Bremermann's limit, named after
Hans-Joachim Bremermann, is a limit on the maximum rate of
computation
Computation is any type of arithmetic or non-arithmetic calculation that follows a well-defined model (e.g., an algorithm).
Mechanical or electronic devices (or, historically, people) that perform computations are known as '' computers''. An esp ...
that can be achieved in a self-contained system in the material universe. It is derived from
Einstein
Albert Einstein ( ; ; 14 March 1879 – 18 April 1955) was a German-born theoretical physicist, widely acknowledged to be one of the greatest and most influential physicists of all time. Einstein is best known for developing the theory ...
's
mass-energy equivalency and the
Heisenberg uncertainty principle
In quantum mechanics, the uncertainty principle (also known as Heisenberg's uncertainty principle) is any of a variety of mathematical inequalities asserting a fundamental limit to the accuracy with which the values for certain pairs of physi ...
, and is ''
c''
2/''
h'' ≈ 1.36 × 10
50 bits per second per kilogram.
This value is important when designing
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
algorithms, as it can be used to determine the minimum size of
encryption key
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
s or hash values required to create an algorithm that could never be cracked by a
brute-force search
In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique and algorithmic paradigm that consists of systematically enumerating all possible candidates for the soluti ...
.
For example, a computer with the mass of the entire
Earth
Earth is the third planet from the Sun and the only astronomical object known to harbor life. While large volumes of water can be found throughout the Solar System, only Earth sustains liquid surface water. About 71% of Earth's surf ...
operating at Bremermann's limit could perform approximately 10
75 mathematical computations per second. If one assumes that a cryptographic key can be tested with only one operation, then a typical 128-bit key could be cracked in under 10
−36 seconds. However, a 256-bit key (which is already in use in some systems) would take about two minutes to crack. Using a 512-bit key would increase the cracking time to approaching 10
72 years, without increasing the time for encryption by more than a constant factor (depending on the encryption algorithms used).
The limit has been further analysed in later literature as the maximum rate at which a system with energy spread
can evolve into an orthogonal and hence distinguishable state to another,
In particular,
Margolus and Levitin have shown that a quantum system with average energy ''E'' takes at least time
to evolve into an orthogonal state.
However, it has been shown that access to
quantum memory
In quantum computing, quantum memory is the quantum-mechanical version of ordinary computer memory. Whereas ordinary memory stores information as binary states (represented by "1"s and "0"s), quantum memory stores a quantum state for later ...
in principle allows computational algorithms that require arbitrarily small amount of energy/time per one elementary computation step.
See also
*
Margolus–Levitin theorem
*
Landauer's principle
Landauer's principle is a physical principle pertaining to the lower theoretical limit of energy consumption of computation. It holds that "any logically irreversible manipulation of information, such as the erasure of a bit or the merging of tw ...
*
Bekenstein bound
In physics, the Bekenstein bound (named after Jacob Bekenstein) is an upper limit on the thermodynamic entropy ''S'', or Shannon entropy ''H'', that can be contained within a given finite region of space which has a finite amount of energy—or co ...
*
Kolmogorov complexity
In algorithmic information theory (a subfield of computer science and mathematics), the Kolmogorov complexity of an object, such as a piece of text, is the length of a shortest computer program (in a predetermined programming language) that prod ...
*
Transcomputational problem
*
Limits of computation
The limits of computation are governed by a number of different factors. In particular, there are several physical and practical limits to the amount of computation or data storage that can be performed with a given amount of mass, volume, or energ ...
*
Ultrafinitism
In the philosophy of mathematics, ultrafinitism (also known as ultraintuitionism,International Workshop on Logic and Computational Complexity, ''Logic and Computational Complexity'', Springer, 1995, p. 31. strict formalism,St. Iwan (2000),On the U ...
References
{{reflist
External links
*
Gorelik, G. (2003)
Bremermann's Limit and cGh-physics* Lokshin, A (2017)
Arbitrary choice, ‘understanding’ and Gorelik-Bremermann limit. ''Far East Journal of Mathematical Sciences'', V. 102, Issue 1, P. 215–222
Cybernetics
Theory of computation
Limits of computation