Menu

Blog

Archive for the ‘encryption’ category: Page 12

Mar 30, 2020

Physicists develop new photon source for tap-proof communication

Posted by in categories: encryption, quantum physics, space

An international team with the participation of Prof. Dr. Michael Kues from the Cluster of Excellence PhoenixD at Leibniz University Hannover has developed a new method for generating quantum-entangled photons in a spectral range of light that was previously inaccessible. The discovery can make the encryption of satellite-based communications much more secure in the future.

A 15-member research team from the U.K., Germany and Japan has developed a new method for generating and detecting quantum-entangled photons at a wavelength of 2.1 micrometers. In practice, entangled photons are used in encryption methods such as quantum key distribution to completely secure telecommunications between two partners against eavesdropping attempts. The research results are presented to the public for the first time in the current issue of Science Advances.

It has been regarded as technically possible to implement encryption mechanisms with entangled photons in the near-infrared range of 700 to 1550 nanometers. However, these have disadvantages, especially in satellite-based communication. They are disturbed by light-absorbing gases in the atmosphere as well as the background radiation of the sun. With existing technology, end-to-end encryption of transmitted data can only be guaranteed at night, but not on sunny and cloudy days.

Mar 20, 2020

Scientists Develop World’s First ‘Unhackable’ Encryption System

Posted by in categories: computing, encryption

Circa 2019


Makers of Titanic claimed that it is ‘unsinkable’ and we know how it went down in history. Now, researchers from the University of St Andrews have claimed to have developed an ‘unhackable’ encryption system that stores data in the form of light.

The chip designed by the researchers generates one-time-only key when data is sent through it. The data is stored as light and passed through a specially designed chip that bends and refracts the light to scramble the information.

Continue reading “Scientists Develop World’s First ‘Unhackable’ Encryption System” »

Mar 18, 2020

A sneaky attempt to end encryption is worming its way through Congress

Posted by in categories: encryption, government, law enforcement

The EARN IT Act could give law enforcement officials the backdoor they have long wanted — unless tech companies come together to stop it. But Match Group has already endorsed it, putting pressure on Facebook, Twitter, and others.

Mar 15, 2020

New Warning Issued For All WhatsApp And iMessage Users: ‘Major Threat’ To Encryption

Posted by in category: encryption

Is this the beginning of the end for secure messaging?

Mar 6, 2020

The EARN IT Act Is a Sneak Attack on Encryption

Posted by in category: encryption

The crypto wars are back in full swing.

Feb 24, 2020

The view of quantum threats – from the front lines

Posted by in categories: computing, encryption, quantum physics, security

Quantum computing might initially sound like a far-fetched futuristic idea, but companies such as Amazon, Google, and IBM are putting their weight behind it and preparations have begun. With quantum computing potentially within our reach, what will happen to our current security models and modern-day encryption? See what security experts are doing to prepare for quantum threats.

The future is here. Or just about. After a number of discoveries, researchers have proven that quantum computing is possible and on its way. The wider world did not pause long on this discovery: Goldman Sachs, Amazon, Google, and IBM have just announced their own intentions to embark on their own quantum developments.

Now that it’s within our reach we have to start seriously considering what that means in the real world. Certainly, we all stand to gain from the massive benefits that quantum capabilities can bring, but so do cybercriminals.

Feb 24, 2020

Why Quantum Computing Gets Special Attention In The Trump Administration’s Budget Proposal

Posted by in categories: computing, encryption, quantum physics

Competition between the U.S. and China in quantum computing revolves, in part, around the role such a system could play in breaking the encryption that makes things secure on the internet.

Truly useful quantum computing applications could be as much as a decade away, Aaronson says. Initially, these tools would be highly specialized.

“The way I put it is that we’re now entering the very, very early, vacuum-tube era of quantum computers,” he says.

Continue reading “Why Quantum Computing Gets Special Attention In The Trump Administration’s Budget Proposal” »

Feb 21, 2020

Scientists Create a 5-atom Quantum Computer That Could Make Today’s Encryption Obsolete

Posted by in categories: computing, encryption, quantum physics

Circa 2016


MIT scientists have developed a 5-atom quantum computer, one that is able to render traditional encryption obsolete.

Continue reading “Scientists Create a 5-atom Quantum Computer That Could Make Today’s Encryption Obsolete” »

Feb 20, 2020

Mixed-signal hardware security thwarts powerful electromagnetic attacks

Posted by in categories: encryption, information science, internet, security

Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages.

When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators have developed technology to kill the problem at the source itself—tackling physical-layer vulnerabilities with physical-layer solutions.

Continue reading “Mixed-signal hardware security thwarts powerful electromagnetic attacks” »

Feb 17, 2020

Compromised encryption machines gave CIA window into major human rights abuses in South America

Posted by in category: encryption

The countries running “Operation Condor,” a campaign of assassinations in the 1970s, used devices made by Crypto AG, a company owned by the agency and West German intelligence.

Page 12 of 40First910111213141516Last