Archive for the ‘encryption’ category

Sep 7, 2017

High-Dimensional Quantum Encryption Performed in Real-World City Conditions for First Time

Posted by in categories: encryption, quantum physics, satellites

For the first time, researchers have sent a quantum-secured message containing more than one bit of information per photon through the air above a city. The demonstration showed that it could one day be practical to use high-capacity, free-space quantum communication to create a highly secure link between ground-based networks and satellites, a requirement for creating a global quantum encryption network.

Quantum encryption uses photons to encode information in the form of quantum bits. In its simplest form, known as 2D encryption, each photon encodes one bit: either a one or a zero. Scientists have shown that a single photon can encode even more information—a concept known as high-dimensional quantum encryption—but until now this has never been demonstrated with free-space optical communication in real-world conditions. With eight bits necessary to encode just one letter, for example, packing more information into each photon would significantly speed up data transmission.

“Our work is the first to send messages in a secure manner using high-dimensional quantum encryption in realistic city conditions, including turbulence,” said research team lead, Ebrahim Karimi, University of Ottawa, Canada. “The secure, free-space communication scheme we demonstrated could potentially link Earth with satellites, securely connect places where it is too expensive to install fiber, or be used for encrypted communication with a moving object, such as an airplane.”

Continue reading “High-Dimensional Quantum Encryption Performed in Real-World City Conditions for First Time” »

Jun 16, 2017

China’s Micius satellite sets distance record for quantum entanglement in space

Posted by in categories: encryption, quantum physics, space

Chinese researchers report that they’ve set a new distance record for quantum teleportation through space, the phenomenon that Albert Einstein once scoffed at as “spooky action at a distance.”

The technology isn’t yet ready for prime time, but eventually it could open the way for a new type of unbreakable encryption scheme based on the weirdness of quantum physics.

Continue reading “China’s Micius satellite sets distance record for quantum entanglement in space” »

May 14, 2017

NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet

Posted by in categories: cybercrime/malcode, encryption, internet, supercomputing

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Continue reading “NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet” »

May 10, 2017

Pirates may have cracked the code to 4K UHD torrents

Posted by in categories: encryption, entertainment

Someone may have finally cracked a form of DVD encryption believed to be impenetrable. Potentially, this could mean it’s now possible to download 4K Blu-Ray movies online, though you shouldn’t get too excited yet.

According to TorrentFreak, an allegedly cracked copy of The Smurfs 2 — why that one, of all films, is a mystery — surfaced on HD Bit Torrent community UltraHDClub. There are no other details at the moment.

We’ve teamed up with Product Hunt to offer you the chance to win an all expense paid trip to TNW Conference 2017!

Continue reading “Pirates may have cracked the code to 4K UHD torrents” »

May 2, 2017

Russian scholars unlock the secret of the mysterious Voynich manuscript

Posted by in category: encryption

After conducting a statistical analysis of the text, Russian experts believe it’s encrypted in the following way: vowels and spaces are removed from the text. The collection of symbols is united in a new text, bestrewed with spaces beforehand. They estimate that about 60 percent of the text is written in English or German, and the other part in one of the Romance languages – possibly Italian or Spanish, or even Latin.

Experts previously thought it impossible to decipher the medieval text.

Read more

Apr 15, 2017

All coins are created equal

Posted by in categories: cryptocurrencies, encryption

Zcash is the first open, permissionless cryptocurrency that can fully protect the privacy of transactions using zero-knowledge cryptography. The Zcash client is now available for download as a command-line tool for Linux.

Get Started

Learn More

Continue reading “All coins are created equal” »

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Mar 1, 2017

Mathematician breaks down how to defend against quantum computing attacks

Posted by in categories: computing, encryption, internet, mathematics, quantum physics

The encryption codes that safeguard internet data today won’t be secure forever.

Future quantum computers may have the and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

Continue reading “Mathematician breaks down how to defend against quantum computing attacks” »

Feb 21, 2017

Quantum Systems, Channels, Information: A Mathematical Introduction [Repost]

Posted by in categories: computing, encryption, mathematics, quantum physics

Published: 2012/11/01 | ISBN: 311027325X | PDF | 349 pages | 12.06 MB

The subject of this book is theory of quantum system presented from information science perspective. The central role is played by the concept of quantum channel and its entropic and information characteristics. Quantum information theory gives a key to understanding elusive phenomena of quantum world and provides a background for development of experimental techniques that enable measuring and manipulation of individual quantum systems. This is important for the new efficient applications such as quantum computing, communication and cryptography. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. This book gives an accessible, albeit mathematically rigorous and self-contained introduction to quantum information theory, starting from primary structures and leading to fundamental results and to exiting open problems.

Read more

Feb 14, 2017

Cryptographers Dismiss AI, Quantum Computing Threats

Posted by in categories: cybercrime/malcode, encryption, information science, policy, quantum physics, robotics/AI

Cybercrime & Cybersecurity 0 20

There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.

SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.

Continue reading “Cryptographers Dismiss AI, Quantum Computing Threats” »

Page 1 of 1812345678Last