![]() |
![]() ![]() |
![]() |
![]() ![]()
Post
#1
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
http://www.huliq.com/34160/qubits-poised-t...eal-our-secrets
while i dont see quantum computers being hand-held, even in SR, i suspect that perhaps one can pipe whatever one wants to decrypt to some that are rentable online. also, what if the current breed of encryption in SR is commersial. as in, its whats sold as private protection? it will not slow down a dedicated hacker, hell, it may not even slow down the neighbors kids. but for the clueless or semi-clueless consumer its gold. |
|
|
![]()
Post
#2
|
|
Target ![]() Group: Members Posts: 39 Joined: 6-July 07 Member No.: 12,167 ![]() |
Yea I saw that earlier today. It's interesting to say the least. If history bears out, some genious will figure out a new algorith that beats the Quantum computers.
|
|
|
![]()
Post
#3
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
Quantum computers don't effectively compromise symmetric encryption, like AES.
They do, if you can get one that works and has a large enough (like thousnds of qbits) capacity, vastly cut the keyspace down. So AES-256 becomes AES-128. However AES-128 is still effectively immune to brute force attacks unless you are working on a geological timescale. They mostly screw up public key encryption. RSA and Elliptical Curves, for example. But I've read (in articles by people smarter than me) that there are public key approaches that are not susceptible to attack by quantum computers. They just are not widely used. And I believe (though I may well be wrong) that the Shannon's Information Theory says that you still have the entropy cost of doing the decryption using quantum computers. Which results in a huge amount of power being used and heat released for attacking complex codes. |
|
|
![]()
Post
#4
|
|
Target ![]() Group: Members Posts: 89 Joined: 8-September 07 From: Boston, England Member No.: 13,170 ![]() |
I don' t know which concerns me more, my brain leaking out of my ears after reading all of that, or the fact that I understood most of it.
|
|
|
![]()
Post
#5
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
My main gripe withSR encryption is the following:
Shadowrun encryption isn't. :| |
|
|
![]()
Post
#6
|
|
Target ![]() Group: Members Posts: 89 Joined: 8-September 07 From: Boston, England Member No.: 13,170 ![]() |
Just a note Page 102 of Augmentation mentions 'entanglement driven Information Technology' using quantum states . . . .
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 11th March 2025 - 06:50 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.