Security of Encryption Procedures and Practical Implications of Building a Quantum Computer

Ferenc Koczka
{"title":"Security of Encryption Procedures and Practical Implications of Building a Quantum Computer","authors":"Ferenc Koczka","doi":"10.32565/aarms.2020.3.1","DOIUrl":null,"url":null,"abstract":"In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Academic and Applied Research in Military and Public","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32565/aarms.2020.3.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.
加密程序的安全性及构建量子计算机的实际意义
为了确保资讯科技系统的运作,必须保持数据的机密性和完整性,这是基于一些加密过程。加密过程是基于算法的,其理论由密码学给出。由于它们的复杂性,不仅一般人很难理解,而且大多数熟悉IT的专业人员也很难理解。所使用的算法不是永恒的;各种设计或实现错误,甚至是计算机硬件改进带来的性能提升,都使一次性高成就的算法过时,容易被黑客攻击。强大的算法可以通过其他方式绕过,必要的软件和硬件基础设施已经可以从个人计算设备中构建起来。我在两个不同的密码数据库上测试了它的有效性:通过成功破解大学密码,我证明了用简单的方法绕过强大的算法是可能的。现代加密算法的生命周期相对较长,过时的速度较慢。量子计算机的构建创造了一个新的局面,它需要消除一些程序,并通过额外的方法修改或保护其参数。由于对目前运行的所有it系统的加密算法进行现代化改造是一项不可能完成的任务,因此必须尽快开始准备工作,以便至少对关键系统能够应对新情况。在我的文章中,我想提请注意加密方法的弱点,提出一种绕过目前使用的加密方法的可能方法,演示量子计算机的操作以及与该主题相关的一些算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信