aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-13 19:27:38 +0000
committerroot <root@turin.home>2022-02-13 19:27:38 +0000
commitd7512378823fae3f6adde450042a12932ffc2e44 (patch)
tree41ba6a927e1b483f1f0495c64b35aea926789d26
parent50e0c2cff46f0b9440b2a318cef764897c91ed84 (diff)
Discussing quantum computing.
-rw-r--r--Makefile32
-rwxr-xr-xmake26
-rw-r--r--paper.ms41
-rw-r--r--refer70
4 files changed, 127 insertions, 42 deletions
diff --git a/Makefile b/Makefile
index ca86885..ba4a4c8 100644
--- a/Makefile
+++ b/Makefile
@@ -1,35 +1,9 @@
-default: pdf
-build:
- @ls -1 | grep target || mkdir target
- @wc paper.ms
- @cat paper.ms|\
- sed "s/^{/.[\n/g" |\
- sed "s/}{/\n.]\n.[\n/g" |\
- sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\
- refer -C -Ss -p refer |\
- tr "^" " "> target/temp
- #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\
- #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g"
-pdf: build
- @cat formatting.ms target/temp |\
- groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf
-html2: build
- cat header.html > target/paper.html
- cat formatting.ms target/temp| sed "s/.nr LL*/.nr LL 6i/g" |\
- groff -Tascii -c -ms |\
- sed "1,2d" | ansi2html -piml >> target/paper.html
- echo "</pre>" >> target/paper.html
-html: build
- @groff -E -Thtml -ms target/temp |\
- sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\
- sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\
- sed "1,6d" > target/temp2
- @cat header.html target/temp2 |\
- sed -E '34 i <a href="./paper.pdf">See this as a pdf</a><br>'> target/paper.html
+default:
+ ./make
read:
zathura target/paper.pdf&
clean:
rm -rf target
- install: pdf html
+install: default
cp target/paper.html /var/www/git-bin/epq
cp target/paper.pdf /var/www/git-bin/epq
diff --git a/make b/make
new file mode 100755
index 0000000..0718ec9
--- /dev/null
+++ b/make
@@ -0,0 +1,26 @@
+#!/bin/sh
+ls -1 | grep target || mkdir target
+wc paper.ms
+cat paper.ms|\
+ sed "s/}\./}\REMOVEME./g" |\
+ sed "s/}\,/}\REMOVEME,/g" |\
+ sed "s/^{/.[\n/g" |\
+ sed "s/}{/\n.]\n.[\n/g" |\
+ sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\
+ refer -C -Ss -p refer |\
+ grep -v "^\.lf" |\
+ sed "s/\ \ (/ (/g"|\
+ sed "s/)(?!.*\.)/) /g" |\
+ perl -0pe 's/\nREMOVEME//g' |\
+ tr "^" " "> target/temp
+#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\
+#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g"
+# awk '{printf "%s%s", $0, (/)$/ ? "" : ORS)}' |\
+cat formatting.ms target/temp |\
+ groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf
+groff -E -Thtml -ms target/temp |\
+ sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\
+ sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\
+ sed "1,6d" > target/temp2
+cat header.html target/temp2 |\
+ sed -E '34 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html
diff --git a/paper.ms b/paper.ms
index 38a797f..1436e38 100644
--- a/paper.ms
+++ b/paper.ms
@@ -3,9 +3,9 @@ short-label D.y
sort spec
.R2
.TL
-Title
+Cryptography, crime, terror, and surveillance
.AU
-Mohit Agarwal
+\f[TI]Mohit Agarwal
.AI
February 2022
.LP
@@ -46,7 +46,9 @@ crime or terror?
Is combatting encryption an effective way to combat crime/terror?
.LP
-An argument is often made against digital privacy in the interest of
+An argument is often made against allowing widespread use of
+encryption and generally against widespread effective operations
+security (OPSEC)in the public sector in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
@@ -127,8 +129,7 @@ followed the increase in popularity of cars in areas such as the UK
and US, regulation will no doubt follow the newfound popularity of
heavy encryption. There are however, difference in the case of
encryption when compared to cars. The rate of change with modern
-technology is far greater. There are already discussions about quantum
-computers and their potential to overcome current encryption methods.
+technology is far greater.
