Toggle light / dark theme

PRESS RELEASE — After over a year of evaluation, NIST has selected 14 candidates for the second round of the Additional Digital Signatures for the NIST PQC Standardization Process. The advancing digital signature algorithms are:

NIST Internal Report (IR) 8528 describes the evaluation criteria and selection process. Questions may be directed to [email protected]. NIST thanks all of the candidate submission teams for their efforts in this standardization process as well as the cryptographic community at large, which helped analyze the signature schemes.

Moving forward, the second-round candidates have the option of submitting updated specifications and implementations (i.e., “tweaks”). NIST will provide more details to the submission teams in a separate message. This second phase of evaluation and review is estimated to last 12–18 months.

A team of Chinese researchers, led by Wang Chao from Shanghai University, has demonstrated that D-Wave’s quantum annealing computers can crack encryption methods that safeguard sensitive global data.

This breakthrough, published in the Chinese Journal of Computers, emphasizes that quantum machines are closer than expected to threatening widely used cryptographic systems, including RSA and Advanced Encryption Standard (AES).

The research team’s experiments focused on leveraging D-Wave’s quantum technology to solve cryptographic problems. In their paper, titled “Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage,” the researchers explained how quantum annealing could transform cryptographic attacks into combinatorial optimization problems, making them more manageable for quantum systems.

#ibm #heron #quantumcomputer #quantumphysics #softwareengineering #developers #programming #artificialintelligence #ai #neuralnetworks #machinelearning #explorepage #financialmarkets #cryptography #business #productdevelopment #researchanddevelopment #computerscience #qubit #engineering #technology #startups #science #mathematics #innovation #invention

(NEXSTAR) — The Internet Archive, a popular digital library known for its Wayback Machine, was hacked and suffered a data breach that reportedly exposed 31 million user accounts.

Founder Brewster Kahle confirmed in a post on the social media platform X that a cyberattack on Tuesday knocked the website offline. He also said that usernames, emails, and encrypted passwords had been compromised.

“Services are currently stopped to upgrade internal systems,” Kahle wrote in a Thursday update. “We are working to restore services as quickly and safely as possible. Sorry for this disruption.”

Quantum entanglement is a fascinating feature of quantum physics—the theory of the very small. If two particles are quantum-entangled, the state of one particle is tied to that of the other, no matter how far apart the particles are. This mind-bending phenomenon, which has no analog in classical physics, has been observed in a wide variety of systems and has found several important applications, such as quantum cryptography and quantum computing.

Researchers Propose a #Smaller, more #Noise-#Tolerant #Quantum #Circuit for #Cryptography.

MIT researchers new algorithm is as fast as Regev’s, requires fewer qubits, and has a higher tolerance to quantum noise, making it more feasible to implement…


The most recent email you sent was likely encrypted using a tried-and-true method that relies on the idea that even the fastest computer would be unable to efficiently break a gigantic number into factors.

Quantum computers, on the other hand, promise to rapidly crack complex cryptographic systems that a classical computer might never be able to unravel. This promise is based on a quantum factoring algorithm proposed in 1994 by Peter Shor, who is now a professor at MIT.

But while researchers have taken great strides in the last 30 years, scientists have yet to build a quantum computer powerful enough to run Shor’s algorithm.

A flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan engineers.

“It’s one of the first times where mechanical materials use magnetic fields for system-level encryption, information processing and computing. And unlike some earlier mechanical computers, this device can wrap around your wrist,” said Joerg Lahann, the Wolfgang Pauli Collegiate Professor of Chemical Engineering and co-corresponding author of the study.

The researchers’ screen could be used wherever light and power sources are cumbersome or undesirable, including clothing, stickers, ID badges, barcodes and e-book readers. A single screen can reveal an image for everyone to see when placed near a standard magnet or a private encrypted image when placed over a complex array of magnets that acts like an encryption key.

Researchers at Leibniz University Hannover have developed a technology for transmitting entangled photons through optical fibers, which could enable the integration of quantum and conventional internet, promising enhanced security and efficient use of existing infrastructure.

A team of four researchers from the Institute of Photonics at Leibniz University Hannover has developed an innovative transmitter-receiver system for transmitting entangled photons via optical fiber.

This breakthrough could enable the next generation of telecommunications technology, the quantum Internet, to be routed via optical fibers. The quantum Internet promises eavesdropping-proof encryption methods that even future quantum computers cannot decrypt, ensuring the security of critical infrastructure.