Menu

Blog

Archive for the ‘encryption’ category: Page 9

Oct 4, 2023

Entangled Light from Multitasking Atoms Could Spark Quantum Breakthroughs

Posted by in categories: encryption, quantum physics

This surreal scenario is what would actually happen if the traffic light was a single atom illuminated by a laser beam, as recently shown experimentally by researchers in Berlin. They looked at the light scattered by an atom and saw that photons—the tiniest particles of light—arrived at the detector one at a time. The scientists blocked the brightest color they saw, and suddenly pairs of photons of two slightly different colors started arriving at their detector simultaneously. They reported their findings in Nature Photonics in July.

The reason for this counterintuitive effect is that single atoms are skilled little multitaskers. Through different underlying processes, they can scatter a variety of colors at the same time like a dangerous traffic light that shines all three colors at once. Yet because of quantum interference between these processes, an observer only sees one of the metaphorical traffic light’s colors at a time, preserving peace on the road.

This experiment also paves the way for novel quantum information applications. When the brightest color is blocked, the photons that pop up simultaneously are entangled with each other, behaving in sync even when they are separated over large distances. This provides a new tool for quantum communication and information processing in which entangled photon pairs can serve as distributed keys in quantum cryptography or store information in a quantum memory device.

Oct 3, 2023

Quantum Computers Could Crack Encryption Sooner Than Expected With New Algorithm

Posted by in categories: encryption, information science, mathematics, quantum physics, robotics/AI

One of the most well-established and disruptive uses for a future quantum computer is the ability to crack encryption. A new algorithm could significantly lower the barrier to achieving this.

Despite all the hype around quantum computing, there are still significant question marks around what quantum computers will actually be useful for. There are hopes they could accelerate everything from optimization processes to machine learning, but how much easier and faster they’ll be remains unclear in many cases.

One thing is pretty certain though: A sufficiently powerful quantum computer could render our leading cryptographic schemes worthless. While the mathematical puzzles underpinning them are virtually unsolvable by classical computers, they would be entirely tractable for a large enough quantum computer. That’s a problem because these schemes secure most of our information online.

Sep 14, 2023

Google has a new tool to outsmart authoritarian internet censorship

Posted by in categories: encryption, government, internet

Its Outline VPN can now be built directly into apps—making it harder for governments to block internet access, particularly during protests.

Google is launching new anti-censorship technology created in response to actions by Iran’s government during the 2022 protests there, hoping that it will increase access for internet users living under authoritarian regimes all over the world.

Jigsaw, a unit of Google that operates sort of like an internet freedom think tank and that creates related products, already offers a suite of anti-censorship tools including Outline, which provides free, open, and encrypted access to the internet through a VPN. Outline uses a protocol that makes it hard to… More.

Sep 9, 2023

Machine learning contributes to better quantum error correction

Posted by in categories: encryption, quantum physics, robotics/AI

Researchers from the RIKEN Center for Quantum Computing have used machine learning to perform error correction for quantum computers—a crucial step for making these devices practical—using an autonomous correction system that despite being approximate, can efficiently determine how best to make the necessary corrections.

The research is published in the journal Physical Review Letters.

In contrast to , which operate on bits that can only take the basic values 0 and 1, quantum computers operate on “qubits”, which can assume any superposition of the computational basis states. In combination with , another quantum characteristic that connects different qubits beyond classical means, this enables quantum computers to perform entirely new operations, giving rise to potential advantages in some computational tasks, such as large-scale searches, , and cryptography.

Sep 6, 2023

PeLEDs offer to make encryption cheaper and more sustainable

Posted by in categories: computing, encryption, quantum physics, sustainability

Perovskite light-emitting diode is used as the light source for a quantum random number generator used in encryption.

Encryption plays an important role in protecting information in this digital era, and a random number generator plays a vital part in this by providing keys that are used to both encrypt and unlock the information at the receiving end.

Now, a team of researchers has made use of light-emitting diodes made from the crystal-like material perovskite to devise a new type of Quantum Random Number Generator (QRNG) that can be used for encryption but also for betting and computer simulations.

Sep 5, 2023

What Is Polymorphic Malware?

Posted by in categories: cybercrime/malcode, encryption

O.o!!!


