Bitcoin Forum
April 25, 2024, 03:12:42 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 5 6 »  All
  Print  
Author Topic: How long will existing encryption last?  (Read 2149 times)
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 09:54:00 AM
Merited by Welsh (2), DdmrDdmr (2), The Cryptovator (2), JayJuanGee (1)
 #1

Asymmetric cryptography.
It is it that makes it possible to generate encryption keys for symmetric cryptography.

Transmission, encryption of information is carried out (in most cases) by symmetric cryptographic systems. Because they are much more reliable, less for a key, less load on computing power and the like. But the main thing is reliability.

But in this reliable system, there is an unreliable element, the most important element, an asymmetric system.

Everyone calmed down. No problems. Everything is reliable. But why then the specialized organizations responsible for the "reliability of cryptography" are looking for something, obviously, they are not happy with something.

Why do recognized authorities of cryptographic science give such ambiguous definitions as "conditionally reliable cryptography".

It is interesting to talk about the known facts of the rejection of some asymmetric systems and the intensified search for new ones.

Mathematicians know that all modern asymmetric cryptography is based on unproven mathematical statements. Simply put, from a scientific point of view, only on hypotheses. On unsubstantiated assumptions. It’s good that we know which ones.
 
And cryptography on elliptic curves, which is part of blockchain technology (digital signature), has overgrown with obscure facts. On the one hand, we recommend it for domestic use, on the other hand, it is forbidden to use it in serious matters.

There is an opinion of cryptographers that any system with a public and private key will be hacked sooner or later, and then all your secrets will become known. You save them now (they recommend cryptography on elliptic curves!), And then they will open everything. Well, not a fact.

This is just a danger. And it's not about the progress of quantum computing and (the main nuisance) the provision of these services to anyone, for money, over the network.

But it's not that. Brute-force attack is the fate of the monkey. We are all a little monkeys, we are all afraid of a quantum computer and a complete search. This is not the worst, the keys can be increased and generally go into even larger numerical fields.

 But the main danger is cryptanalysis. He is developing.
The life of a cryptanalyst is like that of a secret agent. Even his family does not know about his real job.
I wonder why such a conspiracy.

The author is committed to the idea that if such “researchers” of asymmetric systems find something, then they will never tell us about it. Or didn’t they already say?

I would like to talk about this and much more in this topic directly relating to our security.
1714057962
Hero Member
*
Offline Offline

Posts: 1714057962

View Profile Personal Message (Offline)

Ignore
1714057962
Reply with quote  #2

1714057962
Report to moderator
1714057962
Hero Member
*
Offline Offline

Posts: 1714057962

View Profile Personal Message (Offline)

Ignore
1714057962
Reply with quote  #2

1714057962
Report to moderator
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Wintersoldier
Sr. Member
****
Offline Offline

Activity: 966
Merit: 274


View Profile
December 13, 2019, 10:20:35 AM
 #2

This could not be a threat, although there are numerous powerful super computers nowadays, encryptions are made in crypto to completely encrypt data. I know a bit in hashing but I'm not a computer knowledgeable person. I believe, what we are using are hashing algorithms that primarily not allowing the data to be decrypted going back to its source. And that technology makes it the most secured and reliable to people. Soon, these powerful supercomputers will not be focused on decrypting already existing data, but mainly in a purpose of creating stronger encryption.
romero121
Legendary
*
Offline Offline

Activity: 3164
Merit: 1213


View Profile
December 13, 2019, 10:26:49 AM
 #3

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.
Kemarit
Legendary
*
Offline Offline

Activity: 3066
Merit: 1352



View Profile
December 13, 2019, 10:40:17 AM
Merited by hugeblack (2), ABCbits (1), DdmrDdmr (1)
 #4

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 12:37:28 PM
 #5

This could not be a threat, although there are numerous powerful super computers nowadays, encryptions are made in crypto to completely encrypt data. I know a bit in hashing but I'm not a computer knowledgeable person. I believe, what we are using are hashing algorithms that primarily not allowing the data to be decrypted going back to its source. And that technology makes it the most secured and reliable to people. Soon, these powerful supercomputers will not be focused on decrypting already existing data, but mainly in a purpose of creating stronger encryption.
--------------------
The blockchain has two reliability technologies: hashing (and the Merkle tree) and a digital signature on cryptography on elliptic curves.
Hashing, I do not question.
And cryptography of elliptic curves - I expose. And not because I'm an expert. But because specialists with world names “refuse” it, not all, but those who did the research. Check out these facts:

"The discovery was not made by full-time employees of GCHQ (the British intelligence unit), but by the mathematicians of the CESG unit, which is responsible for national ciphers and the protection of government communications systems in the UK.

