60
submitted 9 months ago* (last edited 9 months ago) by ButtBidet@hexbear.net to c/chapotraphouse@hexbear.net

:"Captain Picard. There's a subspace message for you from Starfleet command. It's on [dramatic pause] a secure channel."

:"A secure channel?!? What could be so important?"

:"Good question, number one. Let's just hope it doesn't delay our rendezvous at Rigal 7. Lieutenant Worf, I'll take it in my ready room."

: Generates a 256 bit public key, exchanges public keys over subspace, calculates a session key, checks validity of web certificate "Handshake protocol complete. Connection is secure."



Me: "Computer, log into Proton Mail."

Computer voice acted by Majel Barrett: "Proton Mail connection establish. Please enter user name and password."

Me: enters user name and password

Computer voice: "Warning, this connection is not secure. Hackers may be able to intercept your private information."

Me: "Computer, establish a secure connection."

Computer voice: "Unable to comply. A secure connection requires level 4 or above access."

you are viewing a single comment's thread
view the rest of the comments
[-] WayeeCool@hexbear.net 23 points 9 months ago

I guess because computational power is near unlimited and they are well past quantum computing... maybe the security scheme involves more than mathematical encryption, maybe the transmission medium? Could also be expensive because they have to use one-time pad encryption for every secure transmission. It's the only encryption scheme that cannot be cracked regardless of advances in computing but requires every transmission use a unique one-time cypher that is expended upon use.

https://en.wikipedia.org/wiki/One-time_pad

In some science fiction secure encryption ends up returning to one-time pad encryption because computational capabilities have become so advanced. An entire economic niche is created where interstellar ships travel in-between star systems delivering shipments of one-time pad keyrings that are used for secure transmissions. Any transmissions using public-private key schemes or any scheme with reusable cyphers is considered crackable by state actors and large corporations who care enough to task the necessary computational resources. As a result secure transmissions of a sensitive nature become extremely expensive.

[-] Mardoniush@hexbear.net 3 points 9 months ago

Ftl travel of light implies that they can use relativistic efffects to make P approach NP

load more comments (6 replies)
this post was submitted on 13 Jan 2024
60 points (100.0% liked)

chapotraphouse

13489 readers
1033 users here now

Banned? DM Wmill to appeal.

No anti-nautilism posts. See: Eco-fascism Primer

Vaush posts go in the_dunk_tank

Dunk posts in general go in the_dunk_tank, not here

Don't post low-hanging fruit here after it gets removed from the_dunk_tank

founded 3 years ago
MODERATORS