Menu

Blog

Archive for the ‘encryption’ category: Page 10

Oct 20, 2023

IGF 2023 WS #356 Encryption’s Critical Role in Safeguarding Human Rights

Posted by in categories: biotech/medical, encryption, governance, information science, internet, policy

Two types of technologies could change the privacy afforded in encrypted messages, and changes to this space could impact all of us.

On October 9, I moderated a panel on encryption, privacy policy, and human rights at the United Nations’s annual Internet Governance Forum. I shared the stage with some fabulous panelists including Roger Dingledine, the director of the Tor Project; Sharon Polsky, the president of the Privacy and Access Council of Canada; and Rand Hammoud, a campaigner at Access Now, a human rights advocacy organization. All strongly believe in and champion the protection of encryption.

I want to tell you about one thing that came up in our conversation: efforts to, in some way, monitor encrypted messages.

Policy proposals have been popping up around the world (like in Australia, India, and, most recently, the UK) that call for tech companies to build in ways to gain information about encrypted messages, including through back-door access. There have also been efforts to increase moderation and safety on encrypted messaging apps, like Signal and Telegram, to try to prevent the spread of abusive content, like child sexual abuse material, criminal networking, and drug trafficking.

Continue reading “IGF 2023 WS #356 Encryption’s Critical Role in Safeguarding Human Rights” »

Oct 16, 2023

The fight over the future of encryption, explained

Posted by in categories: biotech/medical, encryption, policy

I want to tell you about one thing that came up in our conversation: efforts to, in some way, monitor encrypted messages.

Policy proposals have been popping up around the world (like in Australia, India, and, most recently, the UK) that call for tech companies to build in ways to gain information about encrypted messages, including through back-door access. There have also been efforts to increase moderation and safety on encrypted messaging apps, like Signal and Telegram, to try to prevent the spread of abusive content, like child sexual abuse material, criminal networking, and drug trafficking.

Not surprisingly, advocates for encryption are generally opposed to these sorts of proposals as they weaken the level of user privacy that’s currently guaranteed by end-to-end encryption.

Oct 13, 2023

Research unveils stretchable high-resolution user-interactive synesthesia displays for visual–acoustic encryption

Posted by in categories: cyborgs, encryption, space

The future of human-machine interfaces is on the cusp of a revolution with the unveiling of a groundbreaking technology—a stretchable high-resolution multicolor synesthesia display that generates synchronized sound and light as input/output sources. A research team, led by Professor Moon Kee Choi in the Department of Materials Science and Engineering at UNIST, has succeeded in developing this cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.

The team’s research is published in the journal Advanced Functional Materials.

Traditionally, multifunctional displays have been confined to visualizing mechanical and electrical signals in light. However, this pioneering stretchable synesthesia shatters preconceived boundaries by offering unparalleled optical performance and precise pressure levels. Its inherent stretchability ensures seamless operation under both static and dynamic deformation, preserving the integrity of the sound relative to the input waveform.

Oct 6, 2023

Scientists develop a semi-device independent, randomness-free test for quantum correlation

Posted by in categories: computing, encryption, quantum physics

In a new Physical Review Letters study, scientists have successfully presented a proof of concept to demonstrate a randomness-free test for quantum correlations and non-projective measurements, offering a groundbreaking alternative to traditional quantum tests that rely on random inputs.

“Quantum correlation” is a fundamental phenomenon in and one that is central to quantum applications like communication, cryptography, computing, and information processing.

Bell’s inequality, or Bell’s theory, named after physicist John Stewart Bell, is the standard test used to determine the nature of correlation. However, one of the challenges with using Bell’s theorem is the requirement of seed for selecting measurement settings.

Oct 4, 2023

Entangled Light from Multitasking Atoms Could Spark Quantum Breakthroughs

Posted by in categories: encryption, quantum physics

This surreal scenario is what would actually happen if the traffic light was a single atom illuminated by a laser beam, as recently shown experimentally by researchers in Berlin. They looked at the light scattered by an atom and saw that photons—the tiniest particles of light—arrived at the detector one at a time. The scientists blocked the brightest color they saw, and suddenly pairs of photons of two slightly different colors started arriving at their detector simultaneously. They reported their findings in Nature Photonics in July.