The close interaction between the GCHQ and the NSA is taking place primarily along the lines of joint intelligence activities.

In other words, since the NSA also has its own IAD (Information Assurance Directorate) department specializing in the development of cryptographic algorithms and information protection, the discovery of British colleagues was a complete surprise for the mathematicians of this unit.

Blockchain is hanging by a thread. The blockchain is saved by the non-compromised hashing function and its massive use and decentralization technology.

The most secret and powerful special service in the world (USA) back in 2015 FORBIDDEN to use ESA on which the SDC is based in Bitcoin.

This organization just does nothing.
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 12:53:23 PM
Merited by ABCbits (1), Husna QA (1), The Cryptovator (1)
 #6

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.
-------------------------------------
When you talk about a 256-bit key, it’s only, exclusively, in a symmetric cryptographic system — this code can and should be sorted out completely. In other words, the key can be any of the possible values ​​of 256 bits (in fairness, it should be noted that not every single option can be a key even in a symmetric system, there are weak keys that are unacceptable, but there are an insignificant number of them).

If we are talking about asymmetric cryptography, then not all options from two to the power of 256 can be keys.

If you are afraid of quantum computers, then this is not the danger that you should pay attention to.

Although, it is asymmetric systems that can easily be opened with the Shore algorithm in the presence of quantum computing.

I persistently draw your attention to the danger of elliptical cryptography in the case of cryptanalysis, or in other words, a mathematical attack, rather than brute force attack.

Check the facts:
-----------------------------------
The American mathematician and cryptographer Neil Koblitz, is (along with Victor Miller) one of those two people who in 1985 simultaneously and independently came up with a new public-key crypto scheme, called ECC (this, we recall, is an abbreviation for Elliptic Curve Cryptography , that is, "cryptography on elliptic curves").

Without going deep into the technical details of this method and its difference from the RSA cryptographic scheme that appeared earlier, we note that ECC has obvious advantages from the point of view of practical operation, since the same theoretical stability of the algorithm is provided with a much shorter key length (for comparison: 256-bit ECC operations are equivalent to working with a 3072-bit module in RSA). And this greatly simplifies the calculations and significantly improves the system performance.

The second important point (almost certainly related to the first) is that the extremely secretive NSA in its cryptographic preferences from the very beginning began to lean in favor of ECC. (!)

In the early years and decades, this reached the academic and industrial circles only in an implicit form (when, for example, in 1997, an official of the NSA, Jerry Solinas, first spoke at the Crypto public conference - with a report on their modification of the famous Koblitz scheme).
Well, then, it was already documented. In 2005, the NSA published its recommendations on cryptographic algorithms, in the form of the so-called Suite B (“Set B”) - a set of openly published ciphers for hiding secret and top-secret information in national communication systems.
All the basic components of this document were built on the basis of ECC, and for RSA, the auxiliary role of the “first generation” (!) Was assigned, necessary only for a smooth transition to a new, more efficient cryptography on elliptic curves ... (!)

Now we need to remember about Alfred Menezes, the second co-author of the article about "Puzzle, shrouded in a riddle." The Canadian mathematician and cryptographer Menezes has been working at the University of Waterloo, one of the most famous centers of open academic cryptography, all his scientific life since the mid-1980s. It was here that in the 1980s, three university professors created Certicom, a company that developed and commercialized cryptography on elliptic curves.

Accordingly, Alfred Menezes eventually became not only a prominent Certicom developer and author of several authoritative books on ECC crypto circuits, but also a co-author of several important patents describing ECC. Well, the NSA, in turn, when it launched its entire project called Suite B, previously purchased from Certicom a large (twenty-odd) package of patents covering “elliptical” cryptography.

This whole preamble was needed in order to explain why Koblitz and Menezes are precisely those people who, for natural reasons, considered themselves knowledgeable about the current affairs and plans of the NSA in the field of cryptographic information protection.

However, for them, the NSA initiative with a sharp change of course to post-quantum algorithms was a complete surprise. (!)

