Archive for the ‘encryption’ category: Page 34
Sep 7, 2019
Dave Bacon: Google Quantum Computing Beyond Swag
Posted by Quinn Sena in categories: computing, encryption, quantum physics
A talk by Dave Bacon during the Industry session of the 14th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2019), Day 3. TQC 2019 was hosted June 3–5, 2019 by the Joint Center for Quantum Information and Computer Science at the University of Maryland (QuICS). More information about TQC can be found at https://www.tqcconference.org.
Sep 6, 2019
How the United States Is Developing Post-Quantum Cryptography
Posted by Quinn Sena in categories: computing, encryption, government, information science, internet, quantum physics, security
When practical quantum computing finally arrives, it will have the power to crack the standard digital codes that safeguard online privacy and security for governments, corporations, and virtually everyone who uses the Internet. That’s why a U.S. government agency has challenged researchers to develop a new generation of quantum-resistant cryptographic algorithms.
Many experts don ’t expect a quantum computer capable of performing the complex calculations required to crack modern cryptography standards to become a reality within the next 10 years. But the U.S. National Institute of Standards and Technology (NIST) wants to stay ahead by getting new cryptographic standards ready by 2022. The agency is overseeing the second phase of its Post-Quantum Cryptography Standardization Process to narrow down the best candidates for quantum-resistant algorithms that can replace modern cryptography.
“Currently intractable computational problems that protect widely-deployed cryptosystems, such as RSA and Elliptic Curve-based schemes, are expected to become solvable,” says Rafael Misoczki, a cryptographer at the Intel Corporation and a member of two teams (named Bike and Classic McEliece) involved in the NIST process. “This means that quantum computers have the potential to eventually break most secure communications on the planet.”
Sep 5, 2019
New technology allows software components to be isolated from each other with little computation
Posted by Saúl Morales Rodriguéz in categories: cybercrime/malcode, encryption, internet
Safeguarding passwords, credit card numbers or cryptographic keys in computer programs will require less computational work in the future. Researchers at the Max Planck Institute for Software Systems in Kaiserslautern and Saarbrücken have come up with a new technology called ERIM to isolate software components from each other. This allows sensitive data to be protected from hackers when the data is processed by online services, for example. The new method has three to five times less computational overhead than the previous best isolation technology, making it more practical for online services to use the technology. This was reason enough for USENIX, a US-American computing systems association, and Facebook to award their 2019 Internet Defense Prize to the researchers.
Computer programs are like a fortress. Just as a fortress is protected by thick walls, moats and iron gates, firewalls and other security technologies prevent cyber criminals from maliciously exploiting software apps. And just as one poorly guarded gate or a supposedly secret escape tunnel may allow besiegers to capture a castle, all hackers need is a small security gap to gain access to all components of a software. In the worst case, they can then get their hands on the data that grants them access to user accounts or even allow them to make credit card payments. For example, the Heartbleed bug in the widely used OpenSSL encryption software made user names and passwords of various online services and programs vulnerable to hackers.
Sep 3, 2019
Undercover evolution: Our individuality is encrypted in our DNA, but it is deeper than expected
Posted by Xavier Rosseel in categories: biotech/medical, encryption, evolution, genetics
Providing a glimpse the hidden workings of evolution, a group of researchers at UC Santa Barbara have discovered that embryos that appear the same can start out with surprisingly different instructions.
“We found that a lot of undercover evolution occurs in early embryos,” said Joel Rothman, a professor in the Department of Molecular, Cellular, and Developmental Biology, who led the team.
Indeed, although members of the same species are identical across the vast majority of their genomes, including all the genetic instructions used in development, Rothman and his colleagues found that key parts of the assembly instructions used when embryos first start developing can differ dramatically between individuals of the same species.
Aug 30, 2019
Quantum safe tape drive: IBM team eyes encryption future
Posted by Saúl Morales Rodriguéz in categories: computing, encryption, information science, quantum physics
This week a collaborative effort among computer scientists and academics to safeguard data is winning attention and it has quantum computing written all over it.
The Netherlands’ Centrum Wiskunde & Informatica (CWI), national research institute for mathematics and computer science, had the story: IBM Research developed “quantum-safe algorithms” for securing data. They have done so by working with international partners including CWI and Radboud University in the Netherlands.
IBM and partners share concerns that data protected by current encryption methods may become insecure within the next 10 to 30 years.
Aug 25, 2019
Researchers Demonstrate The World’s First Quantum Radar
Posted by Quinn Sena in categories: computing, encryption, quantum physics
Yes, we know that sometimes it feels like they just tack the word quantum on new technology and call it a day like we are all living in the Marvel Cinematic Universe. Nevertheless, quantum technology is very real and is just as exciting. Our better understanding of the quantum world and handle on the principals will help us improve everything from computing to encryption.
Aug 23, 2019
Quantum radar has been demonstrated for the first time
Posted by Shane Hinshaw in categories: computing, encryption, quantum physics
One of the advantages of the quantum revolution is the ability to sense the world in a new way. The general idea is to use the special properties of quantum mechanics to make measurements or produce images that are otherwise impossible.
Much of this work is done with photons. But as far as the electromagnetic spectrum is concerned, the quantum revolution has been a little one-sided. Almost all the advances in quantum computing, cryptography, teleportation, and so on have involved visible or near-visible light.
Aug 21, 2019
Cambridge Quantum Random Key Generation and Encryption
Posted by Paul Battista in categories: computing, encryption, quantum physics, security
Cambridge Quantum Computing has a demo of its quantum key security generation at Ironbridgeapi.com.
Aug 21, 2019
These 4 Gmail alternatives put your privacy first
Posted by Genevieve Klien in category: encryption
If you don’t want your email provider, its partners, or even hackers skimming your messages, choose one of these providers, which offer end-to-end encryption and other measures.
[Photo: courtesy of Tutanota].