NSA seeks to build quantum computer that could crack most types of encryption
Source: Washington Post
In room-size metal boxes secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.
According to documents provided by former NSA contractor Edward Snowden, the effort to build a cryptologically useful quantum computer a machine exponentially faster than classical computers is part of a $79.7 million research program titled Penetrating Hard Targets. Much of the work is hosted under classified contracts at a laboratory in College Park, Md.
The development of a quantum computer has long been a goal of many in the scientific community, with revolutionary implications for fields such as medicine as well as for the NSAs code-breaking mission. With such technology, all current forms of public key encryption would be broken, including those used on many secure Web sites as well as the type used to protect state secrets.
Physicists and computer scientists have long speculated about whether the NSAs efforts are more advanced than those of the best civilian labs. Although the full extent of the agencys research remains unknown, the documents provided by Snowden suggest that the NSA is no closer to success than others in the scientific community...
Read more: http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html
"...the NSA is no closer to success than others," Really??? It looks like the NSA's partner in treason already owns this tech:
Google and a corporation associated with NASA are forming a laboratory to study artificial intelligence by means of computers that use the unusual properties of quantum physics. Their quantum computer, which performs complex calculations thousands of times faster than existing supercomputers, is expected to be in active use in the third quarter of this year.
The Quantum Artificial Intelligence Lab, as the entity is called, will focus on machine learning, which is the way computers take note of patterns of information to improve their outputs. Personalized Internet search and predictions of traffic congestion based on GPS data are examples of machine learning. The field is particularly important for things like facial or voice recognition, biological behavior, or the management of very large and complex systems (no mention of breaking encryption)...
http://bits.blogs.nytimes.com/2013/05/16/google-buys-a-quantum-computer/?_r=0
Quantum computer developed by D-Wave Systems.
Thinkingabout
(30,058 posts)Turbineguy
(37,337 posts)openfield
(30 posts)"could break nearly every kind of encryption used to protect banking, medical, business and government records around the world."
One can not violate human rights and be called a patriot.
Indi Guy
(3,992 posts)There are those who call Snowden a traitor. That's pretty ironic, given that he put himself at great risk to expose the treasonous acts of a government agency.
Thanks for the welcome Indi Guy!
24601
(3,962 posts)the Constitution.
He should instead face espionage charges. If acquitted, our system says he goes free. If convicted, the law provides appropriate penalties. My recollection is that the death penalty is off the table for acts committed when war isn't declared.
What he is not is a whistle-blower - neither in what he stole nor in the manner he disclosed it.
I'd like to see your case that the President (which directs NSA through the Secretary of Defense and Director of National Intelligence) has waged war against the US or given aid to it's enemies. (see the Constitution for the exact wording) I believe that absent a declaration of war, defining an "enemy" is rhetorical at best.
Indi Guy
(3,992 posts)...treason is generally defined as giving aid of some sort to the enemy; so I'll ask you this:
item - The NSA is sharing data with Israel. Before filtering out Americans information.
Although Israel is not an enemy per se...
- How would you categorize the criminal action of turning over raw intel to the Israeli government without first protecting data belonging to American citizens?
psychopomp
(4,668 posts)...then he's a traitor. I suggest that it is highly likely that he had to strike a deal with both governments to ensure shielding from the long arm of the US government. What else does he have to trade on besides US national security secrets?
He's likely made US citizens less safe by exchanging our security for his.
Indi Guy
(3,992 posts)...is collaborating with our government against their country of origin? You might say, "But we're the good guys." Look & see how much our laws now mirror those of Russia & China. Have you ever heard of the FISA court's secret interpretation of The Patriot Act (as if the obvious interpretation weren't already a gaping wound to our Constitution)?
24601
(3,962 posts)them an enemy of the US. There's no declaration of war or even an AUMF that designates them as out adversary. It's my opinion and I'm not a lawyer, but being assholes wouldn't quite cross the enemy threshold as a legal matter.
