ChineseTiger1986
ELITE MEMBER
- Joined
- Jan 27, 2010
- Messages
- 23,530
- Reaction score
- 12
- Country
- Location
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
And what are you going to do with this? Burn a hole in china?
10PW? Going for 100 PW? My almighty god.
Key components for the world's first quantum satellite delivered:
中国首颗量子科学实验卫星关键部件交付 世界第一_凤凰军事
View attachment 176687
How safe, or unbreakable do you think quantum encryption and communications will be cirr? Will it be a major shift... or will it be the same old, same old? I, having spent my career in the Navy collecting "secure" information through alternative means, plucking plain-text versions of encrypted comms from the air, think quantum encryption will make a difference, but won't be a radical shift. Here's the more limited reason why.
1. encryption is nice, but as I mentioned, there are other ways to gather information. ELINT and SIGINT focuses on these aspects. Why should I intercept, and crack the encryption on your e-mail you sent to your contacts, when I can read it word for word as you type it thanks to the unique electrical signals, signals that can't be encrypted, as you write the message? Encryption doesn't make a difference if unencrypted versions of encrypted data can be gathered. This practice is called EMSEC.
2. Quantum cryptography guarantees nobody can intercept the key without being noticed. This does not mean the message is unreadable however, just that the sender will notice if their message is being read.
Most of the decryption efforts are not based on knowing the key. So if these efforts ever succeed, keeping the key perfectly secretive is not enough.
You can transmit a message, of course. But people can still intercept it, just not without your knowledge. It is perfectly fine for the key transmission (if your key is intercepted, just transmit another set). For real messages, it doesn't work so well.
More over, quantum encryption isn't unbreakable, the laws of physics allow for loopholes:
Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | WIRED
Commercial Quantum Cryptography System Hacked | MIT Technology Review
This white hat hacker cracks quantum encryption for fun and profit | VentureBeat | Security | by John Koetsier
Hackers blind quantum cryptographers : Nature News
How quantum cryptography works: And by the way, it's breakable - TechRepublic
Also quantum encryption is based on the quantum wave theory, so I'll provide some info on that as well:
Quantum Wave Theory | A Model of Unity in Nature
Cracking quantum encryption has already been done!!!
I can't give you a lot of information on EMSEC... well, I can, but not legally or without compromising US security, so I won't offer too much beyond publicly available information. EMSEC is the purview of the NSA, that should tell you just how secretive much of it is, though the military does it as well. I will offer a few public links though:
What is Emission Security (EMSEC)? - Definition from Techopedia
https://www.cl.cam.ac.uk/~rja14/Papers/SE-15.pdf
Quantum encryption is really cool, and it will make a difference, but it's not unbreakable, it's just difficult to read without the sender knowing about it.
All that said, very, very cool laser!!! China is making amazing progress on nuclear fusion and while it's still a bit too far into the future, it will come thanks the combined efforts of nations like China, the US and regional blocs like the EU. One day fusion power will be a reality.
Like @Peter C offered, we too are working with high-powered lasers for nuclear fusion, great to see nations taking such a strong interest in this!
Petawatt Laser
@Chinese-Dragon - I value your knowledge more then most of your compatriots on PDF, given you are often very knowledgeable and don't hype things to the point of dishonesty, do you have any additional information or knowledge on quantum encryption? Admittedly I don't know what you do, are studying or specialize in, so if you can't offer any additional insight I will understand completely.
Gambit you're very knowledgeable, can you offer any additional insights into alternative means of gathering unencrypted versions of encrypted communications such as SIGINT or ELINT methods... or at least those publicly known?
You are entirely correct sir.
The "weak link" has always been the human element. Regardless of the level of encryption.
Encryption is generally about making it too costly for others to break it, but a dedicated team (say at the NSA) could break strong encryption keys without too much hassle, the only thing is that it will take a long time.
So if it's an urgent matter (say relating to national security), I wouldn't expect any system, no matter how secure to be foolproof enough to stop a determined adversary with the resources of the NSA. The question is, how long can you delay them for, and will that be enough to deter them?
And of course, there are technological counter-measures as well, such as those mentioned in the WIRED article you quoted, regarding the actual implementation of such a system.
P.S. I can't send you private messages, maybe due to post count limitations. I'd like to discuss something with you regarding a mutual friend here, so if you could send a message to my email account at tianshangzhanzheng @ gmail . com that would be great. It's nothing urgent or particularly concerning, though I'd recommend you don't use your main email account for reasons of privacy, the one I listed is my secondary account.
Future China will use Lazer GunOur next goal is the 100 petawatt superlaser.
中国超短超强激光器突破1千万亿瓦功率大关 目标1万万亿瓦
View attachment 176597
View attachment 176598
Sure there are such methods. One of them is...@gambit you're very knowledgeable, can you offer any additional insights into alternative means of gathering unencrypted versions of encrypted communications such as SIGINT or ELINT methods... or at least those publicly known?
In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. Some side-channel attacks require technical knowledge of the internal operation of the system on which the cryptography is implemented, although others such as differential power analysis are effective as black-box attacks. Many powerful side channel attacks are based on statistical methods pioneered by Paul Kocher.
Not talking about the human factor such weak passwords or careless use of flash drives, the weakest points of any method of data security is immediately prior to the encryption process and after the decryption processes.If you want to keep your data secure, you only really have two viable options: Heavy-duty encryption, physical security, and ideally both at the same time. If an attacker can’t get physically close to your data, it instantly becomes much harder to steal it. As far as mitigating acoustic cryptanalysis attacks, you either implement physical security — keep your laptop in a sound-tight box, or never let anyone near your computer when you’re decrypting data — or you need to use a “sufficiently strong wide-band noise source.” Something like a swooping, large-orchestra classical concerto would probably do it.
EVE Serenity……I was one of them in that battle.
Nuclear fusion。Solve the world's energy and pollution problem once and for all。
China is moving fast on all fronts for the Man-Made Sun。
Four years ago, i ever was a captain in EVE international server ... only few months too busy to play EVE. The funny thing is im a good dealer to earn $100 by selling ships in different universe.EVE Serenity……I was one of them in that battle.
New Recruit