Menu

Blog

Archive for the ‘encryption’ category: Page 12

Jan 18, 2023

IBM: Quantum computing poses an ‘existential threat’ to data encryption

Posted by in categories: business, computing, encryption, existential risks, quantum physics, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

For years, encryption has played a core role in securing enterprise data. However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.

Today, IBM Institute for Business Value issued a new report titled Security in the Quantum Era, examining the reality of quantum risk and the need for enterprise adoption of quantum-safe capabilities to safeguard the integrity of critical applications and infrastructure as the risk of decryption increases.

Jan 14, 2023

Quantum computers: How scientists can shield against cyber attacks

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

Making predictions is never easy, but it is agreed that cryptography will be altered by the advent of quantum computers.

Thirteen, 53, and 433. That’s the size of quantum computers.


Hh5800/iStock.

Continue reading “Quantum computers: How scientists can shield against cyber attacks” »

Jan 14, 2023

Using cosmic rays to generate and distribute random numbers and boost security for local devices and networks

Posted by in categories: computing, encryption, military, quantum physics

State-of-the-art methods of information security are likely to be compromised by emerging technologies such as quantum computers. One of the reasons they are vulnerable is that both encrypted messages and the keys to decrypt them must be sent from sender to receiver.

A new method—called COSMOCAT—is proposed and demonstrated, which removes the need to send a since cosmic rays transport it for us, meaning that even if messages are intercepted, they could not be read using any theorized approach. COSMOCAT could be useful in localized various bandwidth applications, as there are limitations to the effective distance between sender and receiver.

In the field of information communication technology, there is a perpetual arms race to find ever more secure ways to transfer data, and ever more sophisticated ways to break them. Even the first modern computers were essentially code-breaking machines used by the U.S. and European Allies during World War II. And this is about to enter a new regime with the advent of quantum computers, capable of breaking current forms of security with ease. Even security methods which use quantum computers themselves might be susceptible to other quantum attacks.

Jan 14, 2023

Hacker group discloses ability to encrypt an RTU device using ransomware, industry reacts

Posted by in categories: cybercrime/malcode, encryption

Hacker group discloses the ability to encrypt an RTU device using ransomware, leading to reactions from Claroty and SynSaber.

Jan 12, 2023

China’s new quantum code-breaking algorithm raises concerns in the US

Posted by in categories: computing, encryption, information science, quantum physics

The new algorithm could render mainstream encryption powerless within years.

Chinese researchers claim to have introduced a new code-breaking algorithm that, if successful, could render mainstream encryption powerless within years rather than decades.

The team, led by Professor Long Guilu of Tsinghua University, proclaimed that a modest quantum computer constructed with currently available technology could run their algorithm, South China Morning Post (SCMP) reported on Wednesday.

Jan 11, 2023

Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App

Posted by in categories: biotech/medical, encryption, security

A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of loopholes that could be exploited to break authentication protections and even recover users’ private keys.

The seven attacks span three different threat models, according to ETH Zurich researchers Kenneth G. Paterson, Matteo Scarlata, and Kien Tuong Truong, who reported the issues to Threema on October 3, 2022. The weaknesses have since been addressed as part of updates released by the company on November 29, 2022.

Threema is an encrypted messaging app that’s used by more than 11 million users as of October 2022. “Security and privacy are deeply ingrained in Threema’s DNA,” the company claims on its website.

Jan 9, 2023

Are quantum computers about to break online privacy?

Posted by in categories: computing, encryption, information science, quantum physics

A new algorithm is probably not efficient enough to crack current encryption keys — but that’s no reason for complacency, researchers say.

Jan 8, 2023

Chinese Researchers Claim They Cracked Encryption With Quantum Computers

Posted by in categories: computing, encryption, quantum physics

Skeptical technology experts believe the declaration is a hoax intended to cause panic.

Jan 7, 2023

Quantum computers can break major encryption method, researchers claim

Posted by in categories: computing, encryption, quantum physics

It has long been known that one day quantum computers will probably be able to crack the RSA encryption method we use to keep data safe, but a team of researchers is now claiming it is already possible, while others say the results require more scrutiny.

Jan 5, 2023

Quantum computers may soon breach blockchain cryptography: Report

Posted by in categories: blockchains, computing, encryption, quantum physics

The method has not been tested on RSA-2048 but experts say it is theoretically possible.

Page 12 of 56First910111213141516Last