БЛОГ

Archive for the ‘encryption’ category: Page 33

May 1, 2018

If quantum computers threaten blockchains, quantum blockchains could be the defense

Posted by in categories: bitcoin, business, computing, encryption, quantum physics

Business Impact

If quantum computers threaten blockchains, quantum blockchains could be the defense.

Quantum computers could break the cryptography that conventional blockchains rely on. Now physicists say a way of entangling the present with the past could foil this type of attack.

Continue reading “If quantum computers threaten blockchains, quantum blockchains could be the defense” »

Apr 23, 2018

The Israel-linked killing of Fadi al-Batsh in Malaysia shows that drone technology is now dangerous enough to kill for

Posted by in categories: drones, encryption, military, robotics/AI

There are certain classes of technology that, by their nature, put those who possess their secrets in danger: Nuclear weapons. Ballistic missiles. Advanced encryption software.

Now, add unmanned aerial vehicles—drones—to that list.

A Palestinian electrical engineer who had published research on drones was assassinated in Malaysia, the Wall Street Journal reported (paywall). A helmeted person on a motorcycle fired 10 shots at 35 year-old Fadi al-Batsh, killing him as he walked to a mosque for morning prayers.

Continue reading “The Israel-linked killing of Fadi al-Batsh in Malaysia shows that drone technology is now dangerous enough to kill for” »

Apr 18, 2018

Artificial intelligence can scour code to find accidentally public passwords

Posted by in categories: encryption, robotics/AI, security

Sometimes sensitive data, like passwords or keys that unlock encrypted communications, are accidentally left open for anybody to see. It’s happened everywhere from the Republican National Committee to Verizon, and as long as information can be public on the internet the trend isn’t going to stop.

But researchers at software infrastructure firm Pivotal have taught AI to locate this accidentally public sensitive information in a surprising way: By looking at the code as if it were a picture. Since modern artificial intelligence is arguably better than humans at identifying minute differences in images, telling the difference between a password and normal code for a computer is just like recognizing a dog from a cat.

The best way to check whether private passwords or sensitive information has been left public today is to use hand-coded rules called “regular expressions.” These rules tell a computer to find any string of characters that meets specific criteria, like length and included characters. But passwords are all different, and this method means that the security engineer has to anticipate every kind of private data they want to guard against.

Continue reading “Artificial intelligence can scour code to find accidentally public passwords” »

Apr 14, 2018

Einstein’s ‘Dice of God’ Has Been Used to Generate Truly Random Numbers

Posted by in categories: encryption, quantum physics

Locking up super-secret information with digital encryption has become even more secure with the production of numbers that aren’t just ‘nearly random’, but are truly unpredictable in every sense of the word.

Using the data generated by a three-year-old experiment on quantum entanglement, the US National Institute of Standards and Technology (NIST) recently generated codes that are guaranteed to be one of a kind, and it could set a new landmark in communications.

On one level, randomness is an easy thing to grasp. We flip coins, roll dice, and pick cards with a basic sense that the outcome can’t be easily predicted.

Continue reading “Einstein’s ‘Dice of God’ Has Been Used to Generate Truly Random Numbers” »

Mar 23, 2018

Artist Hides Secret Code to $10,000 Worth of Cryptocurrencies in Lego Artworks

Posted by in categories: bitcoin, cryptocurrencies, encryption, information science, space

It has no inherent value and causes observers to rotate between feelings of fascination and anger. We’re talking about cryptocurrency, but also art. In a new series, artist Andy Bauch is bringing the two subjects together with works that use abstract patterns constructed in Lego bricks. Each piece visually represents the private key to a crypto-wallet, and anyone can steal that digital cash—if you can decode them.

Bauch first started playing around with cryptocurrencies in 2013 and told us in an interview that he considers himself an enthusiast but not a “rabid promoter” of the technology. “I wasn’t smart enough to buy enough to have fuck-you money,” he said. In 2016, he started to integrate his Bitcoin interest with his art practice.

His latest series of work, New Money, opens at LA’s Castelli Art Space on Friday. Bauch says that each piece in the series “is a secret key to various types of cryptocurrency.” He bought various amounts of Bitcoin, Litecoin, and other alt-coins in 2016 and put them in different digital wallets. Each wallet is encrypted with a private key that consists of a string of letters and numbers. That key was initially fed into an algorithm to generate a pattern. Then Bauch tweaked the algorithm here and there to get it to spit out an image that appealed to him. After finalizing the works, he’s rigorously tested them in reverse to ensure that they do, indeed, give you the right private key when processed through his formula.

Continue reading “Artist Hides Secret Code to $10,000 Worth of Cryptocurrencies in Lego Artworks” »

Mar 18, 2018

The power of quantum technology in 2018

Posted by in categories: computing, encryption, quantum physics

The power of quantum technology in 2018: how does this develop nowadays

Quantum technology is a new field in physics, derived from quantum physics and, especially, quantum mechanics and it transposes their principles into every day use applications such as quantum computers, quantum cryptography or quantum imaging. Ever since the study of quantum technology has been taking very seriously across the globe, a lot of new technologies and applications were developed to make our lives easier, faster and more secure.

Quantum technology still needs to be promoted.

Read more

Mar 13, 2018

What CISOs Should Know About Quantum Computing

Posted by in categories: computing, encryption, quantum physics

As quantum computing approaches real-world viability, it also poses a huge threat to today’s encryption measures.

Previous

1 of 11.

Continue reading “What CISOs Should Know About Quantum Computing” »

Feb 26, 2018

Chinese satellite uses quantum cryptography for secure video conference between continents

Posted by in categories: encryption, quantum physics, satellites

Quantum cryptography has never been possible over long distances. But the first quantum communications satellite is rewriting the record books.

    Read more

    Jan 31, 2018

    A Chinese satellite just used quantum cryptography to make an unhackable video call between Beijing and Vienna

    Posted by in categories: cybercrime/malcode, encryption, quantum physics, space

    The Chinese “Micius” satellite has successfully set up the world’s most secure video conference, using quantum cryptography to connect scientists in Europe and China for an unhackable, intercontinental chat.

    The feat marks another milestone for the satellite, officially called Quantum Experiments at Space Scale (QESS), which only last year was making headlines for transmitting an “unbreakable” quantum code to the Earth’s surface.

    Read more

    Jan 21, 2018

    In Space and Cyber, China is Closing In on the United States

    Posted by in categories: encryption, robotics/AI, satellites, security

    WASHINGTON — It should be no surprise that China is moving to challenge the United States for dominance in space, cyber, artificial intelligence and other key technologies that have wide national security applications. But the question that is still being debated is whether the United States is taking this threat seriously.

    This may not be a Sputnik moment, but the United States could soon be unpleasantly surprised as China continues to shore up its domestic capacity to produce high-end weapons, satellites and encryption technologies, a panel of analysts told the House Armed Services emerging threats and capabilities subcommittee.

    At the Tuesday hearing, Subcommittee Chairman Rep. Elise Stefanik, R-N.Y., said lawmakers are not entirely convinced that China’s dominance in many technology sectors is a “foregone conclusion.” But the committee does believe that China’s technological accomplishments should inform U.S. policies and defense investments. [The Most Dangerous Space Weapons Concepts Ever].

    Continue reading “In Space and Cyber, China is Closing In on the United States” »

    Page 33 of 52First3031323334353637Last