attack with guns and stooges and stuff, not a cracking attempt.
Originally posted by negativenihil
Not to mention, wityh the size of current computers, armed people could litterally jsut take the server with them.
I've been hacking for about a decade now, and I have to say; I do NOT think this can be cracked.
This is one thing that will render encryption forfilled on the cracker part for another 500 years
you might think this is 'hackable', this isn't 100% computer, its 50% computer and physics, and you can't hack something that isn't 100% computer... So sorry to spoil your dream.
Originally posted by Volatile
or you take control of the person's computer which will be recieving the proton.