Menu

Blog

Archive for the ‘encryption’ category: Page 42

Oct 6, 2016

The quantum clock is ticking on encryption – and your data is under threat

Posted by in categories: computing, encryption, quantum physics, security

Quantum computers pose a major threat to the security of our data. So what can be done to keep it safe?

Read more

Sep 29, 2016

Will quantum teleportation defeat quantum decryption?

Posted by in categories: computing, encryption, finance, quantum physics, security

Nice article; however, not sure if the author is aware Los Alamos already has a quantum net as well as some Europe banks have the capabilities and 4 months ago it was announced that a joint effort by various countries from Europe, Asia, etc. have come together to re-engineer the Net infrastructure with QC technology…


Maybe the quantum will giveth what the quantum taketh away… at least when it comes to secure transmissions.

There’s been much speculation that emerging quantum computers will become capable of breaking advanced public key cryptography systems, such as 2048-bit RSA. This might leave encrypted data transmissions exposed to anyone who happens to own such a quantum computer.

Continue reading “Will quantum teleportation defeat quantum decryption?” »

Sep 28, 2016

First quantum photonic circuit with an electrically driven light source

Posted by in categories: computing, encryption, nanotechnology, quantum physics

Whether for use in safe data encryption, ultrafast calculation of huge data volumes or so-called quantum simulation of highly complex systems: Optical quantum computers are a source of hope for tomorrow’s computer technology. For the first time, scientists now have succeeded in placing a complete quantum optical structure on a chip, as outlined Nature Photonics. This fulfills one condition for the use of photonic circuits in optical quantum computers.

“Experiments investigating the applicability of optical quantum technology so far have often claimed whole laboratory spaces,” explains Professor Ralph Krupke of the KIT. “However, if this technology is to be employed meaningfully, it must be accommodated on a minimum of space.” Participants in the study were scientists from Germany, Poland, and Russia under the leadership of Professors Wolfram Pernice of the Westphalian Wilhelm University of Münster (WWU) and Ralph Krupke, Manfred Kappes, and Carsten Rockstuhl of the Karlsruhe Institute of Technology (KIT).

The light source for the quantum photonic circuit used by the scientists for the first time were special nanotubes made of carbon. They have a diameter 100,000 times smaller than a human hair, and they emit single light particles when excited by laser light. Light particles (photons) are also referred to as light quanta. Hence the term “quantum photonics.”

Continue reading “First quantum photonic circuit with an electrically driven light source” »

Sep 27, 2016

Unbreakable Encryption is One Step Closer to Becoming Usable Technology

Posted by in categories: encryption, quantum physics

The University of Rochester has begun work on what they call a Quantum Enigma Machine. This new machine is said to be responsible for unbreakable encryption. It will also shorten encryption keys, and make data interception much more difficult than it already is.

American Mathematician Claude Shannon came up with a binary system that would allow him to transmit messages under three stipulations: the key is random, only used once, and it has to be as long as the message itself is.

Recent studies show that scientists are theorizing that they could send a message with unbreakable encryption with a key that is much shorter than the message itself. Their theory may soon become fact as researchers have developed the quantum enigma machine.

Continue reading “Unbreakable Encryption is One Step Closer to Becoming Usable Technology” »

Sep 24, 2016

China’s Micius Military Quantum Satellite Reports Important Progress

Posted by in categories: encryption, military, quantum physics, satellites

Quantum encryption uses the principle of “quantum entanglement” to foster communication that’s totally safe against eavesdropping and decryption by others.

The satellite’s true military nature is being disguised under the civilian name, Quantum Experiments at Space Scale, or QUESS. Publicly, QUESS is being billed as an international research project in the field of quantum physics.

Micius or Mozi is operated by the Chinese Academy of Sciences (CAS) while the University of Vienna and the Austrian Academy of Sciences run the satellite’s European receiving stations. The quantum satellite was launched last Aug. 16 from the Jiuquan Satellite Launch Center in the Gobi Desert.