Polymorphic malware leverages an encryption key to alter its shape, signature, and behavioral pattern. Using a mutation engine and a self-propagated code strain, it encrypts its code and changes how physical files are created. Many traditional cybersecurity solutions that rely on signature-based detection—a technique in which security systems identify a malware based on its known characteristics—fail to recognize or detect polymorphic threats.

A polymorphic attack typically involves the following stages.

Continue reading “What Is Polymorphic Malware?” »

Sep 5, 2023

Better cybersecurity with quantum random number generation based on a perovskite light emitting diode

Posted by in categories: cybercrime/malcode, encryption, finance, quantum physics

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at Linköping University, Sweden. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.

In an increasingly connected world, cybersecurity is becoming increasingly important to protect not just the individual, but also, for example, national infrastructure and banking systems. And there is an ongoing race between hackers and those trying to protect information. The most common way to protect information is through encryption. So when we send emails, pay bills and shop online, the information is digitally encrypted.

To encrypt information, a is used, which can either be a computer program or the hardware itself. The random number generator provides keys that are used to both encrypt and unlock the information at the receiving end.

Aug 27, 2023

New technique opens door for encoding data on single photons

Posted by in categories: encryption, nanotechnology, quantum physics

Researchers at Los Alamos National Laboratory have successfully developed a new way to produce a specific type of photon that could prove critical for quantum data exchange, notably encryption. The specific kind of photons, called “circularly polarized light,” have thus far proved challenging to create and control, but this new technique makes the process easier and, importantly, cheaper. This was achieved, the team explains, by stacking two different, atomically thin materials to “twist” (polarize) photons in a predictable fashion.

Encoded, “twisted,” photons

Continue reading “New technique opens door for encoding data on single photons” »

Aug 25, 2023

Quantum And The Ultimate Weapon Inside The SBOM

Posted by in categories: cybercrime/malcode, encryption, government, internet, law enforcement, quantum physics

• Encryption and segmentation: These operate on the assumption some fraction of the network is already compromised. Restricting the reach and utility of any captured data and accessible networks will mitigate the damage even on breached systems.

• SBOM documentation: Regulatory compliance can be driven by industry organizations and the government, but it will take time to establish standards. SBOM documentation is an essential foundation for best practices.

If “democracy dies in darkness,” and that includes lies of omission in reporting, then cybersecurity suffers the same fate with backdoors. The corollary is “don’t roll your own crypto” even if well-intentioned. The arguments for weakening encryption to make law enforcement easier falls demonstrably flat, with TETRA just the latest example. Secrets rarely stay that way forever, and sensitive data is more remotely accessible than at any time in history. Privacy and global security affect us all, and the existence of these single points of failure in our cybersecurity efforts are unsustainable and will have unforeseeable consequences. We need to innovate and evolve the internet away from this model to have durable security assurances.

Aug 12, 2023

TunnelCrack: Two serious vulnerabilities in VPNs discovered, had been dormant since 1996

Posted by in categories: cybercrime/malcode, encryption, internet

The term “virtual private network,” or VPN for short, has become almost synonymous with “online privacy and security.” VPNs function by creating an encrypted tunnel through which your data may transit as it moves over the internet. They are designed to protect your privacy and make it impossible for anyone to monitor or access your activity while you are online. But what happens if the same instrument that was supposed to keep your privacy safe turns out to be a conduit for attacks? Introduce yourself to “TunnelCrack,” a frightening discovery that has sent shockwaves across the world of cybersecurity. Nian Xue from New York University, Yashaswi Malla and Zihang Xia from New York University Abu Dhabi, Christina Popper from New York University, and Mathy Vanhoef from KU Leuven University were the ones that carried out the study.

Two serious vulnerabilities in virtual private networks (VPNs) have been discovered by a research team. These vulnerabilities had been dormant since 1996. It is possible to leak and read user traffic, steal information, or even conduct attacks on user devices by exploiting these vulnerabilities, which are present in practically every VPN product across all platforms. TunnelCrack is a combination of two common security flaws found in virtual private networks (VPNs). Even though a virtual private network (VPN) is designed to safeguard all of the data that a user sends, these attacks are able to circumvent this security. An enemy, for example, may take advantage of the security flaws to steal information from users, read their communications, attack their devices, or even just spill it all. Regardless of the security protocol that is utilized by the VPN, the uncovered flaws may be exploited and used maliciously.

Page 9 of 58First678910111213Last