Menu

Blog

Archive for the ‘encryption’ category: Page 35

Sep 23, 2015

Scientists shatter distance record for teleporting quantum data

Posted by in categories: computing, encryption, internet, quantum physics

Quantum teleportation, the act of reconstructing quantum data somewhere else, is impressive just by itself. However, scientists at the US’ National Institute of Standards and Technology have managed to one-up that feat. They’ve broken the distance record for quantum teleportation by transferring the information from one photon to another across 63 miles of optical fiber. That may not sound like much, but it’s an achievement just to beam that data in the first place — 99 percent of photons would never make the complete trip. It was only possible thanks to newer detectors that could pick up the faint signal of the lone light particle.

You’d clearly need to send much more information before this teleportation becomes practical, but the achievement does open the door to many possibilities in quantum computing. You could use unbreakable quantum encryption at inter-city distances, for instance. The biggest challenge may simply be to extend the range to the point where quantum data transfers work on the scale of the internet, where there are occasionally thousands of miles between connections.

[Image credit: Getty Images/iStockphoto].

Read more

Sep 22, 2015

Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record

Posted by in categories: encryption, internet, quantum physics

You’ve gotta love Star Trek, but there is absolutely NO WAY I’d ever set foot in a real teleportation device! (if one ever really got made, of course) Call me crazy, but I’m kinda partial to keeping my molecular cohesion as intact as possible, which kinda rules out having it ripped apart and remade on the other side.


A record-breaking distance has been achieved in the bizarre world of quantum teleportation, scientists say.

The scientists teleported photons (packets of light) across a spool of fiber optics 63 miles (102 kilometers) long, four times farther than the previous record. This research could one day lead to a “quantum Internet” that offers next-generation encryption, the scientists said.

Continue reading “Shades of ‘Star Trek’? Quantum Teleportation Sets Distance Record” »

Sep 20, 2015

Snowden says aliens could be trying to get in touch right now

Posted by in categories: alien life, encryption

Technically Incorrect: In a conversation with Neil DeGrasse Tyson, the Moscow-based NSA whistleblower offers his views on interplanetary communication. He fears their communication may be encrypted, so we’re missing it.

Read more

Sep 20, 2015

The Search for Extraterrestrial Life and Encrypted Space Communication

Posted by in categories: alien life, encryption, existential risks, information science


Neil deGrasse Tyson and Edward Snowden recently discussed the idea that encryption mechanisms with advanced extraterrestrial species and humans could theoretically render communication as indistinguishable from cosmic background radiation. With only a short period of time in a species growth where open communication is broadcast to the stars (through the sluggish and primitive nature of radio broadcasts), this could prevent us (or other species) from making contact with one another.

With the Drake Equation stating a high probability of communicative extraterrestrial civilizations and the contrasting Fermi Paradox citing lacking evidence of such, it begs the question of whether outlying reasons have an impact. In my opinion, the Drake Equation rings true in the sense that hundreds of billions of stars exist in our galaxy alone (many with their own diverse planetary bodies), setting the stage for extraterrestrial life to disavow itself as insatiable ramblings. Unlike that which is eminent in the Fermi Paradox, I believe, in this case, a conclusion based off of inductive reasoning seems to hold more water than an evidence-only approach.

Keeping in mind the discussion in The Guardian article, a flaw of the Fermi Paradox’s evidence-based perspective should become apparent: secure, encrypted communication (cloaked by design) would render the existence of extraterrestrial intelligence invisible to the prying ear. If intentional, there could be many reasons for withholding this whereabouts of a species location. An abstract theory from science fiction may itself hold a degree of truth. An example of which, is the video game series ‘Mass Effect,’ where an advanced, sentient machine-race cleanse the galaxy of advanced life every 40,000 years. The reasoning for doing so is to “bring order to chaos” and for reasons “unfathomable.” Be it for an abstract reason such as this or simply for secure communication, the encryption of the resultant transmission’s presence wouldn’t register as noticeable to any observers. As nearly all signs of outside life would be mute, it then lays in the other senses that hold the most promise of enlightenment.

Read more

Sep 16, 2015

New quantum dot could make quantum communications possible

Posted by in categories: encryption, quantum physics

Real world quantum encryption and communication may just have gotten a whole lot closer, with a new super-accurate quantum dot.

Read more

Sep 4, 2015

The 10 Algorithms That Dominate Our World

Posted by in categories: computing, encryption, information science

1. Google Search.

2. Facebook’s News Feed.

Continue reading “The 10 Algorithms That Dominate Our World” »

Aug 20, 2015

Tech’s Biggest Ideas and How They Take Hold — With Marc Andreessen and Dan Siroker | Andreessen Horowitz

Posted by in categories: augmented reality, biotech/medical, cryptocurrencies, encryption, internet, mobile phones, polls, robotics/AI, transparency, virtual reality

Aug 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Posted by in categories: computing, encryption, internet, quantum physics

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read more

Aug 3, 2015

Microsoft Works Out How to Upgrade Online Encryption to Protect Against Quantum Computers

Posted by in categories: biotech/medical, computing, encryption, energy

Call it an abundance of caution. A Microsoft research project has upgraded the encryption protocol that secures the Web to resist attacks from quantum computers—machines that are expected to have stupendous power but have never been built.

Governments and computing giants like IBM, Microsoft, and Google are working on quantum computers because tapping subtle effects of quantum physics should let them solve in seconds some problems that a conventional machine couldn’t solve in billions of years (see “Microsoft’s Quantum Mechanics”). That might allow breakthroughs in areas such as medicine or energy. But such machines would also be able to easily break the encryption used to secure information online.

Read more

Jul 7, 2015

Passfaces: Strong authentication for the masses

Posted by in categories: big data, business, computing, encryption, finance, information science, internet

Last year, Google began experimenting with hardware-based schemes for user-authentication, while Apple added two factor authentication to iCloud and Apple ID users. They began sending a verification code to users via a mobile number registered in advance.

Security pundits know that two factor authentication is more secure than simple passwords. As a refresher, “Factors” are typically described like this:

  • Something that you know (a password — or even better, a formula)
  • Something that you have (Secure ID token or code sent to cell phone)
  • Something that you are (a biometric: fingerprint, voice, face, etc.)

The Google project may be just another method of factor #2. In fact, because it is small (easily misplaced or stolen), it simplifies but does not improve on security. I suggest a radical and reliable method of authentication. It’s not new and it’s not my idea…

password_key

Continue reading “Passfaces: Strong authentication for the masses” »

Page 35 of 37First3031323334353637