БЛОГ

Archive for the ‘encryption’ category: Page 34

Jan 21, 2018

.com Launches Bitcoin Cash Notary Service

Posted by in categories: bitcoin, encryption

Back in April of 2017 Bitcoin.com launched a notary service that was based on top of the bitcoin core (BTC) blockchain. However, due to the transaction bottleneck and extremely high fees, the notary service became unsustainable. Now Bitcoin.com has re-launched the notary using the bitcoin cash (BCH) blockchain, and anyone in the world can prove ownership for only 0.0005 BCH (about $0.97).

Also read: Lots of Optimism at the Miami Bitcoin Conference This Week

This week Bitcoin.com has re-launched the blockchain-based notary service that was once tethered to the bitcoin core blockchain. Unfortunately, the service did not work correctly because of transaction backlog, and high network fees to verify documents. Now the infrastructure is tied to the bitcoin cash blockchain making document verification extremely cheap, and fees are practically non-existent. Right now a user can upload a document for only 0.0005 BCH ($0.97), and the network transaction fee is less than a penny. (It’s important to note that records don’t actually “exist” on the chain per say, it is merely timestamped encrypted data that is tied to the file that’s processed into a valid BCH transaction.) Not only that but the proof will be verified in less than ten minutes, and you can rest assure the notarization service will be validated.

Continue reading “.com Launches Bitcoin Cash Notary Service” »

Jan 19, 2018

Real-world intercontinental quantum communications enabled by the Micius satellite

Posted by in categories: encryption, internet, mathematics, quantum physics, security, space

A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons’ propagation path is through empty space with negligible loss and decoherence.

A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (37°22’44.43’‘N, 97°43’37.01” E), Lijiang (26°41’38.15’‘N, 100°1’45.55’‘E), and Ngari in Tibet (32°19’30.07’‘N, 80°1’34.18’‘E).

Continue reading “Real-world intercontinental quantum communications enabled by the Micius satellite” »

Jan 12, 2018

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

Posted by in categories: encryption, military, privacy

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

Jan 11, 2018

Tougher WiFi security will keep you safe at the coffee shop

Posted by in categories: encryption, habitats, internet, security, wearables

WiFi security hasn’t changed much since WPA2 came to be in 2004, and that’s becoming increasingly apparent when public hotspots are frequently risky and glaring exploits are all too common. It’s about to get a long-due upgrade, though: the Wi-Fi Alliance plans to roll out a WPA3 standard that addresses a number of weak points. For many, the highlight will be individualized data encryption. Even if you’re on an open public network, you won’t have to worry quite so much about someone snooping on your data.

You’ll also see safeguards even when people have terrible passwords, and a simplified security process for devices that have either a tiny display or none at all (say, wearable devices or smart home gadgets). And companies or governments that need stricter security will have access to a 192-bit security suite.

WPA3 should arrive sometime in 2018, and comes on the back of other improvements like more thorough testing to catch potential vulnerabilities before they require emergency patches. These initiatives aren’t going to guarantee airtight security when you’re at the coffee shop, but they could at least eliminate some of WiFi’s more worrying flaws.

Continue reading “Tougher WiFi security will keep you safe at the coffee shop” »

Jan 4, 2018

Nanoscale cryptography method gains robustness from stiction

Posted by in categories: encryption, internet, nanotechnology, security

Most of the cryptographic methods that keep important data secure use complex encryption software, and as a result, consume large amounts of power. As more and more electronic devices are being connected to the internet, there is a growing need for alternative low-power security methods, and this is often done by basing the security on hardware rather than software.

One of the most promising approaches to hardware-based, low-power security is to derive cryptographic keys from the randomness that inherently and uncontrollably emerges during the of nanoscale devices. These methods, called “physical unclonable functions” (PUFs), convert the random variations in the physical devices into the binary states of “0” and “1” to create unique, random cryptographic keys. These keys can then be used to encrypt data into cipher text, as well as decrypt it back into plain text, in a process that remains secure as long as the key remains private.

However, one of the biggest challenges facing PUF technology is its vulnerability to harsh environments. Since the physical randomness that forms the basis of the key usually arises from variations in electrical characteristics, and electrical characteristics are affected by external factors such as high temperatures and radiation, these devices often do not preserve their states when exposed to such conditions.

Continue reading “Nanoscale cryptography method gains robustness from stiction” »

Dec 18, 2017

Canadian QEYSSat Quantum Satellite Program Gets Next Round of Funding

Posted by in categories: economics, encryption, government, quantum physics, space travel

The Canadian Space Agency (CSA) has awarded $1.85M contract to the University of Waterloo for the Quantum Encryption and Science Satellite (QEYSSat) mission.

The QEYSSat mission was one of two projects cited in the 2017 budget when it was unveiled in March of this year. In April, the government sent Innovation Science and Economic Development (ISED) Minister Navdeep Bains to the CSA’s headquarters to formally announce the funding for the QEYSSat mission along with funding for a radar instrument that will be developed for a future orbiter mission to Mars and to announce the Canadian CubeSat Project. The $80.9M of funding would be over five years.

A short history of the QEYSSat mission.

Continue reading “Canadian QEYSSat Quantum Satellite Program Gets Next Round of Funding” »

Dec 1, 2017

Cryptography and radar won WW2 and today Quantum military technologies are similarly critical

Posted by in categories: encryption, military, policy, quantum physics

Cryptography and radar were technologies that won World War 2. Broken codes let the allies know where major forces were being moved. So the US fleet could choose where to intercept the Japanese Navy for the Battle of Midway. Radar and sonar then provided realtime tracking of the Japanese forces during the battle.

This is a summary of information from a Foreign Policy article by Thomas E. Ricks.

Quantum entanglement, quantum superposition, and quantum tunneling can be applied in new forms of computation, sensing, and cryptography.

Continue reading “Cryptography and radar won WW2 and today Quantum military technologies are similarly critical” »

Nov 29, 2017

This breakthrough quantum encryption tool could make the web “hack-proof”

Posted by in categories: encryption, internet, quantum physics

Researchers have doubled the speed at which quantum distribution keys can be transmitted.

Science.

Read more

Nov 4, 2017

Supporting a decentralized, uncensored Internet for every person on the planet

Posted by in categories: bitcoin, cryptocurrencies, encryption, internet

What makes a better Internet possible? At Orchid Labs, our goal is to ensure that every person on Earth can have access to an open, decentralized, and uncensored Internet. We believe a better Internet is one that isn’t controlled by the few, but open to all.

Currently, Internet access for the majority of the people on Earth is censored and monitored. Because of this, many Internet users are blocked from freely communicating, collaborating, and accessing information. The current centralized system, which limits our ability to communicate and learn — while also harvesting and selling our personal data — is far from the full potential of what the internet could be and strays from the original intention of its creators.

That’s why we’ve launched the Orchid Protocol, an open-source overlay network that uses excess bandwidth on top of the existing Internet to ensure that people — no matter where they live on our planet — can have unrestricted access to information and collaboration. Orchid’s protocol combines surplus bandwidth, state-of-the-art encryption, and a decentralized infrastructure enabling any Internet user to participate and exchange bandwidth for payment in peer-to-peer transactions using Orchid tokens on the Ethereum blockchain.

Read more

Oct 31, 2017

How China is using quantum physics to take over the world and stop hackers

Posted by in categories: encryption, quantum physics

China is leading the world in developing unbreakable encryption using quantum physics.

Read more

Page 34 of 52First3132333435363738Last