Back in the summer of 2015 (!) The NSA “quietly”, without explaining absolutely to anyone, removed the “P-256” ECC algorithm from its kit, while leaving it with its RSA equivalent with a 3072-bit module. Moreover, in the NSA's accompanying statements it was quite clearly said that all parties implementing the algorithms from Suite B now no longer make any sense to switch to ECC, but it is better to simply increase the RSA key lengths and wait until new post-quantum ciphers appear ...

But why? What is the reason for such a sharp rollback to the old RSA system?
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 01:06:44 PM
 #7

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.
---------------------------------------------
The cryptographic post-quantum systems you have indicated are well known for a long time and all of them have their drawbacks and advantages. You have not yet indicated everything, there are more of them.

And they were known far until 2015, when NIST announced a competition and this competition was supposed to end 2017-2018, but it continues to this day. Why do this if cryptography on elliptical circles is reliable?

Shore Algorithm? So increase the key length and no contests are needed.

For reference, I note that the 256-bit AES key = is 512 ECC and equal to 15300 bit RCA.

Why did they need a new encryption system if you can simply increase the ECC to 512 bits?
dothebeats
Legendary
*
Offline Offline

Activity: 3626
Merit: 1352


Cashback 15%


View Profile
December 13, 2019, 01:11:13 PM
 #8

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 01:35:36 PM
 #9

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.
----------------------------
The Google company itself may not be doing this, although it is not the only one who makes a quantum computer.

But strangers will do this for two reasons:

1. All companies that publicly announce the construction of a quantum computer - all provide access to it on a commercial basis!
This is a disturbing fact. And the Amazon company - purposefully plans to deal only with such services and writing quantum software.

2. Think of those who are used to stealing.

And most importantly, cryptanalysts. Their mathematical methods reduce the number of options that need to be sorted out. And quantum computing is what they need.

If a simple search and a simple computer need 10,000 years, then a quantum one - 3 minutes. This is without mathematical methods. If you use cryptanalysis, then reduce this time by 1000 times.

But I'm not talking about this, but about the fact that this happened in 2015-2016, that cryptography on elliptic curves became dangerous? Then there were still no quantum computers.
DreamStage
Sr. Member
****
Offline Offline

Activity: 625
Merit: 258


View Profile
December 13, 2019, 01:42:00 PM
 #10

There will be much more implemented and worth solutions in the near future i am sure of that.
You can take for instance our current encryption systems in everywhere you go from password to 2fa to public and private keys acessing SSH.

Surely the best would be to increase max encryption byte sizes but that's way more complex to talk about it here.

About bitcoin you can expect something newer sooner or later till some hacker gets some cracking implementation.
If it gets cracked (assuming private keys hacked) developers will jump into and make it stronger.

That's when existing encryption will no longer exist and new one emerge.

Nothing to see here
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 13, 2019, 02:24:57 PM
 #11

There will be much more implemented and worth solutions in the near future i am sure of that.
You can take for instance our current encryption systems in everywhere you go from password to 2fa to public and private keys acessing SSH.

Surely the best would be to increase max encryption byte sizes but that's way more complex to talk about it here.

About bitcoin you can expect something newer sooner or later till some hacker gets some cracking implementation.
If it gets cracked (assuming private keys hacked) developers will jump into and make it stronger.

That's when existing encryption will no longer exist and new one emerge.
---------------------------
When you talk about SSH, you are actually talking about a protocol that is based on an asymmetric RCA system.

Good old system. The key length for this system is now 4096 bits. It seems like they’re not using it anymore.

To protect against quantum attacks (we are not discussing cryptanalysis, which is much more dangerous), the minimum key for this system should be 15,300 bits or 16,386 bits in machine form.
But why not use them?
Because the load on the computer will increase so that you do not like it.

And what can we say about post-quantum encryption, there the key lengths (in asymmetric systems) are so large that I don’t want to write.

In addition, you still have the main problem - the problem of confirming that this is your pair - public and private keys. After all, before you, anyone can generate them. And these are X.509 certificates of trust with all the ensuing consequences and risks.

In general, we again come to the traditional system of trust that we have been forced upon. And again we get all its charms - hacking, phishing, hacker attack on your computer to steal your keys, etc.

