Archive for the ‘encryption’ category: Page 23

Aug 24, 2016

Will superfast ‘quantum’ computers mean the end of unbreakable encryption?

Posted by in categories: computing, encryption, quantum physics

Not worried today; but would worry in the next 5 yrs for sure.

A new type of computer means we’ll need a new way to make our data secure.

Read more

Aug 22, 2016

World’s most efficient AES crypto processing technology for IoT devices developed

Posted by in categories: encryption, energy, finance, internet

Energy efficient IoT — proven to reduce energy usage by 50% via new technique for compressing the computations of encryption and decryption operations known as Galois field arithmetic operations.

Our research group has discovered a new technique for compressing the computations of encryption and decryption operations known as Galois field arithmetic operations, and has succeeded in developing the world’s most efficient Advanced Encryption Standard (AES) cryptographic processing circuit, whose energy consumption is reduced by more than 50% of the current level. With this achievement, it has become possible to include encryption technology in information and communication technology (ICT) devices that have tight energy constraints, greatly enhancing the safety of the next-generation Internet of Things (IoT). This result was announced on August 19, 2016 during the Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016) hosted by the International Association for Cryptologic Research (IACR) in Santa Barbara, USA.

It is currently very common to exchange important personal or financial information over the Internet through ICT devices. Cryptographic techniques are used inside these devices to protect important information. In next-generation networks such as the IoT, which has attracted attention in recent years, it is expected that myriad devices will be connected to the network. Hence, it will be necessary to have built-in encryption technology in these connected devices to prevent malicious attacks. However, many battery or cell-driven devices with tight energy constraints are also included in the IoT and running energy-consuming encryption processes on these is a big challenge. One of the most widely used international standard encryption methods is AES. Since this is used in areas such as wireless LANs, it is very important for practical reasons to design energy-saving AES cryptographic processing.

Continue reading “World’s most efficient AES crypto processing technology for IoT devices developed” »

Aug 22, 2016

Scientists Inspired by Skin to Find a Way To Encrypt Messages

Posted by in category: encryption

Photo credit: ShutterstockThis is certainly a much better idea than a message that self-destructs after you read it (we’re looking at you, Inspector Gadget).Researchers.

Read more

Aug 19, 2016

QUESS and Quantum Communications

Posted by in categories: cybercrime/malcode, encryption, government, internet, quantum physics, space

Excellent write up on QUESS; and yesterday we saw that the first set of code was transmitted successfully which means so far success. However, many are asking when will the US respond about our own efforts around our own efforts of a Quantum satellite and our own progress around improving the net infrastructure to ensure we’re not a sitting duck for government backed hackers. Granted we have been operating for many years a version of a Quantum Internet at Los Alamos; however, we need to expand and accelerate the efforts around the Quantum Internet restructuring.

In mid August China launched “QUESS” (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of “quantum communications” which is supposed to be hack-proof, through the use of “quantum entanglement”. This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information.

According the Chinese scientists involved in the project, quantum encryption is secure against any kind of computing power because information encoded in a quantum particle is destroyed as soon as it is measured. (According to Tibor Molnar a scientist at the University of Sydney), the only way to ‘observe’ a photon is to have it interact with (a) an electron, or (b) an electromagnetic field. Either of these interactions will cause the photon to “decohere” – i.e., interfere with it in a way that will be apparent to the intended recipient.

Continue reading “QUESS and Quantum Communications” »

Aug 16, 2016

Everything you need to know about the NSA hack (but were afraid to Google)

Posted by in categories: cybercrime/malcode, encryption, information science, privacy

A day in the life of an NSA Hacker.

In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”

They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.

Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »

Aug 15, 2016

China launches ‘hack-proof’ quantum satellite in world first

Posted by in categories: encryption, quantum physics, security, space

This is so exciting.

