{"id":16,"date":"2014-01-05T17:54:51","date_gmt":"2014-01-05T17:54:51","guid":{"rendered":"http:\/\/www.opensource.im\/?p=16"},"modified":"2014-01-05T17:54:51","modified_gmt":"2014-01-05T17:54:51","slug":"report-nsa-building-comp-to-crack-encryption-types","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/report-nsa-building-comp-to-crack-encryption-types.php","title":{"rendered":"Report: NSA building comp to crack encryption types"},"content":{"rendered":"<p><p>Published January 03, 2014    <\/p>\n<p>      FoxNews.com    <\/p>\n<p>        An undated aerial handout photo shows the National Security        Agency (NSA) headquarters building in Fort Meade,        Maryland.Reuters      <\/p>\n<p>    The National Security Agency is reportedly racing to build a    computer that will be able to break almost every kind of    encryption used to protect medical, banking, business and    government records around the world.  <\/p>\n<p>    According to documents provided by NSA whistle blower Edward    Snowden, a $79.7 million research program titled Penetrating    Hard Targets includes a project to build a cryptologically    useful quantum computer  a machine considerably faster than    classic computers, The Washington Post reported Thursday  <\/p>\n<p>    The implications of the NSA building a quantum computer are far    reaching. Such a machine would open the door to    crackingthe strongest encryption tools in use today,    including a standard known as RSA that scrambles communications    and make them impossible to read for anyone except the intended    recipient. RSA is commonly used in Web browsers for encrypted    emails and secure financial transactions.  <\/p>\n<p>    The development of such a machine has long been a goal of many    in the scientific community, and would have revolutionary    implications for fields like medicine as well as for the NSAs    code-breaking mission.  <\/p>\n<p>    The NSA reportedly sees itself as in a race with European Union    and Swiss sponsored quantum computing labs.  <\/p>\n<p>    The geographic scope has narrowed from a global effort to a    discrete focus on the European Union and Switzerland, one NSA    document says, according to the Washington Post.  <\/p>\n<p>    The Snowden documents also indicate that the NSA has been    carrying out a part of its research in large shielded rooms    designed to prevent electromagnetic energy from leaking. The    rooms are required in order to keep quantum computing    experiments running.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.foxnews.com\/politics\/2014\/01\/03\/nsa-racing-to-build-quantum-computer-that-could-crack-most-encryption-types\/\" title=\"Report: NSA building comp to crack encryption types\">Report: NSA building comp to crack encryption types<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Published January 03, 2014 FoxNews.com An undated aerial handout photo shows the National Security Agency (NSA) headquarters building in Fort Meade, Maryland.Reuters The National Security Agency is reportedly racing to build a computer that will be able to break almost every kind of encryption used to protect medical, banking, business and government records around the world. According to documents provided by NSA whistle blower Edward Snowden, a $79.7 million research program titled Penetrating Hard Targets includes a project to build a cryptologically useful quantum computer a machine considerably faster than classic computers, The Washington Post reported Thursday The implications of the NSA building a quantum computer are far reaching. Such a machine would open the door to crackingthe strongest encryption tools in use today, including a standard known as RSA that scrambles communications and make them impossible to read for anyone except the intended recipient<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-16","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=16"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=16"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}