The reason for this counterintuitive effect is that single atoms are skilled little multitaskers. Through different underlying processes, they can scatter a variety of colors at the same time like a dangerous traffic light that shines all three colors at once. Yet because of quantum interference between these processes, an observer only sees one of the metaphorical traffic light’s colors at a time, preserving peace on the road.

This experiment also paves the way for novel quantum information applications. When the brightest color is blocked, the photons that pop up simultaneously are entangled with each other, behaving in sync even when they are separated over large distances. This provides a new tool for quantum communication and information processing in which entangled photon pairs can serve as distributed keys in quantum cryptography or store information in a quantum memory device.

Oct 3, 2023

Quantum Computers Could Crack Encryption Sooner Than Expected With New Algorithm

Posted by in categories: encryption, information science, mathematics, quantum physics, robotics/AI

One of the most well-established and disruptive uses for a future quantum computer is the ability to crack encryption. A new algorithm could significantly lower the barrier to achieving this.

Despite all the hype around quantum computing, there are still significant question marks around what quantum computers will actually be useful for. There are hopes they could accelerate everything from optimization processes to machine learning, but how much easier and faster they’ll be remains unclear in many cases.

One thing is pretty certain though: A sufficiently powerful quantum computer could render our leading cryptographic schemes worthless. While the mathematical puzzles underpinning them are virtually unsolvable by classical computers, they would be entirely tractable for a large enough quantum computer. That’s a problem because these schemes secure most of our information online.

Sep 14, 2023

Google has a new tool to outsmart authoritarian internet censorship

Posted by in categories: encryption, government, internet

Its Outline VPN can now be built directly into apps—making it harder for governments to block internet access, particularly during protests.

Google is launching new anti-censorship technology created in response to actions by Iran’s government during the 2022 protests there, hoping that it will increase access for internet users living under authoritarian regimes all over the world.

Jigsaw, a unit of Google that operates sort of like an internet freedom think tank and that creates related products, already offers a suite of anti-censorship tools including Outline, which provides free, open, and encrypted access to the internet through a VPN. Outline uses a protocol that makes it hard to… More.

Sep 9, 2023

Machine learning contributes to better quantum error correction

Posted by in categories: encryption, quantum physics, robotics/AI

Researchers from the RIKEN Center for Quantum Computing have used machine learning to perform error correction for quantum computers—a crucial step for making these devices practical—using an autonomous correction system that despite being approximate, can efficiently determine how best to make the necessary corrections.

The research is published in the journal Physical Review Letters.

In contrast to , which operate on bits that can only take the basic values 0 and 1, quantum computers operate on “qubits”, which can assume any superposition of the computational basis states. In combination with , another quantum characteristic that connects different qubits beyond classical means, this enables quantum computers to perform entirely new operations, giving rise to potential advantages in some computational tasks, such as large-scale searches, , and cryptography.

Sep 6, 2023

PeLEDs offer to make encryption cheaper and more sustainable

Posted by in categories: computing, encryption, quantum physics, sustainability

Perovskite light-emitting diode is used as the light source for a quantum random number generator used in encryption.

Encryption plays an important role in protecting information in this digital era, and a random number generator plays a vital part in this by providing keys that are used to both encrypt and unlock the information at the receiving end.

Now, a team of researchers has made use of light-emitting diodes made from the crystal-like material perovskite to devise a new type of Quantum Random Number Generator (QRNG) that can be used for encryption but also for betting and computer simulations.

Sep 5, 2023

What Is Polymorphic Malware?

Posted by in categories: cybercrime/malcode, encryption

O.o!!!


Polymorphic malware leverages an encryption key to alter its shape, signature, and behavioral pattern. Using a mutation engine and a self-propagated code strain, it encrypts its code and changes how physical files are created. Many traditional cybersecurity solutions that rely on signature-based detection—a technique in which security systems identify a malware based on its known characteristics—fail to recognize or detect polymorphic threats.

A polymorphic attack typically involves the following stages.

Continue reading “What Is Polymorphic Malware?” »

Page 10 of 59First7891011121314Last