找回密碼
 註冊
樓主: 馬後砲

文件指美國研發量子電腦冀攻破全球 加密技術

    [複製鏈接]
發表於 2014-1-4 19:48:57 | 顯示全部樓層
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-4 20:47:04 | 顯示全部樓層
用強國人 D 技術, 好快破到佢
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-4 22:00:57 | 顯示全部樓層
張家輝 發表於 2014-1-4 13:31
道德高一尺~ 美魔高一丈~

使乜用什麼量子電腦
呢招 $$$$ 至係最實際有效

NSA Paid Security Company to Adopt Weakened Encryption Standards (—By Kevin Drum, Dec. 21, 2013)
A few months ago, we learned via the Snowden leaks that the NSA had been busily at work trying to undermine public cryptography standards. One in particular was a random number generator used for creating encryption keys in RSA's BSafe software. But Reuters reports there's more to the story:

Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.

....Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA's corporate evolution away from pure cryptography products as one of the reasons it occurred.

But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance. "They did not show their true hand," one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.

Well, look. There are a very limited number of reasons that the NSA would be so eager for you to use their encryption software that they'd be willing to pay you $10 million to do it. Surely someone at RSA must have had some inkling of what was going on.

Probably more than an inkling, if I had to guess. But this certainly goes to show just how serious and relentless the NSA has been about crippling the public use of cryptography. The president's surveillance commission recommended on Friday that this stop, and since trustworthy encryption is critical to trust in the internet as a whole, it would sure be nice if President Obama put a stop to this.

回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-4 23:22:11 | 顯示全部樓層
對我地嚟講都冇乜用掛
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-5 03:36:52 | 顯示全部樓層
oldboy33 發表於 2014-1-4 22:00
使乜用什麼量子電腦
呢招 $$$$ 至係最實際有效

$10 million 始終都係最原始最唔過時最有效果.....
回覆 讚好 不讚 使用道具

舉報

 樓主| 發表於 2014-1-5 08:38:55 | 顯示全部樓層
assusys 發表於 2014-1-4 23:22
對我地嚟講都冇乜用掛

除非你唔用internetbanking,
如果唔系都有影響囉
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-6 08:34:56 | 顯示全部樓層
回復 馬後砲 #1 的帖子

反而要留意,
咁堅嘅所謂科技,
都係俾八千萬美元.

咁大家唔好再話老闆俾人工少喇!
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-6 11:37:37 | 顯示全部樓層
已我所知民用及全世界最高是用256bit 加密, 但美國政府及軍用機構是用512bit 加密,
其實現時所謂加密都只不過是加入大堆等亂數, 如果加入更多如1024bit 或 2048bit 等或更高加密,
便不是這麼容易解密了,唯一缺點是要在硬件作出大的修改。
又或者棄用現在的加密方式, 研製新加密方式。




回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-6 17:34:16 | 顯示全部樓層
沒私隱的年代
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-6 23:55:36 | 顯示全部樓層
天日係點都未知啦!仲講以後...........
回覆 讚好 不讚 使用道具

舉報

 樓主| 發表於 2014-1-7 12:21:15 | 顯示全部樓層
jayzhou_2046 發表於 2014-1-6 08:34
回復 馬後砲 #1 的帖子

反而要留意,

咪就系!  我初初都以為睇錯
回覆 讚好 不讚 使用道具

舉報

發表於 2014-1-7 14:48:42 | 顯示全部樓層
強國人 D 技術,好快破到佢
回覆 讚好 不讚 使用道具

舉報

發表於 2021-1-16 05:20:52 | 顯示全部樓層
研發成點
回覆 讚好 不讚 使用道具

舉報

您需要登錄後才可以回帖 登錄 | 註冊

本版積分規則

Archiver|聯絡我們|141華人社區

GMT+8, 2024-11-25 10:05

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回覆 返回頂部 返回列表