As mystics search for the lost island of Atlantis and UFO buffs seek out alien spacecraft, cryptologists are continuing their own quest to create an unbreakable code.Michael Rabin, a Harvard University computer science professor, believes he has moved cryptology a step closer to its Holy Grail by developing a code that’s undecipherable, even by those who have access to both the cypher text and unlimited computing power.Rabin’s Hyper-Encryption technology, which uses a device that quickly generates a deluge of random bits, relies on both time and money to thwart even the most dedicated code breaker. A coded message would be hidden within the bits “like raisins in a pudding,” quips Rabin. While anyone can read the random bits, the transmission rate is so high that storing all of the stream for analysis would be either technically unfeasible or cost prohibitive. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Hyper-Encryption has sparked the interest of several U.S. government agencies, says Rabin. He also claims to have received inquiries from some wealthy investors and at least one major venture capital fund. But Rabin states he’s not currently interested in the technology’s commercial potential. “Right now, commerce comes second to science,” he says. Hyper-Encryption, however, is not entirely trouble free. The chief concern is cost, since the technology requires users to send continuous, intense streams of high-speed data across already bandwidth-starved networks. Rabin’s solution is to create a dedicated global satellite system. “The cost could be shared by its users,” he says. In any case, Hyper-Encryption is designed to safeguard highest-level government secrets, not routine commercial and personal transmissions. “It’s most appropriate for protecting national interests and large sums of money,” says Rabin.Although Hyper-Encryption exists only on the blackboard, Rabin maintains that the technology is ready for use. “There’s mathematical proof the Hyper-Encryption provides everlasting security, so there’s nothing left to do but implement it,” he says. Related content feature 10 digital transformation questions every CIO must answer Impactful DX requires a business-centric approach supported by the right skills, culture, and strategy. Here’s how to assess whether your digital journey is on the path to success. By Mary K. Pratt Sep 25, 2023 12 mins Digital Transformation Digital Transformation Digital Transformation feature Rockwell Automation makes shift to ‘as-a-service’ model Facing increasing competition from cloud hypervisors that see manufacturing as prime for disruption, the industrial automation giant has undertaken a major transformation to add subscription software services to its core business. By Paula Rooney Sep 25, 2023 6 mins Manufacturing Industry Digital Transformation IT Strategy brandpost Fireside Chat between Tata Communications and Tata Realty: 5 ways how Technology bridges the CX perception gap By Tata Communications Sep 24, 2023 9 mins Emerging Technology feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 Quantum Computing Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe