Wake up.In the near future ,ur bank may be able to protect ur credit card only
with this new technology now being devised in this dot island!
TRADITIONAL CODE STILL BREAKABLE
http://www.i2r.a-star.edu.sg/icsd/ICSD_lab_infomation.html
ASTAR,spore
[quote] Cryptographic Based Media Security. Unlike analog or physical content, digital content can be copied, modified, synthesized and disseminated easily without any degradation in quality and trace. This research effort will apply our know how in cryptosystems to media security. That is, we will research on the state-of-the-art techniques to prevent illegal copying, misappropriation, and misrepresentation of digital media. We are a member of the JPEG 2000 Security Working Group and are working with other members on access control, authentication, and integrity protection techniques for JPEG 2000 still images and motion images.[quote]
Are we in the map of Cryptography?
2.
ZAOBAO 01.08.2002 reported Information Security Lab of ASTAR had cracked seven cryptosystems in 2001,and 14 since 1996.
[quote] *
http://www.i2r.a-star.edu.sg/icsd/ICSD_achievement.html#ACV03
Cryptography is the science of secure communications and data integrity protection while the analysis of cryptographic systems, or cryptanalysis, is the dual science of attacking or even breaking into such systems. Since 1996, researchers in our department have successfully attacked 19 cryptographic systems and security protocols. Highlights of our work include "Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults" (In LNCS 1361, 1997), "Cryptanalysis on Rijmen-Preneel Trapdoor Ciphers" (in LNCS 1514, 199

, "Cryptanalysis of Polynomial Authentication and Signature Scheme" (in LNCS 1841, 2000), and "Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems" (in LCNS 1992, 2001).
3.It take a P4 computer to take 30,000 years to solve a cryptosystem.It needs to calculate 2 to the power 60 times!
4.Crypted walkie talkie has been on sale for some times.So.I think
SAF is using crypted field radio.Otherwise,why? If so,we can throw away code
book and code map. see below for amendment.
5.If ur maths,physics.... is V gd,contact them.The nation needs u!
6.How important is u?Churchill himself dubbed the code-breakers "the geese who laid the golden eggs",See
http://news.bbc.co.uk/1/low/entertainment/film/1554788.stmAmendment:The walkie talkie I mentioned is in fact a hand phone:
DigiSAFE SG--1,Secure GSM Voice Encryptor,Advace Infomation
a brochure obtained in Sept 1999.See
http://www.digisafe.com/ for new products.
A ST co,off course.
UNBREAKABLE CODE IN THE DOOR STEPWe may be the
THIRD COUNTRY in the world to develop a protocol-----how the photons should be deployed and it is UNBREAKABLE!!!.Read more.
"Quantum cryphography generate secure communication by taking advantage
of quirks of photons sent bewteen users.Any attempt to intercept it wll disturb the quantum stability or the keys they have.Because the quantum state is an intergral part of key generation,the distubrance (attempred interception) can be detected by users.---STimes 26.02.2004
YES! YES! YES! Just a Pulse away,men!
4.We may be the
THIRD COUNTRY in the world to develop a protocol-----how the photons should be deployed. Once deployed,even the designer
can not break it!Since ,1984 only three major protocols for such encryption have emerged,2 in US and in in UK.------STimes 26.02.2004.
5.NUS ,NTU,Temasek Lab and ASTAR 's in joint venture to develop.The stake here to Spore is very high.How is NTU involved?Any lab?
6.Let the experts to tell u.Former Oxford deen is here to lead.Take a look of the CV.

In the quantum realm: (from left) Prof Arthur Ekert, Prof Oh, Asst Prof Lamas-Linares, Assoc Prof Christian Kurtsiefer and PhD students of the NUS research team.Pro. Ekert was the head of Quantum Center in Oxford U.
We have the best to lead us.
Read how and why this code is
unbreakable[b]
http://newshub.nus.edu.sg/ke/0310/articles/pg12.htm
[b]Techlogy to decide life or death7.I am not to scare u.A quantum computer is under development which can break any traditional code,no matter how complex it is, in traditional computer.Read Quantum Computer in this forum.
8.My own explanation is this:Traditionl code is still devised by human brain.U still can work it out,though may take very long time.Quantum code is devised by nature,not human brain.Our learned reader pl tell us more.
QUANTUM COMPUTERS can break in any traditional computer
http://www.sgforums.com/?action=thread_display&thread_id=133906http://en.wikipedia.org/wiki/Quantum_computer QUESTION
Will the quantum computer produce a quantum code which is
unbreakable even by a quantum computer?
Any one can tell us more?