So this is not an option, this is the molding of old cryptography systems into a new protocol. Nothing really safe.
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 15, 2019, 12:30:46 AM
 #12

As for the universal trust certification system, which serves to prevent such attacks, in fact, unfortunately, it will not be difficult for a fraudster to get a valid SSL certificate for his fake site - now it can be obtained in 20 minutes using special services.

So do certified phishing sites or phishing sites. It turns out that in real life, simple users need to take care of their own safety, and not rely on the proposed "trust system".
Wintersoldier
Sr. Member
****
Offline Offline

Activity: 966
Merit: 274


View Profile
December 15, 2019, 06:27:20 AM
 #13

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.

Basically they are bound to obey the regulations about their quantum computer development. It will not be allowed and will be restricted that they use their technology to specifically compromise the cryptocurrency. In the first place, even us who are using just generic classical computers are also bound to follow the regulation about hacking and compromising a system. There are different Data privacy laws per country and there are also anti cyber criminal laws. What more if the company is like google or ibm, who are a leading company in computer technologies.
Voland.V (OP)
Full Member
***
Offline Offline

Activity: 224
Merit: 120


View Profile WWW
December 15, 2019, 07:08:29 AM
 #14

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.

Basically they are bound to obey the regulations about their quantum computer development. It will not be allowed and will be restricted that they use their technology to specifically compromise the cryptocurrency. In the first place, even us who are using just generic classical computers are also bound to follow the regulation about hacking and compromising a system. There are different Data privacy laws per country and there are also anti cyber criminal laws. What more if the company is like google or ibm, who are a leading company in computer technologies.
----------------------------------
Yes, this is so ... Organizations building their quantum computers - always operate within the framework of the laws of their country. I also don’t think that the blockchain protocol can be attacked by these quantum calculations.

But there is a danger of cryptography if the possibility of quantum computing is provided to the public, but they are provided.

Our entire digital life, security, is first of all cryptography. If it disappears, all our secrets will disappear. This is more dangerous than the blockchain itself.

Break down, become dangerous - even the Internet transport protocols, which now allow us to conduct operations with bitcoin !!!

1. Quantum computers are only a single occurrence today; approximately 5 companies have announced this loudly. But tomorrow it will become a mass phenomenon. For the reason that the mechanism for improving quantum computers has been launched. I read the latest news and I did not like them. Progress is very rapid. It is possible that in 10-15 years, quantum computers will be in our homes.
We can even conclude a bet.

2. The same Google company paid fines to the European Union for violating the laws of the confidentiality of user data. Moreover, the Google company, and not only it, didn’t do anything by accident. Therefore, it is not necessary to think that only angels work there.

3. And who will forbid companies to create quantum computers in countries or in places where laws are completely not as liberal as in other countries? The world is moving towards a separation of interests rapidly. And breaking laws is becoming more profitable. And our governments are becoming more irresponsible.
 
The disappearance, compromise, of our cryptography is a disaster for all Internet users!
alyssa85
Legendary
*
Offline Offline

Activity: 1652
Merit: 1088

CryptoTalk.Org - Get Paid for every Post!


View Profile
December 15, 2019, 11:57:45 AM
 #15

IF it looks like bitcoin's encryption looks likely to be broken, then the developers will simply work on an improved version and we all hard fork into that.

The idea that everyone is just sitting there passively and that there won't be a fight back is nonsense. There is too much money at stake, and I'm sure people are working on improved encryption as we speak.

 
                                . ██████████.
                              .████████████████.
                           .██████████████████████.
                        -█████████████████████████████
                     .██████████████████████████████████.
                  -█████████████████████████████████████████
               -███████████████████████████████████████████████
           .-█████████████████████████████████████████████████████.
        .████████████████████████████████████████████████████████████
       .██████████████████████████████████████████████████████████████.
       .██████████████████████████████████████████████████████████████.
       ..████████████████████████████████████████████████████████████..
       .   .██████████████████████████████████████████████████████.
       .      .████████████████████████████████████████████████.

       .       .██████████████████████████████████████████████
       .    ██████████████████████████████████████████████████████
       .█████████████████████████████████████████████████████████████.
        .███████████████████████████████████████████████████████████
           .█████████████████████████████████████████████████████
              .████████████████████████████████████████████████
                   ████████████████████████████████████████
                      ██████████████████████████████████
                          ██████████████████████████
                             ████████████████████
                               ████████████████
                                   █████████
.YoBit InvestBox.|.BUY X10 AND EARN 10% DAILY.🏆
kryptqnick
Legendary
*
Offline Offline

Activity: 3080
Merit: 1384


Join the world-leading crypto sportsbook NOW!


View Profile
December 15, 2019, 12:38:11 PM
 #16

It seems to me that it's impossible to make even an educated guess about that. It might seem nowadays that the progress if fast, and we don't have much time left, but people were sure that trips to Mars would be casual, whereas they still are not even close to that. In a TV series that I mention quite a lot here ('Silicon Valley') the team accidentally came up with an algorithm that compresses information in such a great way and keeps perfecting itself so fast that the strongest encryption there is, is about to get broken. It's a fiction story, of course, but we cannot know whether something like this can happen in 5 years from now, in a hundred years from now or never.
It seems to me that we are reaching the limit of the advancement of computers (transistors cannot become smaller for now, because quantum processes come in), and it's unclear whether we'll even crack quantum physics to make it work to our advantage, but we have to be cautious just in case.

  ▄▄███████▄███████▄▄▄
 █████████████
▀▀▀▀▀▀████▄▄
███████████████
       ▀▀███▄
███████████████
          ▀███
 █████████████
             ███
███████████▀▀               ███
███                         ███
███                         ███
 ███                       ███
  ███▄                   ▄███
   ▀███▄▄             ▄▄███▀
     ▀▀████▄▄▄▄▄▄▄▄▄████▀▀
         ▀▀▀███████▀▀▀
░░░████▄▄▄▄
░▄▄░
▄▄███████▄▀█████▄▄
██▄████▌▐█▌█████▄██
████▀▄▄▄▌███░▄▄▄▀████
██████▄▄▄█▄▄▄██████
█░███████░▐█▌░███████░█
▀▀██▀░██░▐█▌░██░▀██▀▀
▄▄▄░█▀░█░██░▐█▌░██░█░▀█░▄▄▄
██▀░░░░▀██░▐█▌░██▀░░░░▀██
▀██
█████▄███▀▀██▀▀███▄███████▀
▀███████████████████████▀
▀▀▀▀███████████▀▀▀▀
▄▄██████▄▄
▀█▀
█  █▀█▀
  ▄█  ██  █▄  ▄
█ ▄█ █▀█▄▄█▀█ █▄ █
▀▄█ █ ███▄▄▄▄███ █ █▄▀
▀▀ █    ▄▄▄▄    █ ▀▀
   ██████   █
█     ▀▀     █
▀▄▀▄▀▄▀▄▀▄▀▄
▄ ██████▀▀██████ ▄
▄████████ ██ ████████▄
▀▀███████▄▄███████▀▀
▀▀▀████████▀▀▀
█████████████LEADING CRYPTO SPORTSBOOK & CASINO█████████████
MULTI
CURRENCY
1500+
CASINO GAMES
CRYPTO EXCLUSIVE
CLUBHOUSE
FAST & SECURE
PAYMENTS
.
..PLAY NOW!..
Twentyonepaylots
Sr. Member
****
Online Online

Activity: 1848
Merit: 370


View Profile
December 15, 2019, 01:36:44 PM
 #17

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.

Basically they are bound to obey the regulations about their quantum computer development. It will not be allowed and will be restricted that they use their technology to specifically compromise the cryptocurrency.
I don't think there are such regulation that prohibits quantum computer to mine cryptocurrency especially bitcoin just because it is powerful technology, If then, that regulation should also prohibit the centralized mining.
In the first place, even us who are using just generic classical computers are also bound to follow the regulation about hacking and compromising a system. There are different Data privacy laws per country and there are also anti cyber criminal laws. What more if the company is like google or ibm, who are a leading company in computer technologies.
And I don't think that google is improving the quantum because of cryptocurrency or compromising other's system just to gain supremacy, it ain't that way. Google and IBM are running for a long time, it is their job to improve and develop our technology. Not even a single quantum computer is recommended to mine crypto coz that would generate so much electricity disproportion to its gains.
ChuckBuck
Hero Member
*****
Offline Offline

Activity: 1372
Merit: 783


better everyday ♥


View Profile WWW
December 15, 2019, 04:23:39 PM
 #18

Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.
Objectively, quantum computers were manufactured successfully by Google. It is unique, it will never be mass produced. Just like the way all big companies do, Google will use it as a proprietary tool to provide the most benefits possible. No hacker can afford to own a quantum computer, of course they can't crack bitcoin either. Moreover, quantum computers can't crack bitcoin, as we mentioned above.
Therefore, it will take a long time for quantum technology to develop more, and of course, the time of encryption is still very long in the future.

