Autor: |
John Ronczka |
Rok vydání: |
2016 |
Předmět: |
|
Zdroj: |
2016 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE). |
DOI: |
10.1109/apwc-on-cse.2016.028 |
Popis: |
A fresh look at the way secure communications is currently being done has been undertaken as a consequence of the large hacking's that have taken place recently. A plausible option maybe a return to the future via Morse code using how a quantum bit (Qubit) reacts when entangled to suggest a cypher. This quantum cyphers uses multiple properties of unique entities that have many random radicals which makes hacking more difficult that traditional 'Rivest-Shamir-Adleman' (RSA), 'Digital Signature Algorithm' (DSA) or 'Elliptic Curve Digital Signature Algorithm' (ECDSA). Additional security is likely by Backchannelling (slipstreaming) Quantum Morse code (Q–Morse) keys composed of living and non-living entities. This means Blockchain ledger history (forwards—backwards) is audited during an active session. Verification keys are Backchannelling (slipstreaming) during the session (e.g. train driver must incrementally activate a switch otherwise the train stops) using predicted—expected sender—receiver properties as well as their past history of disconformities to random radicals encountered. In summary, Quantum Morse code (Q–Morse) plausibly is the enabler to additional security by Backchannelling (slipstreaming) during a communications session. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|