In the case of encryption regulation will continuously struggle to
control encryption methods due in part to how quickly they change, but
perhaps moreso due to their decentralised nature, where a government
@@ -171,6 +172,27 @@ chip manufacturing bill} and Chinese governments (cite) are
respectively showing (the US and China are the two largest chip
manufacturers (cite, reword)).
+In addition, the rate of development in unconventional computing
+methods is increasing rapidly. Effective quantum computing will
+mean that existing popular cryptographic algorithms such as RSA will
+no longer be secure due to the potential for computations that would
+take unreasonable amounts of time on classical computers to be solved
+quickly (reword) such as prime factorisation on which RSA encryption
+relies {lily chen quantum}. RSA encryption is currently in use for
+applications such as private communications and digital signatures.
+Significant research such as at IBM in recent years (cite) has shown
+feasibility in current ideas surrounding quantum computing and
+promising results in development towards quantum supremacy and in the
+future the breakdown of current cryptographic methods.
+
+Indeed, there
+have already been claims (although disputed) to quantum supremacy from
+
+Once more, the significant research is occuring as afformentioned in
+the US and in China {quantum research in china}. Both in the US at
+Google {google supremacy nature} and in China {china quantum
+advantage}{science photons quantum advantage}.
+
Is discussion on this useful?
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
@@ -265,4 +287,13 @@ Privacy
https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/
https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes
+Quantum computing
+ https://sci-hub.se/10.1007/978-3-540-88702-7_1
+ https://aapt.scitation.org/doi/abs/10.1119/1.1891170
+ https://ieeexplore.ieee.org/abstract/document/8490169
+ https://digitalcommons.dartmouth.edu/senior_theses/23/
+ https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519
+ https://arxiv.org/abs/1804.00200
+
+
{firewall}
diff --git a/refer b/refer
index 547413f..56bfd47 100644
--- a/refer
+++ b/refer
@@ -35,14 +35,7 @@
%A Elizabeth C. Economy
%D 2018
%J The Guardian
-%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown
-
-%T Intel's Management Engine is a security hazard, and users need a way to disable it
-%A Erica Portnoy
-%A Peter Eckersley
-%D May 2017
-%J Electronic Frontier Foundation
-%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)
+%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown .
%T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
@@ -110,6 +103,15 @@
%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/
(Accessed 6th February 2022)
+-- Intel management engine
+
+%T Intel's Management Engine is a security hazard, and users need a way to disable it
+%A Erica Portnoy
+%A Peter Eckersley
+%D May 2017
+%J Electronic Frontier Foundation
+%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)
+
%T Intel ME controller chip has secret kill switch
%J The Register
%A Thomas Claburn
@@ -123,6 +125,8 @@
%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
(Accessed 6th February 2022)
+-- Spectre, meltdown
+
%T Researchers Discover Two Major Flaws in the World’s Computers
%J The New York Times
%D Jan 2018
@@ -130,3 +134,53 @@
%A Nicole Perlroth
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
(Accessed 7th February 2022)
+
+-- quantum
+
+%T Report on Post-Quantum Cryptography
+%A Lily Chen
+%A Stephen Jordan
+%A Yi-Kai Liu
+%A Dustin Moody
+%A Rene Peralta
+%A Ray Perlner
+%A Daniel Smith-Tone
+%J National Institute of Standards and Technology
+%D April 2016
+%O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf .
+
+%T Quantum information research in China
+%A Qiang Zhang
+%A Feihu Xu
+%A Li Li
+%A Nai-Le Liu
+%A Jian-Wei Pan
+%D Nov 2019
+%J Quantum Science and Technology
+%V 4 040503
+%O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ .
+
+%T Physicists in China challenge Google’s ‘quantum advantage’
+%A Philip Ball
+%D Dec 2020
+%J Nature
+%O https://www.nature.com/articles/d41586-020-03434-7
+(Accessed 13th January 2022)
+
+%T Hello quantum world! Google publishes landmark quantum supremacy claim
+%A Elizabeth Gibney
+%D Oct 2019
+%J Nature
+%O https://www.nature.com/articles/d41586-019-03213-z
+(Accessed 13th January 2022)
+
+%T Quantum computational advantage using photons
+%A Han-Sen Zhong^et^al
+%D 2020
+%G DOI: 10.1126/science.abe8770
+
+%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
+%J NPR
+%D Oct 2019
+%A Paolo Zialcita
+%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .