Menu

Blog

Archive for the ‘encryption’ category: Page 3

Sep 8, 2024

Scientists Combine Quantum Internet With Conventional Internet in Landmark Discovery

Posted by in categories: computing, encryption, internet, quantum physics, security

Researchers at Leibniz University Hannover have developed a technology for transmitting entangled photons through optical fibers, which could enable the integration of quantum and conventional internet, promising enhanced security and efficient use of existing infrastructure.

A team of four researchers from the Institute of Photonics at Leibniz University Hannover has developed an innovative transmitter-receiver system for transmitting entangled photons via optical fiber.

This breakthrough could enable the next generation of telecommunications technology, the quantum Internet, to be routed via optical fibers. The quantum Internet promises eavesdropping-proof encryption methods that even future quantum computers cannot decrypt, ensuring the security of critical infrastructure.

Sep 4, 2024

New Quantum Effect in Textbook Chemistry Law

Posted by in categories: chemistry, computing, encryption, law, quantum physics

The observation of quantum modifications to a well-known chemical law could lead to performance improvements for quantum information storage.

The Arrhenius law says that the rate of a chemical reaction should decrease steadily as you increase the energy barrier between initial and final states. Now researchers have found a system that obeys a quantum version of the Arrhenius law, where the rate does not drop smoothly but instead decreases in a staircase pattern [1]. The system is a type of quantum bit (qubit) that is particularly robust against environmental disturbances. The researchers demonstrated that they can take advantage of this quantum effect to improve the qubit’s performance.

Technologies such as quantum computers and quantum cryptography use qubits to store information, and one of the continuing challenges is that uncontrolled environmental effects can change the state of a qubit. The most common solutions require large amounts of hardware, but an alternative method is to use qubits that are more error resistant, such as so-called cat qubits. The information in these qubits is stored in robust combinations of quantum states that resemble the states in Schrödinger’s famous feline thought experiment (see Synopsis: Quantum-ness Put on the Scale).

Sep 1, 2024

NIST publishes first set of ‘finalized’ post-quantum encryption standards

Posted by in categories: cybercrime/malcode, encryption, information science, policy, quantum physics

The three final algorithms, which have now been released, are ML-KEM, previously known as kyber; ML-DSA (formerly Dilithium); and SLH-DSA (SPHINCS+). NIST says it will release a draft standard for FALCON later this year. “These finalized standards include instructions for incorporating them into products and encryption systems,” says NIST mathematician Dustin Moody, who heads the PQC standardization project. “We encourage system administrators to start integrating them into their systems immediately.”

Duncan Jones, head of cybersecurity at the firm Quantinuum welcomes the development. “[It] represents a crucial first step towards protecting all our data against the threat of a future quantum computer that could decrypt traditionally secure communications,” he says. “On all fronts – from technology to global policy – advancements are causing experts to predict a faster timeline to reaching fault-tolerant quantum computers. The standardization of NIST’s algorithms is a critical milestone in that timeline.”

Aug 23, 2024

Researchers propose a smaller, more noise-tolerant quantum factoring circuit for cryptography

Posted by in categories: computing, encryption, information science, quantum physics

The most recent email you sent was likely encrypted using a tried-and-true method that relies on the idea that even the fastest computer would be unable to efficiently break a gigantic number into factors.

Quantum computers, on the other hand, promise to rapidly crack complex cryptographic systems that a classical computer might never be able to unravel. This promise is based on a quantum factoring proposed in 1994 by Peter Shor, who is now a professor at MIT.

But while researchers have taken great strides in the last 30 years, scientists have yet to build a quantum computer powerful enough to run Shor’s algorithm.

Aug 20, 2024

Kirigami cubes make a novel mechanical computer

Posted by in categories: computing, encryption

A new mechanical computer made from an array of rigid, interconnected plastic cubes can store, retrieve and erase data simply by stretching the array and manipulating the position of the cubes. The device’s construction is inspired by the ancient Japanese art of paper cutting, or kirigami, and its designers at North Carolina State University in the US say that more advanced versions could be used in stable, high-density memory and logic computing; in information encryption and decryption; and to create displays based on three-dimensional units called voxels.

