Menu

Blog

Archive for the ‘encryption’ category: Page 11

Sep 5, 2023

Better cybersecurity with quantum random number generation based on a perovskite light emitting diode

Posted by in categories: cybercrime/malcode, encryption, finance, quantum physics

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at Linköping University, Sweden. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.

In an increasingly connected world, cybersecurity is becoming increasingly important to protect not just the individual, but also, for example, national infrastructure and banking systems. And there is an ongoing race between hackers and those trying to protect information. The most common way to protect information is through encryption. So when we send emails, pay bills and shop online, the information is digitally encrypted.

To encrypt information, a is used, which can either be a computer program or the hardware itself. The random number generator provides keys that are used to both encrypt and unlock the information at the receiving end.

Aug 27, 2023

New technique opens door for encoding data on single photons

Posted by in categories: encryption, nanotechnology, quantum physics

Researchers at Los Alamos National Laboratory have successfully developed a new way to produce a specific type of photon that could prove critical for quantum data exchange, notably encryption. The specific kind of photons, called “circularly polarized light,” have thus far proved challenging to create and control, but this new technique makes the process easier and, importantly, cheaper. This was achieved, the team explains, by stacking two different, atomically thin materials to “twist” (polarize) photons in a predictable fashion.

Encoded, “twisted,” photons

Continue reading “New technique opens door for encoding data on single photons” »

Aug 25, 2023

Quantum And The Ultimate Weapon Inside The SBOM

Posted by in categories: cybercrime/malcode, encryption, government, internet, law enforcement, quantum physics

• Encryption and segmentation: These operate on the assumption some fraction of the network is already compromised. Restricting the reach and utility of any captured data and accessible networks will mitigate the damage even on breached systems.

• SBOM documentation: Regulatory compliance can be driven by industry organizations and the government, but it will take time to establish standards. SBOM documentation is an essential foundation for best practices.

If “democracy dies in darkness,” and that includes lies of omission in reporting, then cybersecurity suffers the same fate with backdoors. The corollary is “don’t roll your own crypto” even if well-intentioned. The arguments for weakening encryption to make law enforcement easier falls demonstrably flat, with TETRA just the latest example. Secrets rarely stay that way forever, and sensitive data is more remotely accessible than at any time in history. Privacy and global security affect us all, and the existence of these single points of failure in our cybersecurity efforts are unsustainable and will have unforeseeable consequences. We need to innovate and evolve the internet away from this model to have durable security assurances.

Aug 12, 2023

TunnelCrack: Two serious vulnerabilities in VPNs discovered, had been dormant since 1996

Posted by in categories: cybercrime/malcode, encryption, internet

The term “virtual private network,” or VPN for short, has become almost synonymous with “online privacy and security.” VPNs function by creating an encrypted tunnel through which your data may transit as it moves over the internet. They are designed to protect your privacy and make it impossible for anyone to monitor or access your activity while you are online. But what happens if the same instrument that was supposed to keep your privacy safe turns out to be a conduit for attacks? Introduce yourself to “TunnelCrack,” a frightening discovery that has sent shockwaves across the world of cybersecurity. Nian Xue from New York University, Yashaswi Malla and Zihang Xia from New York University Abu Dhabi, Christina Popper from New York University, and Mathy Vanhoef from KU Leuven University were the ones that carried out the study.

Two serious vulnerabilities in virtual private networks (VPNs) have been discovered by a research team. These vulnerabilities had been dormant since 1996. It is possible to leak and read user traffic, steal information, or even conduct attacks on user devices by exploiting these vulnerabilities, which are present in practically every VPN product across all platforms. TunnelCrack is a combination of two common security flaws found in virtual private networks (VPNs). Even though a virtual private network (VPN) is designed to safeguard all of the data that a user sends, these attacks are able to circumvent this security. An enemy, for example, may take advantage of the security flaws to steal information from users, read their communications, attack their devices, or even just spill it all. Regardless of the security protocol that is utilized by the VPN, the uncovered flaws may be exploited and used maliciously.

Aug 10, 2023

Unexpected link between pure mathematics and genetics discovered

Posted by in categories: bioengineering, biotech/medical, encryption, evolution, genetics, mathematics

An interdisciplinary team of mathematicians, engineers, physicists, and medical scientists have uncovered an unexpected link between pure mathematics and genetics, that reveals key insights into the structure of neutral mutations and the evolution of organisms.

