{"id":30039,"date":"2015-03-27T05:40:59","date_gmt":"2015-03-27T09:40:59","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/quantum-compute-this-wsu-mathematicians-build-code-to-take-on-toughest-of-cyber-attacks.php"},"modified":"2015-03-27T05:40:59","modified_gmt":"2015-03-27T09:40:59","slug":"quantum-compute-this-wsu-mathematicians-build-code-to-take-on-toughest-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/quantum-compute-this-wsu-mathematicians-build-code-to-take-on-toughest-of-cyber-attacks.php","title":{"rendered":"Quantum compute this &#8212; WSU mathematicians build code to take on toughest of cyber attacks"},"content":{"rendered":"<p><p>    IMAGE:This image shows Hamlin and Webb    at Washington State University. view    more  <\/p>\n<p>    Credit: Rebecca Phillips  <\/p>\n<p>    PULLMAN, Wash. -- Washington State University mathematicians    have designed an encryption code capable of fending off the    phenomenal hacking power of a quantum computer.  <\/p>\n<p>    Using high-level number theory and cryptography, the    researchers reworked an infamous old cipher called the knapsack    code to create an online security system better prepared for    future demands.  <\/p>\n<p>    The findings were recently published in the journal The    Fibonacci Quarterly.  <\/p>\n<p>    Quantum computers are near  <\/p>\n<p>    Quantum computers operate on the subatomic level and    theoretically provide processing power that is millions, if not    billions of times faster than silicon-based computers. Several    companies are in the race to develop quantum computers    including Google.  <\/p>\n<p>    Internet security is no match for a quantum computer, said    Nathan Hamlin, instructor and director of the WSU Math Learning    Center. That could spell future trouble for online transactions    ranging from buying a book on Amazon to simply sending an    email.  <\/p>\n<p>    Hamlin said quantum computers would have no trouble breaking    present security codes, which rely on public key encryption to    protect the exchanges.  <\/p>\n<p>    In a nutshell, public key code uses one public \"key\" for    encryption and a second private \"key\" for decoding. The system    is based on the factoring of impossibly large numbers and, so    far, has done a good job keeping computers safe from hackers.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.eurekalert.org\/pub_releases\/2015-03\/wsu-qct032515.php\/RK=0\/RS=Q2RFbZNTHmreqxoveYqzyrErLOk-\" title=\"Quantum compute this -- WSU mathematicians build code to take on toughest of cyber attacks\">Quantum compute this -- WSU mathematicians build code to take on toughest of cyber attacks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IMAGE:This image shows Hamlin and Webb at Washington State University. view more Credit: Rebecca Phillips PULLMAN, Wash. -- Washington State University mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30039","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30039"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30039"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30039\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}