diff options
Diffstat (limited to 'paper.ms')
| -rw-r--r-- | paper.ms | 41 |
1 files changed, 36 insertions, 5 deletions
@@ -3,9 +3,9 @@ short-label D.y sort spec .R2 .TL -Title +Cryptography, crime, terror, and surveillance .AU -Mohit Agarwal +\f[TI]Mohit Agarwal .AI February 2022 .LP @@ -46,7 +46,9 @@ crime or terror? Is combatting encryption an effective way to combat crime/terror? .LP -An argument is often made against digital privacy in the interest of +An argument is often made against allowing widespread use of +encryption and generally against widespread effective operations +security (OPSEC)in the public sector in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of information useful in a criminal investigation or in preventing @@ -127,8 +129,7 @@ followed the increase in popularity of cars in areas such as the UK and US, regulation will no doubt follow the newfound popularity of heavy encryption. There are however, difference in the case of encryption when compared to cars. The rate of change with modern -technology is far greater. There are already discussions about quantum -computers and their potential to overcome current encryption methods. +technology is far greater. In the case of encryption regulation will continuously struggle to control encryption methods due in part to how quickly they change, but perhaps moreso due to their decentralised nature, where a government @@ -171,6 +172,27 @@ chip manufacturing bill} and Chinese governments (cite) are respectively showing (the US and China are the two largest chip manufacturers (cite, reword)). +In addition, the rate of development in unconventional computing +methods is increasing rapidly. Effective quantum computing will +mean that existing popular cryptographic algorithms such as RSA will +no longer be secure due to the potential for computations that would +take unreasonable amounts of time on classical computers to be solved +quickly (reword) such as prime factorisation on which RSA encryption +relies {lily chen quantum}. RSA encryption is currently in use for +applications such as private communications and digital signatures. +Significant research such as at IBM in recent years (cite) has shown +feasibility in current ideas surrounding quantum computing and +promising results in development towards quantum supremacy and in the +future the breakdown of current cryptographic methods. + +Indeed, there +have already been claims (although disputed) to quantum supremacy from + +Once more, the significant research is occuring as afformentioned in +the US and in China {quantum research in china}. Both in the US at +Google {google supremacy nature} and in China {china quantum +advantage}{science photons quantum advantage}. + Is discussion on this useful? Individuals around the world have clearly expressed interest in matters of privacy and encryption (cite) and open source software @@ -265,4 +287,13 @@ Privacy https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/ https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes +Quantum computing + https://sci-hub.se/10.1007/978-3-540-88702-7_1 + https://aapt.scitation.org/doi/abs/10.1119/1.1891170 + https://ieeexplore.ieee.org/abstract/document/8490169 + https://digitalcommons.dartmouth.edu/senior_theses/23/ + https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519 + https://arxiv.org/abs/1804.00200 + + {firewall} |