CharityAuction
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
ColdScam
darkangel11
Legendary
*
Offline Offline

Activity: 2338
Merit: 1345


Defend Bitcoin and its PoW: bitcoincleanup.com


View Profile
December 15, 2019, 04:43:00 PM
 #19

I don't even want to mention quantum computers here. This whole idea is in such an early phase that even people working on this technology can't fully understand how to make it compatible with the existing binary software.
How long will the encryption last? Probably as long as there's no real threat to its existence. People have a tendency to upgrade things when they need to. When one country makes a submarine another country makes locating beacons and sonars to detect it and so on. For now there's no impending threat so nobody cares and nobody tries to upgrade the security.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
tsaroz
Legendary
*
Offline Offline

Activity: 2926
Merit: 1069


★Bitvest.io★ Play Plinko or Invest!


View Profile WWW
December 15, 2019, 04:49:05 PM
 #20

The current encryption technology is going to last less than what we predicted before.
Bitcoin's encryption and private keys would be vulnerable by the year 2030.
But only the chief projects working on it would achieve that feat and lets hope none of them would ever attack bitcoin.



.
.BIG WINNER!.
[15.00000000 BTC]


▄████████████████████▄
██████████████████████
██████████▀▀██████████
█████████░░░░█████████
██████████▄▄██████████
███████▀▀████▀▀███████
██████░░░░██░░░░██████
███████▄▄████▄▄███████
████▀▀████▀▀████▀▀████
███░░░░██░░░░██░░░░███
████▄▄████▄▄████▄▄████
██████████████████████

▀████████████████████▀
▄████████████████████▄
██████████████████████
█████▀▀█▀▀▀▀▀▀██▀▀████
█████░░░░░░░░░░░░░████
█████░░░░░░░░░░░░▄████
█████░░▄███▄░░░░██████
█████▄▄███▀░░░░▄██████
█████████░░░░░░███████
████████░░░░░░░███████
███████░░░░░░░░███████
███████▄▄▄▄▄▄▄▄███████

██████████████████████
▀████████████████████▀
▄████████████████████▄
███████████████▀▀▀▀▀▀▀
███████████▀▀▄▄█░░░░░█
█████████▀░░█████░░░░█
███████▀░░░░░████▀░░░▀
██████░░░░░░░░▀▄▄█████
█████░▄░░░░░▄██████▀▀█
████░████▄░███████░░░░
███░█████░█████████░░█
███░░░▀█░██████████░░█
███░░░░░░████▀▀██▀░░░░
███░░░░░░███░░░░░░░░░░

██░▄▄▄▄░████▄▄██▄░░░░
████████████▀▀▀▀▀▀▀██
█████████████░█▀▀▀█░███
██████████▀▀░█▀░░░▀█░▀▀
███████▀░▄▄█░█░░░░░█░█▄
████▀░▄▄████░▀█░░░█▀░██
███░▄████▀▀░▄░▀█░█▀░▄░▀
█▀░███▀▀▀░░███░▀█▀░███░
▀░███▀░░░░░████▄░▄████░
░███▀░░░░░░░█████████░░
░███░░░░░░░░░███████░░░
███▀░██░░░░░░▀░▄▄▄░▀░░░
███░██████▄▄░▄█████▄░▄▄

██░████████░███████░█
▄████████████████████▄
████████▀▀░░░▀▀███████
███▀▀░░░░░▄▄▄░░░░▀▀▀██
██░▀▀▄▄░░░▀▀▀░░░▄▄▀▀██
██░▄▄░░▀▀▄▄░▄▄▀▀░░░░██
██░▀▀░░░░░░█░░░░░██░██
██░░░▄▄░░░░█░██░░░░░██
██░░░▀▀░░░░█░░░░░░░░██
██░░░░░▄▄░░█░░░░░██░██
██▄░░░░▀▀░░█░██░░░░░██
█████▄▄░░░░█░░░░▄▄████
█████████▄▄█▄▄████████

▀████████████████████▀




Rainbot
Daily Quests
Faucet
Pages: [1] 2 3 4 5 6 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!