Today we have a great opportunity to connect fancy magnifying glass to your laptop or iPad. The device I’m talking about called digital microscope. Fancy stones or even fancy phones are looking really good with up to x300:
Yesterday my some helped me to manage to connect my mob phone (Pixel, but it might be any modern mob phone) to a microscope. Just one of those students microscopes teachers recommends those days for school. And the result was above my expectations indeed!
Check pics of a fern root, seaweed, onion and dragon fly wing out:
Found this simulation some time ago, it’s called Bolshoi (from Russian большой, that means Big, Great).
Had a nice conversation after the talk I gave at SASI last week:
Thanks to our president and members at SASI without whom this wouldn’t happen.
Looking forward of my first article since 2009 to appear in IEEE volume early next year! It has been accepted along with the talk that has been delivered as part of MIPT EnT Conference http://www.en-t.info/ieee-articles-en.shtml . Thank you very much to Oksana Trushina for helping to make this happen!
We were focusing on Code-Based Cryptosystems and how they evolve since 197x. https://dasiopia.com/projects/code-based-cryptosystems-evolution/
Did you know that one of them (McEliece system) is a candidate to become a post-quantum cryptography standard?
And as always expressing my deepest gratitudes to E. Gabidulin and N. Pilipchuck.
Last year MIPT EnT papers can be found here: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7807456
12 April, 2009.
Cosmonautics Day is an anniversary celebrated in Russia and former USSR countries.
That day I’ve landed in Australia. 8 years ago. And look… I survived!
We’ve visited The Canberra Deep Space Communication Complex (CDSCC) last Sunday and being there we even didn’t fully realised how lucky we were.
The fact is that the complex were receiving the signal from Voyager that day!
If you want to know what is happening with all radio telescopes in real life you would probably like to visit: http://eyes.nasa.gov/dsn/dsn.htm
We are waiting for first [working] q.computer for ages. I do remember lots of articles and news and of course speculation around q.computing and especially q.cryptography in early 2K. Post-quantum cryptography, how would you look like?
“New q. generation would kill all existing cryptosystem based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem !” – said journalists. And everyone were filled up with awe.
Well new q.generation of machines means only that we might need to consider another options for widely used algorithms including public key systems like RSA.
Do we have something except well known RSA? Yes we do… indeed, not joking, we have lots of different algorithms and even approaches. It just easy to use well known library rather then right and spend nights testing something new, which might become vulnerable in one day.
Linear codes cryptosystems family. Those systems are based on … right, linear codes! but those codes are made to correct errors you would say, not encode/decode messages. Well in the first instance, yes. But all technological discoveries are cross-disciplinary, based on classical concepts and grow between scientific branches.
Let’s have a look at McEliece or similar (in fact opposite) Niederreiter cryptosystems which was invented in 1986. That’s actually a very cool idea to use error detection mechanism to encrypt/decrypt messages. Just imagine they use a syndrome as ciphertext and the message treat as an error pattern.
The original Niederreiter system was cracked in 1992 by Sidel’nikov&Shestakov. Since that time lots of crypto-strong (yeah, until someone else would find a way to crack them) modifications have been proposed and designed. If you know Russian please have a look at existing linear codes based algorithms review . Yeah, I should find time and energy to translate it into English some day…
One of those modifications is Frobenius matrix based modification my supervisor E.Gabidulin with assistance of myself in 2009.
DROWN is a cross-protocol attack that uses weaknesses in the SSLv2 implementation against transport layer security (TLS), and that can “decrypt passively collected TLS sessions from up-to-date clients.”
Here more info:
they are showing how to fix it, but….
for Python it’s not really too bad because of the buffer size which is quite bigger than Java’s one…
but the fix much, much slower 😦