Hacker Public Radio

HPR3715: Secret hat conversations, Part 2.


Listen Later

Quantum computing
Quantum
computing is a type of computation whose operations can harness the
phenomena of quantum mechanics, such as superposition, interference, and
entanglement. Devices that perform quantum computations are known as
quantum computers. Though current quantum computers are too small to
outperform usual (classical) computers for practical applications,
larger realizations are believed to be capable of solving certain
computational problems, such as integer factorization (which underlies
RSA encryption), substantially faster than classical computers.
Today’s quantum
systems only include tens or hundreds of entangled qubits, limiting
them from solving real-world problems. To achieve quantum practicality,
commercial quantum systems need to scale to over a million qubits and
overcome daunting challenges like qubit fragility and software
programmability.
Quantum
computers, if they mature enough, will be able to crack much of
today's encryption. That'll lay bare private communications, company
data and military secrets. Today's quantum computers are too rudimentary
to do so. But data surreptitiously gathered now could still be sensitive
when more powerful quantum computers come online in a few years.
Simple
passwords can be cracked using brute force; this is where an
attacker uses tools that try every possible password until the correct
one is found. This generally done using a dictionary attack, where an
attacker will try known passwords and words until they find the one that
unlocks an account. There are databases available on the internet that
contain personal names as well as dictionary and slang words, in scores
of languages, along with passwords found in data breaches, and
more.
Encryption.
The Advanced
Encryption Standard (AES) specifies a FIPS-approved cryptographic
algorithm that can be used to protect electronic data. The AES algorithm
is a symmetric block cipher that can encrypt (encipher) and decrypt
(decipher) information. Encryption converts data to an unintelligible
form called ciphertext; decrypting the ciphertext converts the data back
into its original form, called plaintext. The AES algorithm is capable
of using cryptographic keys of 128, 192, and 256 bits to encrypt and
decrypt data in blocks of 128 bits.
The National Security Agency (NSA) reviewed all the AES
finalists, including Rijndael, and stated that all of them were secure
enough for U.S. Government non-classified data. In June 2003, the U.S.
Government announced that AES could be used to protect classified
information: For cryptographers, a cryptographic "break" is anything
faster than a brute-force attack – i.e., performing one trial decryption
for each possible key in sequence. A break can thus include results that
are infeasible with current technology. Despite being impractical,
theoretical breaks can sometimes provide insight into vulnerability
patterns. The largest successful publicly known brute-force attack
against a widely implemented block-cipher encryption algorithm was
against a 64-bit RC5 key by distributed.net in 2006.
Password Management.
Bitwarden
KeepassXC
...more
View all episodesView all episodes
Download on the App Store

Hacker Public RadioBy Hacker Public Radio

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

34 ratings


More shows like Hacker Public Radio

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

653 Listeners

Curious Cases by BBC Radio 4

Curious Cases

826 Listeners

The Strong Towns Podcast by Strong Towns

The Strong Towns Podcast

422 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

164 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,046 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

TechCrunch Daily Crunch by TechCrunch

TechCrunch Daily Crunch

42 Listeners

Strict Scrutiny by Crooked Media

Strict Scrutiny

5,809 Listeners

2.5 Admins by The Late Night Linux Family

2.5 Admins

98 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

140 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners