Menu

Blog

Archive for the ‘encryption’ category: Page 50

Aug 8, 2016

Researchers Made the First Quantum Enigma Machine

Posted by in categories: encryption, quantum physics

A quantum enigma machine is theoretical device that is able to use photons to encrypt messages using keys that are shorter than the message itself—and now it’s real.

Read more

Aug 4, 2016

New way to model molecules

Posted by in categories: biological, chemistry, computing, encryption, quantum physics, robotics/AI, solar power, sustainability

Magine a future in which hyper-efficient solar panels provide renewable sources of energy, improved water filters quickly remove toxins from drinking water, and the air is scrubbed clean of pollution and greenhouse gases. That could become a reality with the right molecules and materials.

Scientists from Harvard and Google have taken a major step toward making the search for those molecules easier, demonstrating for the first time that a quantum computer could be used to model the electron interactions in a complex molecule. The work is described in a new paper published in the journal Physical Review X by Professor Alán Aspuru-Guzik from the Department of Chemistry and Chemical Biology and several co-authors.

“There are a number of applications that a quantum computer would be useful for: cryptography, machine learning, and certain number-theory problems,” Aspuru-Guzik said. “But one that has always been mentioned, even from the first conceptions of a quantum computer, was to use it to simulate matter. In this case, we use it to simulate chemistry.”

Read more

Aug 2, 2016

Quantum computing is getting closer

Posted by in categories: encryption, information science, quantum physics, supercomputing

Electronic computer technology has moved from valves to transistors to progressively more complex integrated circuits and processor designs, with each change bringing higher levels of performance. Now the advent of quantum computers promises a huge step increase in processor performance to solve certain types of problems.

Quantum computers are much faster than the world’s fastest supercomputers for some applications. In 1994 Peter Shor, an applied mathematician at Bell Laboratories, gave the encryption world a shock when he demonstrated an algorithm showing that quantum computers could threaten conventional prime number based encryption methods.

If an adversary conducts successful espionage raids on encrypted information stored in present technology computer installations, possibly through a compromised or issue-motivated individual who transfers it to portable media, it could become vulnerable to decryption by that rival’s quantum computers.

Read more

Aug 2, 2016

Pass the hash for peace, love and security in the quantum computing age

Posted by in categories: computing, encryption, quantum physics, security

Excellent write up on a paper submitted to the International Association for Cryptologic Research, by a group of UK and Belgian researchers are offering up a dig-sig scheme to assist in the addressing of Digital signatures (one of the fundamental parts of cryptography) in a post-quantum world. Expect the heat to rise on QC security as China’s launch date nears for the new Quantum Satellite.


Boffins smokin’ idea to share parts of keys to cook quantum-proof crypto.

Read more

Jul 30, 2016

Crystal-Powered Quantum Entanglement Satellite Will Test Quantum Communications

Posted by in categories: encryption, quantum physics, space

A Chinese satellite launching in August would be the first to bring a worldwide quantum-encrypted communication network to reality.

Read more

Jul 29, 2016

China’s new quantum satellite paves the way for unhackable satellite internet

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites

All that I can say is “WOW!”


CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.

The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.

Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »

Jul 20, 2016

Here’s How Google Is Racing to Protect You From Quantum Hackers

Posted by in categories: computing, encryption, quantum physics

This is a true question especially since China launches their new Quantum Satellite communications in the next few weeks. I do believe some will be protected; however, the broader majority will be a stretch.


The encryption of today will be broken by the computers of tomorrow, even retroactively.

Continue reading “Here’s How Google Is Racing to Protect You From Quantum Hackers” »

Jul 19, 2016

Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Luv it; more believers.


Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”

While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”

Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »

Jul 14, 2016

Transhumanist Terminology

Posted by in categories: bioengineering, computing, cryonics, cyborgs, encryption, existential risks, food, genetics, information science, life extension, nanotechnology, neuroscience, quantum physics, robotics/AI, singularity, transhumanism

Transhuman Terminology.

ADHOCRACY
AEONOMICS
A-LIFE
AGORIC SYSTEM

AI-COMPLETE ALEPH ALGERNON AMORTALIST ARACHNIOGRAPHY ARCH-ANARCHY ARCOLOGY ARROW IMPOSSIBILITY THEOREM ARTILECT ASEX ASIMORT ASIMOV ASSEMBLER ATHANASIA ATHANOPHY ATHEOSIS AUGMENT AUTOEVOLUTIONIST AUTOMATED ENGINEERING AUTOMORPHISM AUTOPOTENT AUTOSCIENT BABY UNIVERSE BASEMENT UNIVERSE BEAN DIP CATASTROPHE BEANSTALK BEKENSTEIN BOUND BERSERKER BETELGEUSE-BRAIN BIG CRUNCH BINERATOR BIOCHAUVINISM BIOLOGICAL FUNDAMENTALISM BIONICS BIONOMICS BIOPHILIAC BIOSTASIS B-LIFE BLIGHT BLIND UPLOADING BLUE GOO BOGOSITY FILTER BORGANISM BREAKEVEN POINT BROADCATCHING BRUTE FORCE UPLOADING BUSH ROBOT CALCUTTA SYNDROME CALM TECHNOLOGY CALORIE RESTRICTION CASIMIR EFFECT CEREBROSTHESIS CHINESE ROOM CHRONONAUTS CHURCH-TURING THESIS COBOTS COMPUFORM COMPUTRONIUM CONCENTRATED INTELLIGENCE CONSILIENCE CONNECTIONISM CONTELLIGENCE CONTINUITY IDENTITY THEORY COSMYTHOLOGY CRYOBIOLOGY CRYOCRASTINATE CRYOGENICS CRYONICS CRYONIC SUSPENSION CRYPTO ANARCHY CRYPTOCOSMOLOGY CYBERCIDE CYBERFICTION CYBERGNOSTICISM CYBERIAN CYBERNATE/CYBERNIZE CYBERSPACE/CYBERMATRIX CYBRARIAN CYPHERPUNK DEANIMALIZE DEATH FORWARD DEATHISM DEEP ANARCHY DEFLESH DIGITAL PSEUDONYM DIAMONDOID DISASSEMBLER DISASTERBATION DISTRIBUTED INTELLIGENCE DIVERGENT TRACK HYPOTHESIS DIVERSITY IQ DIVIDUALS DOOMSDAY ARGUMENT DOWNLOAD DRYWARE DUBIFIER DYSON SPHERE ECOCALYPSE ECTOGENESIS

EMBRYOMEME
EMULATION
ENHANCED REALITY
ENVIROCAPITALISM
EPHEMERALISTS
E-PRIME
ESCALATORLOGY
THE ETERNAL LIFE POSTULATE
EUPSYCHIA
EUTHENICS
EVOLUTIONARILY STABLE STRATEGY (ESS)
EVOLUTURE
EXCONOMICS
EXES
EXFORMATION
EXISTENTIAL TECHNOLOGY
EXOPHOBIA
EXOSELF
EXTROPIAN
EXTROPIATE
EXTROPIC
EXTROPOLIS
EXTROPY
FACULTATIVE ANAGOROBE
FAR EDGE PARTY
THE FERMI PARADOX
FEMTOTECHNOLOGY
FLATLANDER
FLUIDENTITY
FOGLET
FORK
FREDKIN’S PARADOX
FUNCTIONAL SOUP
FUTIQUE
FUTURE SHOCK
GALAXY BRAIN
GAUSSIAN
GENEGENEERING
GENETIC ALGORITHM
GENIE
GREEN GOO
GÖDEL’S THEOREM
GOLDEN GOO
GREAT FILTER, THE
GREY GOO
GUY FAWKES SCENARIO
HALLUCINOMEMIC
HIVE COMPUTING
HOMORPH
HPLD
HYPERTEXT
HYPONEIRIA
HYPOTECH

Continue reading “Transhumanist Terminology” »

Jul 13, 2016

Quantum is Coming

Posted by in categories: computing, encryption, quantum physics

Google to run Chrome Canary experimentally for the next two years to address post-quantum cryptography.


Alphabet’s forthcoming Chrome Canary browser is just the “canary” in the coalmine—quantum computing is coming faster than you might think.

Read more

Page 50 of 59First4748495051525354Last