Cryptobit.pdf (62.41 kB)
Developing a New Cryptic Communication Protocol by Quantum Tunnelling over Classic Computer Logic
Version 2 2018-10-06, 13:04
Version 1 2018-10-06, 13:03
journal contribution
posted on 2018-10-06, 13:04 authored by Mesut KavakMesut KavakI have been working for a time about basic laws of directing the universe [1,2]. It seems that the most
basic and impressive principle which causes any physical phenomenon is the Uncertainty Principle
of Heisenberg [3], that existence have any property because of the uncertainty. During this process,
while I was thinking about conservation of information I noticed, that information cannot be lost;
but at a point, it becomes completely unrecognizable according to us as there is no alternative. Any
information and the information searched for become the same after a point relatively to us. The
sensitivity increases forever but its loss. Each sensitivity level also has higher level; so actually an
absolute protection seems possible.
basic and impressive principle which causes any physical phenomenon is the Uncertainty Principle
of Heisenberg [3], that existence have any property because of the uncertainty. During this process,
while I was thinking about conservation of information I noticed, that information cannot be lost;
but at a point, it becomes completely unrecognizable according to us as there is no alternative. Any
information and the information searched for become the same after a point relatively to us. The
sensitivity increases forever but its loss. Each sensitivity level also has higher level; so actually an
absolute protection seems possible.
History
Usage metrics
Categories
- Digital processor architectures
- Other information and computing sciences not elsewhere classified
- Electrical engineering not elsewhere classified
- Software engineering not elsewhere classified
- System and network security
- Networking and communications
- Electronics, sensors and digital hardware not elsewhere classified
- Theory of computation not elsewhere classified
- Applied computing not elsewhere classified
Keywords
cryptobitsecuritycryptologyprotocolcommunicationComputer EngineeringElectrical and Electronic Engineering not elsewhere classifiedComputer SoftwareComputer System SecurityComputer Communications NetworksComputer Software not elsewhere classifiedComputer Hardware not elsewhere classifiedTheoretical Computer ScienceComputer System ArchitectureApplied Computer Science
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC