Archive for the ‘encryption’ category: Page 36
Apr 25, 2019
Building a printing press for new quantum materials
Posted by Quinn Sena in categories: computing, encryption, nanotechnology, quantum physics
Checking out a stack of books from the library is as simple as searching the library’s catalog and using unique call numbers to pull each book from their shelf locations. Using a similar principle, scientists at the Center for Functional Nanomaterials (CFN)—a U.S. Department of Energy (DOE) Office of Science User Facility at Brookhaven National Laboratory—are teaming with Harvard University and the Massachusetts Institute of Technology (MIT) to create a first-of-its-kind automated system to catalog atomically thin two-dimensional (2-D) materials and stack them into layered structures. Called the Quantum Material Press, or QPress, this system will accelerate the discovery of next-generation materials for the emerging field of quantum information science (QIS).
Structures obtained by stacking single atomic layers (“flakes”) peeled from different parent bulk crystals are of interest because of the exotic electronic, magnetic, and optical properties that emerge at such small (quantum) size scales. However, flake exfoliation is currently a manual process that yields a variety of flake sizes, shapes, orientations, and number of layers. Scientists use optical microscopes at high magnification to manually hunt through thousands of flakes to find the desired ones, and this search can sometimes take days or even a week, and is prone to human error.
Once high-quality 2-D flakes from different crystals have been located and their properties characterized, they can be assembled in the desired order to create the layered structures. Stacking is very time-intensive, often taking longer than a month to assemble a single layered structure. To determine whether the generated structures are optimal for QIS applications—ranging from computing and encryption to sensing and communications—scientists then need to characterize the structures’ properties.
Continue reading “Building a printing press for new quantum materials” »
Apr 8, 2019
QC — Cracking RSA with Shor’s Algorithm
Posted by Quinn Sena in categories: cybercrime/malcode, encryption, information science
With new advances in technology it all comes down to simple factoring. Classical factoring systems are outdated where some problems would take 80 billion years to solve but with new technologies such as the dwave 2 it can bring us up to speed to do the same problems in about 2 seconds. Shores algorithm shows us also we can hack anything with it simply would need the technology and code simple enough and strong enough. Basically with new infrastructure we can do like jason…
RSA is the standard cryptographic algorithm on the Internet. The method is publicly known but extremely hard to crack. It uses two keys for encryption. The public key is open and the client uses it to encrypt a random session key. Anyone intercepts the encrypted key must use the second key, the private key, to decrypt it. Otherwise, it is just garbage. Once the session key is decrypted, the server uses it to encrypt and decrypt further messages with a faster algorithm. So, as long as we keep the private key safe, the communication will be secure.
RSA encryption is based on a simple idea: prime factorization. Multiplying two prime numbers is pretty simple, but it is hard to factorize its result. For example, what are the factors for 507,906,452,803? Answer: 566,557 × 896,479.
Continue reading “QC — Cracking RSA with Shor’s Algorithm” »
Mar 6, 2019
Inside the high-stakes race to make quantum computers work
Posted by Genevieve Klien in categories: computing, encryption, finance, quantum physics
Quantum computers could help explain some of the most fundamental mysteries in the universe and upend everything from finance to encryption – if only someone could get them to work.
Feb 28, 2019
Mammalian Near-Infrared Image Vision through Injectable and Self-Powered Retinal Nanoantennae
Posted by James Christian Smith in categories: encryption, energy, military, nanotechnology
Mice with vision enhanced by nanotechnology were able to see infrared light as well as visible light, reports a study published February 28 in the journal Cell. A single injection of nanoparticles in the mice’s eyes bestowed infrared vision for up to 10 weeks with minimal side effects, allowing them to see infrared light even during the day and with enough specificity to distinguish between different shapes. These findings could lead to advancements in human infrared vision technologies, including potential applications in civilian encryption, security, and military operations.
Injectable photoreceptor-binding nanoparticles with the ability to convert photons from low-energy to high-energy forms allow mice to develop infrared vision without compromising their normal vision and associated behavioral responses.
Feb 15, 2019
One step closer to complex quantum teleportation
Posted by Quinn Sena in categories: encryption, information science, quantum physics, robotics/AI
Circa 2018
The experimental mastery of complex quantum systems is required for future technologies like quantum computers and quantum encryption. Scientists from the University of Vienna and the Austrian Academy of Sciences have broken new ground. They sought to use more complex quantum systems than two-dimensionally entangled qubits and thus can increase the information capacity with the same number of particles. The developed methods and technologies could in the future enable the teleportation of complex quantum systems. The results of their work, “Experimental Greenberger-Horne-Zeilinger entanglement beyond qubits,” is published recently in the renowned journal Nature Photonics.
Similar to bits in conventional computers, qubits are the smallest unit of information in quantum systems. Big companies like Google and IBM are competing with research institutes around the world to produce an increasing number of entangled qubits and develop a functioning quantum computer. But a research group at the University of Vienna and the Austrian Academy of Sciences is pursuing a new path to increase the information capacity of complex quantum systems.
Continue reading “One step closer to complex quantum teleportation” »
Feb 4, 2019
Canadian cryptocurrency fund boss Gerald Cotten died – and US$190million of his investors’ money may be encrypted forever
Posted by Michael Lance in categories: cosmology, cryptocurrencies, economics, encryption
US$190 million in investors’ money has been locked since Cotten died in December. His widow says she doesn’t know his passwords.
About US$190 million in cryptocurrency has been locked away in a online black hole after the founder of a currency exchange died, apparently taking his encrypted access to their money with him.
Investors in QuadrigaCX, Canada’s largest cryptocurrency exchange, have been unable to access their funds since its founder, Gerald Cotten, died last year.
Jan 12, 2019
Quantum computing explained in 10 minutes
Posted by Genevieve Klien in categories: biotech/medical, computing, encryption, quantum physics
A quantum computer isn’t just a more powerful version of the computers we use today; it’s something else entirely, based on emerging scientific understanding — and more than a bit of uncertainty. Enter the quantum wonderland with TED Fellow Shohini Ghose and learn how this technology holds the potential to transform medicine, create unbreakable encryption and even teleport information.
Jan 4, 2019
The Unlikely Origins of the First Quantum Computer
Posted by Genevieve Klien in categories: biotech/medical, chemistry, encryption, quantum physics, robotics/AI
Within days of each other back in 1998, two teams published the results of the first real-world quantum computations. But the first quantum computers weren’t computers at all. They were biochemistry equipment, relying on the same science as MRI machines.
You might think of quantum computing as a hyped-up race between computer companies to build a powerful processing device that will make more lifelike AI, revolutionize medicine, and crack the encryption that protects our data. And indeed, the prototype quantum computers of the late 1990s indirectly led to the quantum computers built by Google and IBM. But that’s not how it all began—it started with physicists tinkering with mathematics and biochemistry equipment for curiosity’s sake.
Dec 31, 2018
T cell photos make data encryption truly random
Posted by Genevieve Klien in categories: encryption, security
Uncrackable encryption keys made from images of 2,000 wiggling T cells could keep your data safe from hackers and security breaches.