How do colored lamps ensure the security of the Internet?

How do colored lamps ensure the security of the Internet?

Welcome to the important news site.

The company “Cloudflare” in San Francisco is responsible for addressing 10% of all internet websites in the world and to maintain the security of these bases, it uses 100 colored lamps (Lava Lamp); But how?

To describe how the mentioned system works, we must first point out that the generation of random data is the main requirement of encryption and digital encryption systems are used to create security codes from such data (combination of numbers, letters and symbols) are used.

Generating random data is the main requirement of cryptography

But generating real random data is not so easy, because even with the best computers, this will require basic code, which ultimately results in seemingly random data, but hackers, if they get the code or guess Sequencing data can bypass existing locks.

For this reason, to generate real random numbers, researchers use phenomena outside of the computer environment, one of which is the use of “Lava” colored lamps (meaning molten material).

Inside the discussed lamps there are special materials (a combination of carbon tetrachloride and paraffin) in different colors, which are denser than water at room temperature, but when they receive heat, their density decreases compared to the water in the lamp housing and becomes They move. Changes in the temperature of the lamp cause these materials to move completely randomly and create different shapes.

Cloudflare experts have also used this feature and by placing 100 lava lamps in front of a camera, they have created a wall of random colors that is filmed live and the resulting images are available in the form of random codes. encryption system.

It should be said that the security of the discussed method is so high that even if we assume that the resolution of the camera is 100 x 100 pixels (which is certainly much higher than that), hackers will be faced with a 30,000-bit password that will be impossible to crack. It will not be easy.

We suggest you to visit the content of Windows, Office and Android

We hope you enjoyed this Training, what do you think about this post?

Previous Post
Learn about 7 common ways to hack passwords
Next Post
After forgetting the password of the router, how to access it?

Related posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed