Sexy Spy May Have Confirmed Quantum Computing Breakthrough!
------------------------------------------------------------------------
As you can see by the link provided below, THIS IS A SPY !!!!!!!!!
bumpshack.com...
and
www.msnbc.msn.com...
She's one hot cookie that would definitely make my spyfest day
but to get on with the headline story......
THE BIG STORY:
-------------------
Based upon documents leaked from the case, a news commentator
from NBC may have inadvertently indicated a MAJOR breakthrough
made by U.S. intelligence agencies regarding the methods used to
decode the encrypted communications between the much storied
recently-arrested U.S.-based Russian spies.
NBC News Investigator Bob Windrum stated in the video below,
that U.S. intelligence authorities were able to read the
encrypted communiques (i.e. reports) between the Russian agents
and their handlers. He indicated these encryption codes were some
of their most SECRET ones and that such code-breaking abilities
by the United States intelligence apparatus would be causing
great consternation back in various Russian spy headquarters.
See Video:
news.ca.msn.com...
Now for a background in Cryptography, MOST encryption systems
(such as AES - Advanced Encryption Standard) use 128-bit, 256-bit
or longer-length encryption keys to scramble text or image data
stored on computer disks or when sent over the Internet via email
or file transfer (i.e. FTP).
The number of POSSIBLE permutations to find a high security key
such as 256-bit AES is 2 to the 256th POWER which is one GIGANTIC
NUMBER of possible lock combinations that essentially makes such
an encryption system unbreakable even using techniques such as
differential analysis or comparing key-sequences to final output
curve-fitting techniques.
To illustrate how SOME keys may be broken (even high security AES!)
certain strings of encryption keys that scramble specified types of text
or image inputs will output scrambled data that contains certain
sequences of character types or byte values that almost ALWAYS
place themselves near or away from certain other output by a specific
percentage value byte amount or character count.
The DIFFERENTIAL analysis of the PLACEMENT (i.e. the distance away
from or near to other data) of such calculated output can be compared
to pre-computed input text to create a MOST-LIKELY text or IMAGE match.
And that analysis becomes a LOT EASIER if you know even a FEW of the
words that would be LIKELY to occur in the original text.
The problem is that doing such analysis takes TIME and even a
BRUTE FORCE attack of checking EACH and every one of the 2^256
combinations of encryption keys would take so long that it's impractical!
NOW THAT BIG BANG COMMENT that was made in the video by the analyst,
indicates to me that it is HIGHLY LIKELY that the Russians used advanced
encryption such as their own version of AES and that I say it is UNLIKELY
that there is a true really high-up MOLE in the GRU/FSB(aka KGB)/SVR
intelligence services who would give the USA the actual decryption keys,
and I also say that it is UNLIKELY that the CIA/NCS successfully used
social engineering to pry the key codes out of other agents and that it
was ALSO UNLIKELY that the encryption/decryption keys themselves
were intercepted by the NSA (National Security Agency at Ft. Meade)
or by the DIA (Defence Intelligence Agency)!
I thus construe, however far-fetched it may seem that a
MONSTER BREAKTHROUGH IN COMPUTING SYSTEM HORSEPOWER
WAS RECENTLY MADE !!!!!!
And the ONLY Technology that could break a 256-bit encryption
key-encoded output is a Quantum Computer that uses multiple
Q-Bits which are spinning bits of matter that have indeterminate
quantum spin states that can coalesce into multiple states
at the same time and thus compute normally insurmountable
grand computing challenges such as super-fast factoring of
integer numbers which is a necessary task in order
to BREAK a 256 bit encryption key.
See these websites on Quantum Computing and Quantum Encryption:
en.wikipedia.org...
What technology is available now?:
en.wikipedia.org...
What is Quantum Cryptography?:
en.wikipedia.org...
The BIG KAHUNA of how to EASILY break a key using factoring:
en.wikipedia.org...
Quantum Decryption Resistant Algorithms:
en.wikipedia.org...
And to tell you how much horsepower is needed,
for a 256 Q-bit (which IS POSSIBLE TODAY!) quantum
supercomputer to break a 256 bit key.....
....how about less than a second!
This type of discovery ALSO has implications in the the creation and
design of multi-state logic (i.e. compute all All bit-states at once)
based A.I. systems...which means that somewhere in "The Dungeon"
at the NSA (And elsewhere in the U.S. Military Industrial Complex)
there are PROBABLY more than a few friendly A.I.'s busy at work
doing code breaking AND probably PURE and APPLIED
research & development tasks.
THIS IS BIG NEWS!!!!!!!!!!
And the American Public NEEDS to know about such abilities
which should BE MADE PUBLICLY and COMMERCIALLY AVAILABLE
which could solve technical problems that today would be futile
to attack using today's "von Neumann-type" computers.
So to all of you types at the NSA, where is my home quantum computer?
I will guess this system has been running for at least 5 to 7 years
so this isn't really NEW tech which really gets my goat!
I would start writing your Congressman to implore them to
dig deaper into the possibility of Quantum Computing breakthroughs
probably made at the NSA or at DARPA (Defence Advanced Research
Projects Agency). Get a petition to get "The Powers That Be" to
RELEASE such breakthrough technology to the consumer and the
corporate world...for me, It would be REALLY NICE to be able to
render a 200 hour multimedia content job in less than a second!
COMMENTS WELCOME!!!!! U2U ME IF YOU HAVE FURTHER INFO!!!!!!!