Menu

Blog

Archive for the ‘encryption’ category: Page 27

Nov 10, 2020

Computer Scientists Achieve ‘Crown Jewel’ of Cryptography

Posted by in categories: computing, encryption

A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work.

Nov 9, 2020

Quantum cryptography using qutrits

Posted by in categories: encryption, quantum physics

Circa 2006


Quantum cryptography (QC) is still in a very early stage and there are very few commercial products available. But this doesn’t prevent researchers to look at new solutions. For example, physicists from the University of Wien, Austria, are testing qutrits instead of the more common qubits. These qutrits can simultaneously exist in three basic states — instead of two for the qubits. This means that QC systems based on qutrits will inherently be more secure. But if QC using qubits has been demonstrated over distances exceeding 100 kilometers, the experiments with qutrits are today confined within labs. For more information, read this abstract of a highly technical paper or continue below.

Nov 8, 2020

Older Android phones won’t support many secure websites

Posted by in categories: encryption, mobile phones

Let’s Encrypt has warned that older Android phones won’t support many secure websites after they lose key certificates by September 2021.

Oct 31, 2020

Quantum-computing pioneer warns of complacency over Internet security

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Quantum computers are now a reality, although they are still too rudimentary to factor numbers of more than two digits. But it is only a matter of time until quantum computers threaten Internet encryption.

Nature caught up with Shor to ask him about the impact of his work — and where Internet security is heading.


Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Oct 28, 2020

In a first, researchers extract secret key used to encrypt Intel CPU code

Posted by in categories: computing, encryption

Hackers can now reverse engineer updates or write their own custom firmware.

Oct 22, 2020

The 5 Faces Of Chinese Espionage: The World’s First ‘Digital Authoritarian State’

Posted by in category: encryption

Chinese spies are different from those of most other wealthy and developed countries where the majority of spies are highly trained, with some serving under diplomatic cover and others operating under what the US Intelligence Community calls Non Official Cover (NOC).

Chinese intelligence operations are the first in modern times to use, as a foundation, the whole of society. Because of this, China’s espionage tactics are sometimes artless, operating with little in the way of standard spy-fare, (encrypted communication, dead drops, etc.) instead relying on an overwhelming volume of espionage operations conducted by all manner of citizen and a sort of impunity inherent in the lack of substantive penalty for when a Chinese agent is discovered, a study I recently published analyzing 595 cases of intelligence collection efforts sanctioned and abetted by the Chinese Communist Party.

Oct 17, 2020

‘Classified knots’: Researchers create optical framed knots to encode information

Posted by in categories: encryption, quantum physics, security

In a world first, researchers from the University of Ottawa in collaboration with Israeli scientists have been able to create optical framed knots in the laboratory that could potentially be applied in modern technologies. Their work opens the door to new methods of distributing secret cryptographic keys—used to encrypt and decrypt data, ensure secure communication and protect private information. The group recently published their findings in Nature Communications.

“This is fundamentally important, in particular from a topology-focused perspective, since framed knots provide a platform for topological quantum computations,” explained senior author, Professor Ebrahim Karimi, Canada Research Chair in Structured Light at the University of Ottawa.

“In addition, we used these non-trivial optical structures as information carriers and developed a security protocol for classical communication where information is encoded within these framed knots.”

Oct 17, 2020

#SpaceWatchGL Opinion: Let’s not make Newspace a paradise for hackers

Posted by in categories: cybercrime/malcode, encryption

In the race to launch smallsats into low earth orbit quickly and cost-effectively, operators and manufacturers have compromised on security and left themselves vulnerable to cyber attacks. Let’s not make Newspace a paradise for hackers.

Smallsat operators and manufacturers need to consider why their smallsats are so vulnerable to cyber attacks, the harm attacks can cause, cyber security weaknesses, why basic encryption is not enough and what can be done about it now. These are the issues that this article addresses.

Oct 4, 2020

Single photons from a silicon chip

Posted by in categories: encryption, quantum physics, robotics/AI, security

(Nanowerk News) Quantum technology holds great promise: Just a few years from now, quantum computers are expected to revolutionize database searches, AI systems, and computational simulations. Today already, quantum cryptography can guarantee absolutely secure data transfer, albeit with limitations. The greatest possible compatibility with our current silicon-based electronics will be a key advantage. And that is precisely where physicists from the Helmholtz-Zentrum Dresden-Rossendorf (HZDR) and TU Dresden have made remarkable progress: The team has designed a silicon-based light source to generate single photons that propagate well in glass fibers.

Oct 2, 2020

This ‘unhackable’ network uses the weird power of quantum physics

Posted by in categories: encryption, engineering, quantum physics

O,.o.


BT and Toshiba have deployed an ‘unhackable’ quantum network that uses streams of photons to encrypt sensitive communications.

Continue reading “This ‘unhackable’ network uses the weird power of quantum physics” »

Page 27 of 59First2425262728293031Last