Archive for the ‘encryption’ category: Page 50
Aug 4, 2016
New way to model molecules
Posted by Karen Hurst in categories: biological, chemistry, computing, encryption, quantum physics, robotics/AI, solar power, sustainability
Magine a future in which hyper-efficient solar panels provide renewable sources of energy, improved water filters quickly remove toxins from drinking water, and the air is scrubbed clean of pollution and greenhouse gases. That could become a reality with the right molecules and materials.
Scientists from Harvard and Google have taken a major step toward making the search for those molecules easier, demonstrating for the first time that a quantum computer could be used to model the electron interactions in a complex molecule. The work is described in a new paper published in the journal Physical Review X by Professor Alán Aspuru-Guzik from the Department of Chemistry and Chemical Biology and several co-authors.
“There are a number of applications that a quantum computer would be useful for: cryptography, machine learning, and certain number-theory problems,” Aspuru-Guzik said. “But one that has always been mentioned, even from the first conceptions of a quantum computer, was to use it to simulate matter. In this case, we use it to simulate chemistry.”
Aug 2, 2016
Quantum computing is getting closer
Posted by Karen Hurst in categories: encryption, information science, quantum physics, supercomputing
Electronic computer technology has moved from valves to transistors to progressively more complex integrated circuits and processor designs, with each change bringing higher levels of performance. Now the advent of quantum computers promises a huge step increase in processor performance to solve certain types of problems.
Quantum computers are much faster than the world’s fastest supercomputers for some applications. In 1994 Peter Shor, an applied mathematician at Bell Laboratories, gave the encryption world a shock when he demonstrated an algorithm showing that quantum computers could threaten conventional prime number based encryption methods.
If an adversary conducts successful espionage raids on encrypted information stored in present technology computer installations, possibly through a compromised or issue-motivated individual who transfers it to portable media, it could become vulnerable to decryption by that rival’s quantum computers.
Aug 2, 2016
Pass the hash for peace, love and security in the quantum computing age
Posted by Karen Hurst in categories: computing, encryption, quantum physics, security
Excellent write up on a paper submitted to the International Association for Cryptologic Research, by a group of UK and Belgian researchers are offering up a dig-sig scheme to assist in the addressing of Digital signatures (one of the fundamental parts of cryptography) in a post-quantum world. Expect the heat to rise on QC security as China’s launch date nears for the new Quantum Satellite.
Boffins smokin’ idea to share parts of keys to cook quantum-proof crypto.
Jul 30, 2016
Crystal-Powered Quantum Entanglement Satellite Will Test Quantum Communications
Posted by Karen Hurst in categories: encryption, quantum physics, space
A Chinese satellite launching in August would be the first to bring a worldwide quantum-encrypted communication network to reality.
Jul 29, 2016
China’s new quantum satellite paves the way for unhackable satellite internet
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites
All that I can say is “WOW!”
CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.
The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.
Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »
Jul 20, 2016
Here’s How Google Is Racing to Protect You From Quantum Hackers
Posted by Karen Hurst in categories: computing, encryption, quantum physics
This is a true question especially since China launches their new Quantum Satellite communications in the next few weeks. I do believe some will be protected; however, the broader majority will be a stretch.
The encryption of today will be broken by the computers of tomorrow, even retroactively.
Continue reading “Here’s How Google Is Racing to Protect You From Quantum Hackers” »
Jul 19, 2016
Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics
Luv it; more believers.
Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”
While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”
Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »
Jul 14, 2016
Transhumanist Terminology
Posted by Shailesh Prasad in categories: bioengineering, computing, cryonics, cyborgs, encryption, existential risks, food, genetics, information science, life extension, nanotechnology, neuroscience, quantum physics, robotics/AI, singularity, transhumanism
Transhuman Terminology.
