scholarly journals Security of Encryption Procedures and Practical Implications of Building a Quantum Computer

2020 ◽  
Vol 19 (3) ◽  
pp. 5-22
Author(s):  
Ferenc Koczka

In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.

2015 ◽  
Vol 13 (3-4) ◽  
pp. 34-45
Author(s):  
Mariya Hristova

Abstract The software and hardware of Safety Critical Systems - SCS, which control special critical technology process or operation, are subject of enhanced requirements for reliability and inadmissibility of any incorrect controlling influences (safety) after failures. This paper suggests and investigates a hybrid computerbased fail-safe/fault-tolerance FST-structure with single reservation, which has the qualities to meet these requirements. The base system 2 ∨ 2, based on which it is built, is studied in the previous edition of Information Technjlogies and Control. For derivation of probabilistic models through which to establish the efficiency of the strutucral redundancy in a fault-tolerant structure, in this paper are used the published results. Formulas are derived for the probability of failure-free operation (availability coefficient), for safe failure and for unidentified (dangerous) failure. Models are found for calculation of the enhancement of reliability and the variation of safety relative to the base system 2 ∨ 2. Subject of analysis are type software and hardware modifications of the proposed general scheme used in the practice of different companies, which manufacture and operate SCSs. It is proven that at the expense of acceptable hardware redundancy and insignificant increase of dangerous failures the probability of interruption of the operation of the FST- system and its down-time due to failure may decrease by tenths of thousands of times.


2019 ◽  
Vol 35 (10) ◽  
pp. 29-30

Purpose This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings Hotels in the Asia-Pacific region have yet to fully utilize social media to promote their CSR initiatives. This means there is huge potential for improved stakeholder engagement, leading to short- and long-term performance gains. Originality The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


Author(s):  
Renata Wong ◽  
Amandeep Singh Bhatia

In the last two decades, the interest in quantum computation has increased significantly among research communities. Quantum computing is the field that investigates the computational power and other properties of computers on the basis of the underlying quantum-mechanical principles. The main purpose is to find quantum algorithms that are significantly faster than any existing classical algorithms solving the same problem. While the quantum computers currently freely available to wider public count no more than two dozens of qubits, and most recently developed quantum devices offer some 50-60 qubits, quantum computer hardware is expected to grow in terms of qubit counts, fault tolerance, and resistance to decoherence. The main objective of this chapter is to present an introduction to the core quantum computing algorithms developed thus far for the field of cryptography.


Author(s):  
Nurul I. Sarkar ◽  
Khaleel I. Petrus

Boolean algebra, minimization of Boolean expressions, and logic gates are often included as subjects in electronics, computer science, information technology, and engineering courses as computer hardware and digital systems are a fundamental component of IT systems today. We believe that students learn minimization of Boolean expressions better if they are given interactive practical learning activities that illustrate theoretical concepts. This chapter describes the development and use of a software tool (named LOGIC-Minimiser) as an aid to enhance teaching and learning minimization of Boolean expressions.


Author(s):  
Vyacheslav S. Kharchenko ◽  
Oleg A. Illiashenko ◽  
Andriy A. Kovalenko ◽  
Vladimir V. Sklyar ◽  
Artem V. Boyarchuk

The application of complex electronic components such as systems-on-chips (including systems-on-programmable-chips using field programmable gate arrays (FPGAs)) in industrial instrumentation and control systems (I&Cs) causes risks for ensuring of safety. Nuclear power plant (NPP) I&C projects on FPGA are complex solutions which include both software and hardware components. Information security (system’s ability to protect the information and data from unauthorized access and modification) is a subordinate property with respect to safety of many I&Cs, primarily to the NPP reactor trip systems. Such hierarchy may be taken into account by implementation of security informed safety (SIS) approach. Recent events like Stuxnet or Duqu showed vulnerabilities in industrial embedded IT-Systems. In order to remove or reduce security risks, which could increase overall safety risk, the holistic analytical technique are necessary. The goal of the paper is to present the technique for of SIS-based assessment of the NPP I&C systems. The proposed SIS-oriented method of NPP I&C systems assessment includes the models and techniques. To decrease the risk of manual errors, the tool for the SIS-oriented assessment automation is described. The tool is based on joint use of abovementioned models and techniques, is proposed. The tool allows conducting the joint use of the following analysis techniques: GAP and IMECA.


Heritage ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 2237-2252
Author(s):  
Karol Król

The computer industry was a vivid place in the 1980s. IT systems and technologies thrived, and the market offered ever better, smaller, and more useful machines. Innovative technical solutions or intelligent designs that satisfied customers’ needs are often listed as computer hardware milestones. Consequently, they became a permanent part of the computerisation history and can be considered hardware heritage artefacts. The purpose of the paper is to analyse the usability of selected portable computer systems. The foundation of the work is a literature review that includes technical specifications, industry reviews, and research papers. Archival materials were obtained from the Internet Archive. Studies have revealed that the main problems design engineers of portable computers had to tackle in the 1980s were the reduction of mass and size of the computer system, portable power (self-power), and the quality of the displayed image.


2009 ◽  
pp. 1334-1344
Author(s):  
Nurul I. Sarkar ◽  
Khaleel I. Petrus

Boolean algebra, minimization of Boolean expressions, and logic gates are often included as subjects in electronics, computer science, information technology, and engineering courses as computer hardware and digital systems are a fundamental component of IT systems today. We believe that students learn minimization of Boolean expressions better if they are given interactive practical learning activities that illustrate theoretical concepts. This chapter describes the development and use of a software tool (named LOGIC-Minimiser) as an aid to enhance teaching and learning minimization of Boolean expressions.


2009 ◽  
Vol T137 ◽  
pp. 014009 ◽  
Author(s):  
A Walther ◽  
B Julsgaard ◽  
L Rippe ◽  
Yan Ying ◽  
S Kröll ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document