Berkeley CSUA MOTD:Entry 26557
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2002/11/15-16 [Computer/Theory] UID:26557 Activity:low
11/15   New developments in quantum crypto:
        http://news.com.com/2102-1001-965957.html
        \_ new?  hardly.  would you like a list of references from the
           last several years of experimental advances in quantum crypto?
           moron reporters report all science as a "breakthrough" to
           get the attention of their moron editors.
        \_ Even if it was new New NEW! it wouldn't matter one whit to you as
           the man on the street.  This is only good for big governments and
           corps with *lots* of money.  It does not work over the public net.
           \_ ah. but i am not the man on the street, and it does matter
              to me.  I work in this field, which is why i get annoyed by
              shitty journalism.  if you want to follow what's happening
              in the field in real time, see the links from the quantum
              coherence section of http://www.vjnano.org or just check
              Science and Nature regularly.
              \_ The rest of us are unlikely to ever see this in real life.
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2012/1/24-3/3 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Languages/Misc] UID:54296 Activity:nil
1/24    http://james-iry.blogspot.com/2009/05/brief-incomplete-and-mostly-wrong.html
        Amusing "history" of computer science.
        \_ Where's the mentioning of Al Gore the inventor of AlGorithm?
	...
2011/6/29-7/21 [Computer/SW/Database, Computer/SW] UID:54133 Activity:nil
6/29    "An Israeli algorithm sheds light on the Bible"
        http://www.csua.org/u/tq4 (news.yahoo.com)
        "Software developed by an Israeli team is giving intriguing new hints
        about what researchers believe to be the multiple hands that wrote the
        Bible."
        \_ "Hype developed by an American OnLine News Feed is giving
	...
2011/4/26-7/13 [Computer/Theory, Health/Women] UID:54095 Activity:nil
4/26    Is it correct to say that Godel's work on the incompleteness thm
        proved the Principia Mathematica wrong?
        \_ It didn't exactly prove it wrong; it proved that the true goal of
           PM (a complete and consistent set of mathematical truths)
           is unattainable.  -tom
           \_ Ah cool, no this is good. See ok yeah so the main goal of PM
	...
2010/8/9-19 [Computer/SW/Security] UID:53917 Activity:nil
8/9     I got two files, one is size 522190848 and the other is size
        521648128.  Both sha256 to the same number.  (and sha1 too).
        I don't think this is supposed to happen, right? (least not with
        sha256).
        \_ how are you checking?
           \_ I burned one file to cd, so i mounted /cdrom and
	...
2010/1/20-29 [Computer/SW/Languages/Misc, Computer/SW/Security] UID:53649 Activity:nil
1/20    Did Chinese come up with new way of quicksort?
        http://www.nytimes.com/2010/01/20/technology/20cyber.html
        Joe Stewart, a malware specialist with SecureWorks, a computer
        security company based in Atlanta, said he determined the main
        program used in the attack contained a module based on an unusu
        al algorithm from a Chinese technical paper that has been
	...
2009/10/24-11/3 [Computer/HW/Laptop] UID:53466 Activity:kinda low
10/24   How well do you see color? I got 8, how about you?
        http://www.xrite.com/custom_page.aspx?PageID=77
        \_ 7
           \_ what monitor did you use?
              \_ LCD on thinkpad x32, under not so great lighting conditions.
        \_ I scored 101, which seems impossible. Then again, I didn't
	...
2009/9/21-29 [Computer/Companies/Google] UID:53386 Activity:nil
9/21    http://www.techcrunch.com/2009/09/21/google-is-searching-for-beautiful-minds-but-so-far-no-m-i-t-students-have-broken-its-code
        If you can figure this out, you may have a future with Google.
        8MLDQ6 T UI
        6TFML RH AA
        NRA6Q 8EFL
        DMQ86II2 O3
	...
Cache (3374 bytes)
news.com.com/2102-1001-965957.html
BBN Technologies, which is working with Northwestern to develop commercial quantum cryptography prototype systems for optical-fiber networks running over the Internet. Several start-ups have also cropped up, including Swiss company 10 Id Quantique and New York-based 11 Magiq Technologies, each promising to deliver commercial quantum cryptography technology sometime in 2003. How it works The Northwestern technique uses a form of "secret key" cryptography. In this scenario, the two people communicating with each other--say Alice and Bob--use the same secret key. Alice sends Bob the key with which he can decipher the message. This differs from the "public key" encryption system in which typically, both Alice and Bob will have a private key that they keep secret, and a public key that they publish. An encrypted message sent by Alice to Bob using the public key can be decrypted by the private key, and vice versa. Applying the Northwestern method to encode her message, Alice would use the key to manipulate light, creating a pattern more complex than the traditional way of transmitting data in terms of zeros and ones. Different combinations and strings of zeros and ones are used to represent information. The Northwestern technique takes advantage of the granularity of light, known as quantum noise, which is revealed only through the secret key's pattern. One method the team used to change the light's granularity was randomly polarizing the light. To Eve, the eavesdropper, who does not have the key, the data is indecipherable because the lifted message emits too much fuzz. Bob, however, who has the secret key, can get the pattern and can receive the signal with much less disturbance. Today, mathematical encryption that relies on schemes such as the RSA algorithm are considered secure because cracking the keys used to encrypt data is likely to take many years. The RSA algorithm is the most widely used Internet communications encryption program. The larger the prime numbers used to make keys, the longer it would take to crack the encryption. It relies on the assumption that when prime numbers--those divisible only by themselves and the number one--are very long, they are extremely difficult to generate and determine. Distributed computing involves spreading computing tasks across hundreds of thousands of computers--on the Internet or in private networks--that would otherwise be sitting idle. This technique has been used to overcome several mathematical challenges. One group last year found the 13 largest prime number, while another group deciphered a 14 message encoded with RSA Security's RC5-64 encryption algorithm. In years ahead, as computers become more powerful--perhaps through the advent of 15 quantum computing, which can carry out multiple calculations simultaneously--these systems might crack the stashed-away code. Kumar said that his team at Northwestern is working with two partners, Telcordia Technologies and BBN Technologies, to try to put the technology to commercial use. The university has filed a number of patents based on the research. This would amplify the stream of photons, letting them travel a greater distance undisturbed. If successful, quantum cryptography would be able to move beyond the constraints of a dedicated fiber-optic line between two points and extend out to wider networks like the Internet.
Cache (1676 bytes)
www.vjnano.org -> www.vjnano.org/error/cookies.jsp?url=http%3a//www.vjnano.org/nano/
Home 10 MyScitation 11 Browse Publications 12 Search Publications 13 Purchase Articles 14 SPIN Web Welcome! This service requires a web browser that supports and accepts cookies. You have been redirected to this page for one of the following reasons: 1. You are using a browser that supports cookies, but cookies are disabled. You are using a personal firewall or similar application that rejects cookies even though your browswer is configured to accept them. In this system, cookies are used in the access control software (login, logoff) to enforce the time-out mechanism (no activity for 15 minutes and a session is automatically terminated). Cookies are a general mechanism which server-side connections (such as CGI scripts) can use to both store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications. Cookies can be viewed as a mechanism by which each browser keeps their own preferences. Web browsers set aside a small amount of space on your hard drive to keep these preferences; If you do, it sends the cookie to the server along with the request for a web page. The server, in turn, may transmit more cookie information back to the client. A browser will not give up its cookie data to any server except the one that set it. The data stored in a cookie is typically something like a record of pages traversed or specific keys created by client-server interaction that indicate a user has a subscription to a particular online resource (URL). Welcome to Scitation If you encounter any problems, please send us 21 feedback.