Mechanical computers were first developed in the 19th century and do not contain any electronic components. Instead, they perform calculations with levers and gears. We don’t often hear about such contraptions these days, but researchers led by NC State mechanical and aerospace engineer Jie Yin are attempting to bring them back due to their stability and their capacity for storing complex information.

Aug 17, 2024

General Dynamics to build multifunction maritime radios with NSA Type 1 encryption for ships and submarines

Posted by in categories: computing, encryption, military, privacy

Related: SDR: a spectrum of possibilities

NAVWAR awarded the order on behalf of the Navy’s Program Executive Office for Command, Control, Communication, Computers, and Intelligence (PEO C4I) in San Diego.

The AN/USC-61© is a maritime software-defined radio (SDR) that has become standard for the U.S. military. The compact, multi-channel DMR provides several different waveforms and multi-level information security for voice and data communications.

Aug 14, 2024

NIST’s post-quantum cryptography standards are here

Posted by in categories: encryption, information science, quantum physics

The US National Institute of Standards and Technology has released Federal Information Processing Standards (FIPS) publications for three quantum-resistant cryptographic algorithms.

In a landmark announcement, the National Institute of Standards and Technology (NIST) has published its first set of post-quantum cryptography (PQC) standards. This announcement serves as an inflection point in modern cybersecurity: as the global benchmark for cryptography, the NIST standards signal to enterprises, government agencies, and supply chain vendors that the time has come to make the world’s information security systems resistant to future cryptographically relevant quantum computers.

Continue reading “NIST’s post-quantum cryptography standards are here” »

Aug 13, 2024

NIST Finalizes Post-Quantum Encryption Standards

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

Three new encryption algorithms to bolster global cybersecurity efforts against future attacks using quantum technologies were published today by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. The new standards are designed for two tasks: general encryption and digital signatures.

These new standards are the culmination of an eight-year effort from the agency to tap the best minds in cybersecurity to devise the next generation of cryptography strong enough to withstand quantum computers. Experts expect quantum computers capable of breaking current current cryptographic algorithms within a decade. The new standards, the first released by NIST’s post-quantum cryptography (PQC) standardization project, are published on the department’s website. The documents contain the algorithms’ computer code, instructions for how to implement them in products and in encryption systems, and use cases for each.

Aug 12, 2024

Chip that entangles four photons opens up possibility of inviolable quantum encryption

Posted by in categories: computing, encryption, information science, mathematics, quantum physics, security

Unlike classical encryption, which relies on mathematical algorithms, quantum encryption assures security based on physical principles. Detection of espionage or interference is guaranteed by unavoidable alteration of the quantum states involved.

Jul 24, 2024

Event-driven optical encryption advances information security through neuromorphic imaging

Posted by in categories: computing, encryption, internet, security

In an era where the internet connects virtually every aspect of our lives, the security of information systems has become paramount. Safeguarding critical databases containing private and commercial information presents a formidable challenge, driving researchers to explore advanced encryption techniques for enhanced protection.

Data encryption, a cornerstone of modern practices, transforms readable plaintext into encoded ciphertext, ensuring that only authorized recipients can decipher the data using a decryption key or password. Optical techniques have emerged as promising tools for encryption due to their capabilities for parallel, high-speed transmission, and low-power consumption. However, traditional optical encryption systems often suffer from vulnerabilities where plaintext-ciphertext forms remain identical, potentially compromising security.

Reporting in Advanced Photonics Nexus, scientists have unveiled an approach inspired by bio-inspired neuromorphic imaging and speckle correlography. Their innovative technique leverages computational neuromorphic imaging (CNI) to encrypt images into event-stream ciphertexts, marking a significant departure from conventional methods. This method introduces a new paradigm in optical encryption by converting data into event-driven formats, thereby significantly enhancing security and complexity.

Page 3 of 5912345678Last