Continue reading “China’s Micius Military Quantum Satellite Reports Important Progress” »

Sep 23, 2016

Quantum computers will cripple encryption methods within decade, CSE head warns

Posted by in categories: computing, encryption, internet, quantum physics, security

Definitely less than a decade and even less than 7 especially with China Quantum Satellite, Google’s plan release next year of a Quantum device, etc. I hope folks don’t still believe that we’re immune from a QC attack after 2025.


In a rare public speech, Greta Bossenmaier, chief of the Communications Security Establishment, said cryptologists at the CSE and around the world are racing to find new cryptographic standards before Y2Q — years to quantum — predicted for 2026.

She is the third senior CSE official this week to warn publicly of the threat quantum computing poses to widely used public key cryptography (PKC), protecting sensitive data transmissions from hackers, hacktivists, foreign state spies and other malicious actors.

Continue reading “Quantum computers will cripple encryption methods within decade, CSE head warns” »

Sep 20, 2016

How quantum computing could unpick encryption to reveal decades of online secrets

Posted by in categories: computing, encryption, quantum physics, security

QC will need to be on any IT, Security, and/ or tech connected product future state roadmap that spans a 5 + year period because the planning, funding, change management (retooling of resources), etc. will take time to plan & prepare not to mention all those internal & external dependencies and their own efforts around QC in the future because it truly would stink to see an AT&T, or HomeDepot, etc. that invested in their own QC compliant infrastructure suddenly attacked because an external source that they pull from is not QC.


The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.

Read more

Sep 20, 2016

Prepare for threat of quantum computing to encrypted data, Canadian conference told

Posted by in categories: business, computing, encryption, government, quantum physics, security

My suggestion; don’t be one of those companies and governments in the next 5yrs that waits until the 9th hour meanwhile others planned, invested, and executed properly so they’re not exposed like you are.


The race to create new cryptographic standards before super-fast quantum computers are built that can rip apart data protected by existing encryption methods isn’t going fast enough, two senior Canadian officials have warned a security conference.

“I think we are already behind,” Scott Jones, deputy chief of IT security at the Communications Security Establishment (CSE), responsible for securing federal information systems, told the fourth annual international workshop on quantum-safe cryptography in Toronto on Monday.

Continue reading “Prepare for threat of quantum computing to encrypted data, Canadian conference told” »

Sep 19, 2016

ISARA Corporation Readies Security Measures for the Quantum Age

Posted by in categories: computing, encryption, internet, quantum physics, security

Wireless security and internet standards experts release a complete quantum resistant toolkit for commercial use.

TORONTO, Sept. 19, 2016 /CNW/ — 4TH ETSI/IQC Workshop on Quantum-Safe Cryptography – ISARA Corporation today announced the availability of its ISARA Quantum Resistant (IQR) Toolkit. The toolkit helps software and hardware solution providers build robust commercial products that protect vulnerable infrastructure against the threat quantum computing already poses to widely-used security standards.

Similar to the Y2K crisis, the technology industry is facing a ‘Y2Q’ (years to quantum) challenge that has a limited timeline and requires significant work to ensure systems and information are properly protected. The massive processing power of quantum computers is such that, without integrating quantum resistant security solutions, all security that depends on existing standards is vulnerable.

Read more

Sep 16, 2016

Unbreakable Encryption: Work Has Begun on the World’s First Quantum Enigma Machine

Posted by in categories: encryption, quantum physics

The University of Rochester’s new quantum enigma machine is taking data encryption to a whole new level. This means shorter encryption keys and more difficult message interception.

Need a way to prevent the enemy from intercepting and deciphering your message?

American mathematician Claude Shannon, AKA the “father of information theory” had a way to do it. He came up with a binary system that could transmit messages under three conditions: the key is random, used only once, and is at least as long as the message itself. A long key, though, sounds like a pain.

Continue reading “Unbreakable Encryption: Work Has Begun on the World’s First Quantum Enigma Machine” »

Page 42 of 54First3940414243444546Last