News broke overnight that scientists have developed a new system with high-speed encryption properties that drives quantum computers to create theoretically hack-proof forms of data encryption, said report. The novel system is capable of creating and distributing encryption codes at megabit-per-second rates, which is 5 to 10 times faster than existing methods and on par with current internet speeds when running several systems in parallel. Ofer Maor, Director of Enterprise Solutionsat Synopsys commented below.
Ofer Maor, Director of Enterprise Solutions at Synopsys:
“We often encounter these new “Hack Proof” promises. While the technology does indeed sound interesting, touting a “Hack Proof” title is dangerous and somewhat presumptuous. We have seen time and again claims for new “Hack Proof” technology, that was shortly after hacked. Only technologies that withstood a long series of hack attempts by leading encryption experts, hackers and governments, can have a reasonable claim at that, and even that is not always the case. Moreover, even if the theory is indeed hack proof, we have seen than In many cases, when this is implemented to become a usable commercial product, implementation flaws introduce new security weaknesses that can later be taken advantage of, ending in an embarrassing compromise to the “Unbreakable” theme.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.