Archive for the ‘encryption’ category: Page 29

Jul 6, 2019

Researchers use kirigami to spin terahertz rays

Posted by in categories: biotech/medical, encryption

CHICAGO, July 2 (Xinhua) — With a light-spinning device inspired by the Japanese art of paper cutting, researchers at the University of Michigan (UM) have detected microscopic twists in the internal structure of plant and animal tissue without harmful X-rays.

The approach is the first that can fully rotate terahertz radiation in real time, and could open new dimensions in medical imaging, encrypted communications and cosmology, according to a news release posted on UM’s website on Monday.

With an eye to exploring how chirality may help distinguish tissues, the researchers gathered everyday biological materials to look for differences in the absorption of clockwise- or counter-clockwise-rotating radiation in the terahertz spectrum. They studied a maple leaf, a dandelion flower, pork fat and the wing case of an iridescent beetle.

Jun 30, 2019

Quantum Computing Vs. Blockchain: Impact on Cryptography

Posted by in categories: bitcoin, computing, encryption, quantum physics

Quantum computers will not kill blockchain, but they might trigger fundamental changes in underlying cryptography.

Jun 26, 2019

NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto ‘Semifinals’

Posted by in categories: computing, encryption, information science, mathematics, quantum physics

The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete.

As the latest step in its program to develop effective defenses, the National Institute of Standards and Technology (NIST) has winnowed the group of potential encryption tools—known as cryptographic algorithms—down to a bracket of 26. These algorithms are the ones NIST mathematicians and computer scientists consider to be the strongest candidates submitted to its Post-Quantum Cryptography Standardization project, whose goal is to create a set of standards for protecting electronic information from attack by the computers of both tomorrow and today.

“These 26 algorithms are the ones we are considering for potential standardization, and for the next 12 months we are requesting that the cryptography community focus on analyzing their performance,” said NIST mathematician Dustin Moody. “We want to get better data on how they will perform in the real world.”

Jun 7, 2019

The New Era of Exponential Encryption

Posted by in categories: encryption, information science

In their book “Era of Exponential Encryption — Beyond Cryptographic Routing” the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms. Renewing a key several times — within the dedicated session with “cryptographic calling” — has forwarded the term of “perfect forward secrecy” to “instant perfect forward secrecy” (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent — prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS. And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic in.

Read more

Jun 6, 2019

How Peter Shor’s Algorithm is Destined to Put an End to Modern Encryption

Posted by in categories: computing, encryption, information science, internet, quantum physics

RSA Encryption is an essential safeguard for our online communications. It was also destined to fail even before the Internet made RSA necessary, thanks the work of Peter Shor, whose algorithm in 1994 proved quantum computers could actually be used to solve problems classical computers could not.

Read more

Jun 6, 2019

Exponential Ciphers | Cipher | Public Key Cryptography

Posted by in category: encryption

Number Theory

Read more

Jun 3, 2019

Why Quantum Computing Requires Quantum Cryptography

Posted by in categories: computing, encryption, internet, quantum physics

Quantum computing is cool, but you know what would be extra awesome — a quantum internet. In fact if we want the first we’ll need the latter. And the first step to the quantum internet is quantum cryptography.

Aired: 05/31/19

Read more

May 31, 2019

WhatsApp Has Exposed Phones To Israeli Spyware — Update Your Apps Now

Posted by in categories: cybercrime/malcode, encryption, mobile phones

WhatsApp has admitted to a major cybersecurity breach that has enabled both iPhone and Android devices to be targeted with spyware from Israel’s NSO. This is a major breach for WhatsApp, with the product’s encrypted voice calls seen as a secure alternative to standard calls.

Read more

May 31, 2019

How a quantum computer could break 2048-bit RSA encryption in 8 hours

Posted by in categories: computing, encryption, quantum physics

A new study shows that quantum technology will catch up with today’s encryption standards much sooner than expected. That should worry anybody who needs to store data securely for 25 years or so.

Read more

May 16, 2019

Holographic imaging of electromagnetic fields using electron-light quantum interference

Posted by in categories: encryption, energy, holograms, quantum physics

In conventional holography a photographic film can record the interference pattern of monochromatic light scattered from the object to be imaged with a reference beam of un-scattered light. Scientists can then illuminate the developed image with a replica of the reference beam to create a virtual image of the original object. Holography was originally proposed by the physicist Dennis Gabor in 1948 to improve the resolution of an electron microscope, demonstrated using light optics. A hologram can be formed by capturing the phase and amplitude distribution of a signal by superimposing it with a known reference. The original concept was followed by holography with electrons, and after the invention of lasers optical holography became a popular technique for 3D imaging macroscopic objects, information encryption and microscopy imaging.

However, extending holograms to the ultrafast domain currently remains a challenge with electrons, although developing the technique would allow the highest possible combined spatiotemporal resolution for advanced imaging applications in condensed matter physics. In a recent study now published in Science Advances, Ivan Madan and an interdisciplinary research team in the departments of Ultrafast Microscopy and Electron Scattering, Physics, Science and Technology in Switzerland, the U.K. and Spain, detailed the development of a hologram using local . The scientists obtained the electromagnetic holograms with combined attosecond/nanometer resolution in an ultrafast transmission electron microscope (UEM).

In the new method, the scientists relied on electromagnetic fields to split an electron wave function in a quantum of different energy states. The technique deviated from the conventional method, where the signal of interest and reference spatially separated and recombined to reconstruct the amplitude and phase of a signal of interest to subsequently form a hologram. The principle can be extended to any kind of detection configuration involving a periodic signal capable of undergoing interference, including sound waves, X-rays or femtosecond pulse waveforms.

Continue reading “Holographic imaging of electromagnetic fields using electron-light quantum interference” »

Page 29 of 52First2627282930313233Last