Indi Guy
(3,992 posts)...solely on the basis of our allowing China to hold about $3 trillion of our debt. __Not to mention the $280 billion annual trade deficit with her. This is very disturbing, given that we're talking about an unapologetically communist regime.
Where's the vitriol for those responsible for this outrage?
24601
(3,962 posts)Not liking a nation is falls short of "enemy".
Indi Guy
(3,992 posts)My comments were aimed indirectly at psychopomp in post #27.
24601
(3,962 posts)woo me with science
(32,139 posts)The traitors are those who have subverted the government of the United States of America into a corporate surveillance state.
....and those who sell their souls to participate in the despicable propaganda smearing of whistleblowers.
Indi Guy
(3,992 posts)...about our governance, there comes a time when the ideologue goggles gotta' come off -- and reality be faced.
There are unelected criminal elements positioned at the highest levels of power in our government. ...Higher even than the president in that they make autonomous decisions of tremendous import, while being accountable to absolutely no one.
I love my country with a burning passion; and it sickens me to no end to see it corrupted by these faceless and arrogant corporate weasels.
Ash_F
(5,861 posts)You show those medical records who's boss, NSA tough guys!
RC
(25,592 posts)Indi Guy
(3,992 posts)...driving this train. There's clearly a design here, and one need only look history to see the kind of agenda which involves wholesale surveillance of all citizenry. ...And I guarantee that all but a very select few would like the outcome if this plan is allowed to come to fruition.
caraher
(6,278 posts)I think there's a sense that it's quantum, sort of, but not in a way that makes it especially useful. Not being able to, by design, run Shor's algorithm, means they've already precluded the first quantum "killer app" from their platform.
As for NSA's effort, it's still not obvious exactly which physical implementation will be robust and scalable first. That assessment also seems to change every 5 years or so.
I think 10 years is optimistic, 20 years likely for the kind of capability they're discussing. That's just a WAG on my part from hearing academics in that field talking...
I'm sure my quantum computing theory chops are no match for yours, caraher, but after reading a "New Yorker" profile of David Deutsch, his book "The Fabric of Reality," and following up with some on-line reading on QC in general, I distinctly recall a reference or two to D-Wave's platform not being truly QC, but I really couldn't explain why without going back to the source.
I try to keep up on Deutsch, but also recall him expressing a personal disinterest in implementation. It would still be interesting to get his take on all this.
- bvf
bemildred
(90,061 posts)I am skeptical that quantum effects will successfully be brought into the macro world in any very useful way, the consequences get pretty dramatic. "Magical" even. And I just don't believe in magic any more. The trap-door functions will not be reversed by quantum magic.
I think the OP is a combination of advertising (for the D-wave) and FUD.
bananas
(27,509 posts)Nuclear reactors, nuclear bombs, photovoltaics, LED's, superconductors, etc, etc, etc.
Quantum encryption will allow encrypted communication that can't be decrypted by quantum computers.
Mon Jun 10, 2013, 03:20 PM
bananas (21,825 posts)
China Plans Quantum Science Satellite in 2016
Source: Nasa Watch
<snip>
[hr]
1. "Clearly, the team has been sitting on this result for some time."
http://www.technologyreview.com/view/515871/china-reveals-first-space-based-quantum-communications-experiment/
The Physics arXiv Blog
June 10, 2013
China Reveals First Space-Based Quantum Communications Experiment
The Chinese Quantum Science Satellite will launch in 2016 and aim to make China the first space-faring nation with quantum communication capability
<snip>
However, this experiment raises something of a puzzle. The Chinese team say they used a German satellite called CHAMP for their experiment. This was launched in 2000 and its mission was to make a precise gravity map of the Earth by bouncing lasers off it.
Whats curious about the Chinese announcement is that CHAMP deorbited in 2010. So a curious question is when the team did this work. Clearly, the team has been sitting on this result for some time.