The transfer of data using quantum communications is considered impenetrable due to a particle phenomenon known as quantum entanglement, with eavesdroppers unable to monitor the transfer without altering the quantum state and thereby being detected. In theory, two parties can communicate in secret by sharing an encryption key encoded in a string of photons.

China’s big-spending quantum research initiative, part of Beijing’s broader multi-billion dollar strategy to overtake the West in science and space research, is being closely watched in global scientific research and security circles, with groups from Canada, Japan, Singapore and Europe also planning their own quantum space experiments.

Continue reading “China launches ‘hack-proof’ quantum satellite in world first” »

Aug 10, 2016

Quantum computing and cryptocurrencies: Are Steemit and bitcoin safe?

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, quantum physics, security

Article repeats a lot of the knowns on QC such as bit v. Qubit; and finally provides some good info on pros and cons of Bitcoin and Lamport signatures technique with QC. However, the author didn’t seem to mention any of the work that D-Wave for example is doing with Block chaining. Also, I saw no mention of the work by Oxford on the logic gate which improve both the information processing performance and the security of information transmissions.

In a classical computer bits are used that can either be 0 or 1. In a quantum computer these bits are replaced with Qubits (quantum bits). These Qubits can be 0 or 1, or both at the same time. This is caused by a phenomenon in the quantum realm called superposition. At scales the size of an atom and small molecules, the spin of particles is not determined until it is observed. A pair of Qubits can be in any quantum superposition of 4 states, and three Qubits in any superposition of 8 states. In general, a quantum computer with n Qubits can be in a superposition of up to 2^n different states simultaneously (this compares to a normal computer that can only be in one of these 2^n states at any one time). Because of this, a quantum computer is able to perform computations at the same time, while classical computers perform computations one at a time.

Continue reading “Quantum computing and cryptocurrencies: Are Steemit and bitcoin safe?” »

Aug 8, 2016

Researchers Made the First Quantum Enigma Machine

Posted by in categories: encryption, quantum physics

A quantum enigma machine is theoretical device that is able to use photons to encrypt messages using keys that are shorter than the message itself—and now it’s real.

Read more

Aug 4, 2016

New way to model molecules

Posted by in categories: biological, chemistry, computing, encryption, quantum physics, robotics/AI, solar power, sustainability

Magine a future in which hyper-efficient solar panels provide renewable sources of energy, improved water filters quickly remove toxins from drinking water, and the air is scrubbed clean of pollution and greenhouse gases. That could become a reality with the right molecules and materials.

Scientists from Harvard and Google have taken a major step toward making the search for those molecules easier, demonstrating for the first time that a quantum computer could be used to model the electron interactions in a complex molecule. The work is described in a new paper published in the journal Physical Review X by Professor Alán Aspuru-Guzik from the Department of Chemistry and Chemical Biology and several co-authors.

“There are a number of applications that a quantum computer would be useful for: cryptography, machine learning, and certain number-theory problems,” Aspuru-Guzik said. “But one that has always been mentioned, even from the first conceptions of a quantum computer, was to use it to simulate matter. In this case, we use it to simulate chemistry.”

Continue reading “New way to model molecules” »

Aug 2, 2016

Quantum computing is getting closer

Posted by in categories: encryption, information science, quantum physics, supercomputing

Electronic computer technology has moved from valves to transistors to progressively more complex integrated circuits and processor designs, with each change bringing higher levels of performance. Now the advent of quantum computers promises a huge step increase in processor performance to solve certain types of problems.

Quantum computers are much faster than the world’s fastest supercomputers for some applications. In 1994 Peter Shor, an applied mathematician at Bell Laboratories, gave the encryption world a shock when he demonstrated an algorithm showing that quantum computers could threaten conventional prime number based encryption methods.

If an adversary conducts successful espionage raids on encrypted information stored in present technology computer installations, possibly through a compromised or issue-motivated individual who transfers it to portable media, it could become vulnerable to decryption by that rival’s quantum computers.

Continue reading “Quantum computing is getting closer” »

Page 23 of 33First2021222324252627Last