ADHOCRACY
AEONOMICS
A-LIFE
AGORIC SYSTEM
AI-COMPLETE ALEPH ALGERNON AMORTALIST ARACHNIOGRAPHY ARCH-ANARCHY ARCOLOGY ARROW IMPOSSIBILITY THEOREM ARTILECT ASEX ASIMORT ASIMOV ASSEMBLER ATHANASIA ATHANOPHY ATHEOSIS AUGMENT AUTOEVOLUTIONIST AUTOMATED ENGINEERING AUTOMORPHISM AUTOPOTENT AUTOSCIENT BABY UNIVERSE BASEMENT UNIVERSE BEAN DIP CATASTROPHE BEANSTALK BEKENSTEIN BOUND BERSERKER BETELGEUSE-BRAIN BIG CRUNCH BINERATOR BIOCHAUVINISM BIOLOGICAL FUNDAMENTALISM BIONICS BIONOMICS BIOPHILIAC BIOSTASIS B-LIFE BLIGHT BLIND UPLOADING BLUE GOO BOGOSITY FILTER BORGANISM BREAKEVEN POINT BROADCATCHING BRUTE FORCE UPLOADING BUSH ROBOT CALCUTTA SYNDROME CALM TECHNOLOGY CALORIE RESTRICTION CASIMIR EFFECT CEREBROSTHESIS CHINESE ROOM CHRONONAUTS CHURCH-TURING THESIS COBOTS COMPUFORM COMPUTRONIUM CONCENTRATED INTELLIGENCE CONSILIENCE CONNECTIONISM CONTELLIGENCE CONTINUITY IDENTITY THEORY COSMYTHOLOGY CRYOBIOLOGY CRYOCRASTINATE CRYOGENICS CRYONICS CRYONIC SUSPENSION CRYPTO ANARCHY CRYPTOCOSMOLOGY CYBERCIDE CYBERFICTION CYBERGNOSTICISM CYBERIAN CYBERNATE/CYBERNIZE CYBERSPACE/CYBERMATRIX CYBRARIAN CYPHERPUNK DEANIMALIZE DEATH FORWARD DEATHISM DEEP ANARCHY DEFLESH DIGITAL PSEUDONYM DIAMONDOID DISASSEMBLER DISASTERBATION DISTRIBUTED INTELLIGENCE DIVERGENT TRACK HYPOTHESIS DIVERSITY IQ DIVIDUALS DOOMSDAY ARGUMENT DOWNLOAD DRYWARE DUBIFIER DYSON SPHERE ECOCALYPSE ECTOGENESIS
EMBRYOMEME
EMULATION
ENHANCED REALITY
ENVIROCAPITALISM
EPHEMERALISTS
E-PRIME
ESCALATORLOGY
THE ETERNAL LIFE POSTULATE
EUPSYCHIA
EUTHENICS
EVOLUTIONARILY STABLE STRATEGY (ESS)
EVOLUTURE
EXCONOMICS
EXES
EXFORMATION
EXISTENTIAL TECHNOLOGY
EXOPHOBIA
EXOSELF
EXTROPIAN
EXTROPIATE
EXTROPIC
EXTROPOLIS
EXTROPY
FACULTATIVE ANAGOROBE
FAR EDGE PARTY
THE FERMI PARADOX
FEMTOTECHNOLOGY
FLATLANDER
FLUIDENTITY
FOGLET
FORK
FREDKIN’S PARADOX
FUNCTIONAL SOUP
FUTIQUE
FUTURE SHOCK
GALAXY BRAIN
GAUSSIAN
GENEGENEERING
GENETIC ALGORITHM
GENIE
GREEN GOO
GÖDEL’S THEOREM
GOLDEN GOO
GREAT FILTER, THE
GREY GOO
GUY FAWKES SCENARIO
HALLUCINOMEMIC
HIVE COMPUTING
HOMORPH
HPLD
HYPERTEXT
HYPONEIRIA
HYPOTECH
Jul 13, 2016
Quantum is Coming
Posted by Karen Hurst in categories: computing, encryption, quantum physics
Google to run Chrome Canary experimentally for the next two years to address post-quantum cryptography.
Alphabet’s forthcoming Chrome Canary browser is just the “canary” in the coalmine—quantum computing is coming faster than you might think.