Why publish it now? The answer may be a small but significant detail revealed in the final paragraph of the paper. Here Jian-Wei and co announce that they plan to launch the first quantum science experiment into space. The spacecraft is called the Chinese Quantum Science Satellite and it is scheduled for launch in 2016.
<snip>
Toshiba has invented a quantum cryptography network that even the NSA cant hack
By Bernhard Warner September 4, 2013
<snip>
A new research paper from scientists at Toshiba brings quantum cryptography a baby-step closer to the masses. The paper, published today in Nature, explains how to expand a point-to-point quantum network with only two users into a quantum access network with up to 64 users.
This kind of communication cannot be defeated by future advances in computing power, nor new mathematical algorithms, nor fancy new engineering, said co-author Andrew Shields, head of the Quantum Information Group of Toshiba Research Europe. As long as the laws of physics hold true, it will ensure that your communications are fully secured.
Some other quantum effects used in the macro world:
quantum wells are in wide use in diode lasers, including red lasers for DVDs and laser pointers, infra-red lasers in fiber optic transmitters, or in blue lasers. They are also used to make HEMTs (High Electron Mobility Transistors), which are used in low-noise electronics. Quantum well infrared photodetectors are also based on quantum wells, and are used for infrared imaging.
There's lots more examples of quantum effects used at the macro level.
bananas
(27,509 posts)Here's another one:
Commercial Quantum Cryptography Satellites Coming
Canadian team wants to take the cheap microsatellite route to uncrackable global communications
By Kim Krieger
Posted 6 May 2013 | 14:00 GMT
Missions scientist Ian DSouza of Canadian satellite equipment firm Com Dev, wants to cover the planet with a swarm of microsatellites that will jump-start the quantum communications revolution. He just has to build one and get a launch date first.
Satellites capable of performing quantum cryptography, a form of communication that is theoretically unhackable, dont even exist outside of the lab yet, but researchers at the Institute for Quantum Computing (IQC), in Waterloo, Ont., Canada, are engineering the technology as you read this, and they say they could have a working prototype this year. Com Dev, in Cambridge, Ont., would package the system as an inexpensive microsatellite and send it into orbit as a secondary payload on someone elses rocket. If it works, Com Dev could refine the design and soon have more ready to go up with the next available launch. If the microsatellite fails, the company wouldnt lose a boatload of money and years of time on an expensive piece of space junk.
<snip>
bananas
(27,509 posts)<snip>
Commercial[edit]
There are currently four companies offering commercial quantum key distribution systems; id Quantique (Geneva), MagiQ Technologies (New York), QuintessenceLabs (Australia) and SeQureNet (Paris). Several other companies also have active research programmes, including Toshiba, HP, IBM, Mitsubishi, NEC and NTT (See External links for direct research links).
In 2004, the world's first bank transfer using quantum key distribution was carried in Vienna, Austria.[13] Quantum encryption technology provided by the Swiss company Id Quantique was used in the Swiss canton (state) of Geneva to transmit ballot results to the capital in the national election occurring on 21 October 2007.[14] In 2013, Battelle Memorial Institute installed a QKD system built by ID Quantique between their main campus in Columbus, Ohio and their manufacturing facility in nearby Dublin.[15]
<snip>
bemildred
(90,061 posts)(Your link.)
I am not suggesting quantum mechanics is not real, I'm suggesting they won't be able to scale it up like they think, essentially on heuristic grounds, like with the anthropic principle.
And I'm talking about using it to circumvent the limitations of Turing machines, specifically to break mathematical encryption.
Experts believe one of the largest hurdles to breaking encryption with a quantum computer is building a computer with enough qubits, which is difficult given the very fragile state of quantum computers.
By the end of September, the NSA expected to be able to have some basic building blocks, which it described in a document as dynamical decoupling and complete quantum control on two semiconductor qubits.
Thats a great step, but its a pretty small step on the road to building a large-scale quantum computer, Lloyd said.
A quantum computer capable of breaking cryptography would need hundreds or thousands more qubits than that.
http://union-bulletin.com/news/2014/jan/04/nsa-researches-way-crack-most-computer-encryption/
That's what I'm talking about, they won't be able to scale it up.
