БЛОГ

Archive for the ‘encryption’ category: Page 22

Sep 12, 2016

Toward Unbreakable Quantum Encryption for Everyone

Posted by in categories: cybercrime/malcode, encryption, government, military, quantum physics

China hasn’t kept it a secret for many months now about the Chinese government desire to have an unbreakable quantum communication networks which is why they launched their Quantum Satellite (the QSS program) last month. What the real story is how QSS is enabling the military to have a leading edge through technologies such as the Quantum Radar capabilities, or using Quantum communications to prevent hacking of their systems while having the ability to hack others. And, this is what has actually been published publically to boot.


Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

European researchers at the Institute of Photonic Sciences (ICFO), Institució Catalana de Recerca (ICREA), and other research labs, have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

Continue reading “Toward Unbreakable Quantum Encryption for Everyone” »

Sep 12, 2016

Chip will bring the highest level of encryption possible to any device

Posted by in categories: computing, encryption, quantum physics

Engineers at The Institute of Photonic Sciences in Barcelona, Spain have developed a fast random number generator based on a quantum mechanical process.

Read more

Sep 8, 2016

New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device

Posted by in categories: computing, encryption, mobile phones, quantum physics, security

Nice.


“We’ve managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially.”

Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

Continue reading “New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device” »

Sep 3, 2016

The World’s First 1000-Core Processor Was Just Created

Posted by in categories: computing, encryption

UC Davis has developed the KiloCore, a CPU that has 1000 cores suited for parallel tasks like encryption, crunching scientific data, and encoding videos.

Processor technology has certainly come far, with a host of different materials and techniques being implemented to increase speed and power. And now, we have a new kind of development. A team of scientists at UC Davis made the world’s first 1000-core processor.

The team has unveiled the KiloCore, a CPU that has 1000 cores and all the speed that come with that kind of power. The chip has a maximum computation rate of 1.78 trillion instructions per second and contains 621 million transistors.

Continue reading “The World’s First 1000-Core Processor Was Just Created” »

Aug 31, 2016

China’s Quantum Cryptography System

Posted by in categories: computing, encryption, quantum physics

Andrew may wish to research some of the happenings in QC a little more because things are progressing quite quickly in QC than 6 months ago.


It seems that quantum communication could negate one of the big selling points of quantum computers even before they arrive on the scene.

Read more

Aug 30, 2016

Forget Passwords, This Device Locks Your PC Based On Your Proximity

Posted by in categories: computing, encryption, security

The Gatekeeper keychain uses bluetooth 4.0 technology with an AES encryption method to automatically lock your computer when you walk away.

Every office has that one coworker—that person who sneaks on to your computer and posts absurd messages on your various social media pages. Fortunately, computers come with handy security features and are generally password protected.

Continue reading “Forget Passwords, This Device Locks Your PC Based On Your Proximity” »

Aug 27, 2016

How quantum computers will change the world of hacking

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

There is a computing revolution coming, although nobody knows exactly when. What are known as “quantum computers” will be substantially more powerful than the devices we use today, capable of performing many types of computation that are impossible on modern machines.

But while faster computers are usually welcome, there are some computing operations that we currently rely on being hard (or slow) to perform.

Specifically, we rely on the fact that there are some codes that computers can’t break – or at least it would take them too long to break to be practical. Encryption algorithms scramble data into a form that renders it unintelligible to anyone that does not possess the necessary decryption key (normally a long string of random numbers).

Continue reading “How quantum computers will change the world of hacking” »

Aug 26, 2016

China Sets New Tone in Drafting Cybersecurity Rules

Posted by in categories: business, cybercrime/malcode, encryption, government, information science

I have been seeing this for the recent weeks; I find it interesting and another step in China’s own move to be a global leader of tech. Could be either good or bad in the longer term.


China is taking a more inclusive tack in instituting cybersecurity standards for foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over the controls.

The committee under the government’s powerful cyberspace administration is in charge of defining cybersecurity standards. For the first time, the body earlier this year allowed select foreign companies— Microsoft Corp. MSFT −0.39 %, Intel Corp. INTC 0.43 %, Cisco Systems Inc. CSCO 0.14 % and International Business Machines Corp.—to take an active part in drafting rules, rather than participating simply as observers, said people familiar with the discussions.

Continue reading “China Sets New Tone in Drafting Cybersecurity Rules” »

Aug 25, 2016

Financial Networking Company Prepares for?Post-Quantum World

Posted by in categories: cybercrime/malcode, encryption, finance, privacy, quantum physics

Interesting read on IPC Systems Inc. is partnering with U.K. startup Post-Quantum to (in their own words) “offer its clients encryption, biometric authentication and a distributed-ledger record-keeping system that the software company says is designed to resist hacking — even by a quantum computer.” — I will be researching this more.


(Bloomberg) — When it comes to cybersecurity, no one can accuse IPC Systems Inc., the New Jersey-based company that builds communications networks for trading firms and financial markets, of preparing to fight the last war.

Read more

Aug 25, 2016

So your company’s been hacked: How to handle the aftermath

Posted by in categories: cybercrime/malcode, education, encryption

I can honestly say that many of us working with QC hasn’t warned folks for a while on the hacking risks around QC going against even today’s most sophisticated encryption models & methods; and to be developing a strategy in how to best handle this risk. With last weeks launch by China has shown the world that we are definitely not a decade away from this risk.


Education and planning are key, cyber-security expert Tyler Cohen Wood says.

Read more

Page 22 of 33First1920212223242526Last