Number theory, the study of the properties of positive integers, is perhaps the purest form of mathematics. At first sight, it may seem far too abstract to apply to the natural world. In fact, the influential American number theorist Leonard Dickson wrote ‘Thank God that number theory is unsullied by any application.’

And yet, again and again, number theory finds unexpected applications in science and engineering, from leaf angles that (almost) universally follow the Fibonacci sequence, to modern encryption techniques based on factoring prime numbers. Now, researchers have demonstrated an unexpected link between number theory and evolutionary genetics.

Aug 7, 2023

Optical Computing Breakthrough: Seeing Through the “Unseeable”

Posted by in categories: encryption, information science, robotics/AI

Through a scattering medium such as ground glass? Traditionally, this would be considered impossible. When light passes through an opaque substance, the information carried within the light becomes “jumbled up”, almost as if undergoes complex encryption.

Recently, a remarkable scientific breakthrough by Professor Choi Wonshik’s team from the IBS Center for Molecular Spectroscopy and Dynamics (IBS CMSD) has unveiled a method to leverage this phenomenon in the fields of optical computing and machine learning.

Machine learning is a subset of artificial intelligence (AI) that deals with the development of algorithms and statistical models that enable computers to learn from data and make predictions or decisions without being explicitly programmed to do so. Machine learning is used to identify patterns in data, classify data into different categories, or make predictions about future events. It can be categorized into three main types of learning: supervised, unsupervised and reinforcement learning.

Aug 4, 2023

Scientists Uncover a Surprising Link Between Pure Mathematics and Genetics

Posted by in categories: bioengineering, biotech/medical, encryption, evolution, genetics, mathematics

An interdisciplinary team of mathematicians, engineers, physicists, and medical scientists has discovered a surprising connection between pure mathematics and genetics. This connection sheds light on the structure of neutral mutations and the evolution of organisms.

Number theory, the study of the properties of positive integers, is perhaps the purest form of mathematics. At first sight, it may seem far too abstract to apply to the natural world. In fact, the influential American number theorist Leonard Dickson wrote “Thank God that number theory is unsullied by any application.”

And yet, again and again, number theory finds unexpected applications in science and engineering, from leaf angles that (almost) universally follow the Fibonacci sequence, to modern encryption techniques based on factoring prime numbers. Now, researchers have demonstrated an unexpected link between number theory and evolutionary genetics.

Jul 30, 2023

Linux version of Abyss Locker ransomware targets VMware ESXi servers

Posted by in categories: cybercrime/malcode, encryption

The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in attacks on the enterprise.

As the enterprise shifts from individual servers to virtual machines for better resource management, performance, and disaster recovery, ransomware gangs create encryptors focused on targeting the platform.

With VMware ESXi being one of the most popular virtual machine platforms, almost every ransomware gang has begun to release Linux encryptors to encrypt all virtual servers on a device.

Jul 20, 2023

Russian scientists present to Putin the nation’s ‘most powerful’ quantum computer

Posted by in categories: computing, encryption, quantum physics

Various reports say the claim is far from true.

Russian scientists are claiming that they have created the most powerful quantum computer in the history of their nation. They even presented the computer to Russian President Vladimir Putin, who visited the exhibition of quantum technology achievements by Rosatom, the State Nuclear Energy Corporation.

But as per a report, the claim is far from true and the computer won’t be breaking modern encryption codes anytime soon.

Continue reading “Russian scientists present to Putin the nation’s ‘most powerful’ quantum computer” »

Jul 13, 2023

Quantum Breakthrough: First-Ever Entanglement of Microwave and Optical Photons

Posted by in categories: encryption, quantum physics, supercomputing

Quantum computing holds the potential to tackle complex issues in fields like material science and cryptography, problems that will remain out of reach even for the most powerful conventional supercomputers in the future. However, accomplishing this feat will likely necessitate millions of high-quality qubits, given the error correction needed.

Progress in superconducting processors advances quickly with a current qubit count in the few hundreds. The appeal of this technology lies in its swift computational speed and compatibility with microchip fabrication. However, the requirement for extremely low temperatures places a limit on the processor’s size and prevents any physical access once it is cooled down.

A modular quantum computer with multiple separately cooled processor nodes could solve this. However, single microwave photons—the particles of light that are the native information carriers between superconducting qubits within the processors—are not suitable to be sent through a room temperature environment between the processors. The world at room temperature is bustling with heat, which easily disturbs the microwave photons and their fragile quantum properties like entanglement.

Page 11 of 59First89101112131415Last