MrScorpio
(73,631 posts)It's a Sci-Fi writer's dream come true.
These truly are interesting times.
Democat
(11,617 posts)Computers get faster over time. That is the way technology works. Eventually, most encryption that we think of as "unbreakable" now will be easily breakable. It's inevitable.
Development of the internet itself was partially driven by military and government research.
There are many things to not like about the NSA, but their development of better faster technology may not be a bad thing.
bemildred
(90,061 posts)That's what you need, to know what's going on around you. And we live a long time, so you have to remember things a long time too, and we talk and are nomadic, so we need to remember a lot.
We have cleverly extended that pattern-recognition capability for our use in language and symbolic thinking (lot's of pattern recognition going on when you listen to someone talk or when you read).
Computers are lousy (slow) at pattern recognition because of the von Neumann architecture, you need massive parallelism for fast general pattern recognition, not the simplest possible computing architecture.
And such systems have to be grown, they must be trained, they must learn the patterns they are to recognize, they start out empty and general, like an infant.
Once you have one trained up the way you like, you can make copies, but if it fails or does not meet new conditions, you may have to start over. You cannot necessarily retrain it to meet new conditions. Learning can be a trap-door function too.
Swede Atlanta
(3,596 posts)but we know that knowledge and the power that knowledge gives can be used for good or for bad.
I am not a scientist or computer theorist but my understanding is the power of quantum computing is akin to the power of the atom. Any corporation or government (in our case our insidious NSA) with that power can ratchet up their control.
Even up to about 10 years ago you could get by without a computer or having computer skills. Today that is not conceivable. When I recently went to see an ENT they didn't even have intake forms on paper. If you were a new patient you were directed to a bank of computers with a login code and you entered all of your information into their system. I recently moved and needed to request a replacement driver's license with my new address. I could do this online in about 10 minutes or could go to a DMV office that only processes address change requests in person on Tue and Thu mornings from 9-12. There is no "mail-in" application.
It is virtually impossible not to be ensnared in the technological nightmare we have created. I love technology and use it extensively but even if you wanted to you couldn't avoid it.
In that regard I applaud the "preppers" who do what they can to live "off the grid" and as disconnected from the rest of society as possible.
This computing power could, as the article suggests, help advance medicine, space exploration, etc. but it could also be used for very nefarious purposes.
Given that we are unable to manage the NSA today with their wide-reaching capabilities, they are unstoppable. I really don't think even Congressional action to dismantle and de-fund the NSA would have any effect. The secret government would continue to operate as it does today - thumbing its nose at Congress and the American people. They are a government unto themselves and they know it.
TheKentuckian
(25,026 posts)Chan790
(20,176 posts)All security paradigms will eventually fail. Not based on math but purely observation. It's as certain in cryptography as Moore's Law is in computing. The most secure paradigm of 1000 years ago, can be breached undetected today in seconds. (It was the sealed envelope.)
This project is itself useless unless NSA is itself working on an encryption for their own secure data that is quantum-proofed. Absent that condition, they'd be better off working to ensure that nobody else can build the technology rather than building it themselves.
Otherwise, you have the exact open-system where there is no encrypted data and everybody's laundry is on display that has been an ideal-goal of groups like Wikileaks & Anonymous and which ultimately threatens to destroy society in the satirical science-fiction novel Angelmaker by Nick Harkaway.
bananas
(27,509 posts)See post #17.
bemildred
(90,061 posts)Mathematical encryption is not unbreakable, exhaustive search will always do the job, it just won't do it soon enough. It's a performance issue. Same applies to encryption methods, they just have to be "unbreakable" until nobody cares.
Tx4obama
(36,974 posts)mitty14u2
(1,015 posts)Last edited Tue Jan 7, 2014, 12:43 AM - Edit history (1)
Ash_F
(5,861 posts)But boy is it sad that funding for it finally came from such evil places.