‘Breaking public key encryption using quantum computers’

And a TED Talk about these critters …

And a status report …

POSTSCRIPT, 19th September 2013. I’m thinking about the hubbub about the Snowden-and-ilk suggestion that the NSA deliberately affected or crafted encryption standards to allow them access to these codes more readily, the elliptic curves codes promulgated by NIST receiving much of the focus. Heck. Even The Economist’s usually erudite Babbage gets in on the party, stooping so low as to crown Bruce Schneier the Self-Proclaimed Champion of All That Is Good an Authority. (See http://www.economist.com/blogs/babbage/2013/09/breaking-cryptography.) But I wonder if their might be another flaw most are forgetting. In everyone’s rush to exist if not live in a push-a-button, fire-and-forget world they’ve come to rely upon experts and authorities like NIST or the NSA or Google searches or Babbage or even Mr Schneier for opinion and guidance. What about looking into the original maths for the elliptic curves yourselves, the proofs and theorems, and see if you are satisfied? Or what about doing a critical review of the implementation codes? No, you don’t. Because you have ceded knowledge of maths and sciences to others on your behalf and you are caught not in a technical problem which has a solution, but in a subjective quandary about who you trust. You put yourself there and you didn’t and don’t have to be there. You can find out yourselves.

Whether it is encryption codes or the Internet or your cell phone or climate disruption, you don’t have to trust authority. You can study and learn and master it yourself. The road may be hardbut it can be done. And if you don”t or if it’s too much bother, really who then who is at fault that you are vulnerable? This is not magic. These are not magicians.

About hypergeometric

See http://www.linkedin.com/in/deepdevelopment/ and https://667-per-cm.net/about
This entry was posted in engineering, mathematics, physics, science. Bookmark the permalink.