Menu

Blog

Archive for the ‘encryption’ category: Page 18

Jul 5, 2022

NIST Acknowledges First Four Quantum-Resistant Encryption Tools

Posted by in categories: computing, encryption, information science, quantum physics

The US Department of Commerce’s National Institute of Standards and Technology (NIST) has selected the first-ever group of encryption tools that could potentially withstand the attack of a quantum computer.

The four selected encryption algorithms will now reportedly become part of NIST’s post-quantum cryptographic (PQC) standard, which should be finalized in about two years.

More specifically, for general encryption (used for access to secure websites), NIST has selected the CRYSTALS-Kyber algorithm.

Jun 20, 2022

Telegram is ‘not a secure platform,’ NATO-backed strategic comms chief warns

Posted by in categories: encryption, surveillance

Telegram, a leading encrypted messaging and social media application, has been compromised by Russia, according to a NATO-backed assessment.

“Telegram is not really as it used to be,” Janis Sarts, the director of NATO’s Strategic Communications Center of Excellence in Riga, Latvia, told the Washington Examiner. “I do have reasons to believe that there is not full integrity. … Certainly, I would not see it as a secure platform.”

The messaging service, founded in Dubai by a Russian tech titan who has clashed with Russian President Vladimir Putin’s surveillance apparatus, rocketed to global popularity in 2014 as one of the first applications to offer users the ability to communicate on an encrypted line. It proved valuable to Belarusian protesters who denounced President Alexander Lukashenko’s self-declared victory in a 2020 presidential election, but a warning about the program has begun to circulate among Western officials.

Jun 16, 2022

What is the Hertzbleed computer chip hack and should you be worried?

Posted by in categories: cybercrime/malcode, encryption, information science

A new hack called Hertzbleed can read snippets of data from computer chips remotely and could leave cryptography algorithms vulnerable to attack.

Apr 26, 2022

Quantum ransomware seen deployed in rapid network attacks

Posted by in categories: cybercrime/malcode, encryption, quantum physics

The Quantum ransomware, a strain first discovered in August 2021, were seen carrying out speedy attacks that escalate quickly, leaving defenders little time to react.

The threat actors are using the IcedID malware as one of their initial access vectors, which deploys Cobalt Strike for remote access and leads to data theft and encryption using Quantum Locker.

The technical details of a Quantum ransomware attack were analyzed by security researchers at The DFIR Report, who says the attack lasted only 3 hours and 44 minutes from initial infection to the completion of encrypting devices.

Apr 25, 2022

This ‘Tamper-Evident Container’ Snitches on Meddlers and Thieves

Posted by in categories: cybercrime/malcode, encryption

The 3D-printed containers keep a log of all break-in attempts, meaning your snail mail just got way safer.


Suppose you want to mail a court document to someone across the country—you don’t want anyone to see the secure information inside, of course. So, you seal it into a container that has special sensors built into its walls, and electronics that monitor the shield of sensors. Now, the container is armed and monitoring.

Continue reading “This ‘Tamper-Evident Container’ Snitches on Meddlers and Thieves” »

Apr 21, 2022

Researchers break world record for quantum-encrypted communications

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Researchers in Beijing have set a new quantum secure direct communication (QSDC) world record of 102.2 km (64 miles), smashing the previous mark of 18 km (11 miles), The Eurasian Times reported. Transmission speeds were extremely slow at 0.54 bits per second, but still good enough for text message and phone call encryption over a distance of 30 km (19 miles), wrote research lead Long Guilu in Nature. The work could eventually lead to hack-proof communication, as any eavesdropping attempt on a quantum line can be instantly detected.

QSDC uses the principal of entanglement to secure networks. Quantum physics dictates that entangled particles are linked, so that if you change the property of one by measuring it, the other will instantly change, too — effectively making hacking impossible. In theory, the particles stay linked even if they’re light-years apart, so such systems should work over great distances.

The same research team set the previous fiber record, and devised a “novel design of physical system with a new protocol” to achieve the longer distance. They simplified it by eliminating the “complicated active compensation subsystem” used in the previous model. “This enables an ultra-low quantum bit error rate (QBER) and the long-term stability against environmental noises.”

Apr 18, 2022

A new quantum encryption breakthrough could lead to hacker-proof communication

Posted by in categories: computing, encryption, internet, quantum physics

Scientists from Beijing set a new quantum secure direct communication (QSDC) world record of 102.2 km (64 miles), a massive leap over the previous record of 18 km (11 miles), according to The Eurasian Times.

The research could eventually lead to a massive quantum communications network that would be virtually hacker-proof due to the nature of the technology.

The researchers, who published their findings in a paper in Nature, demonstrated transmission speeds of 0.54 bits per second, much slower than communications using classical computing devices. Still, this was fast enough for phone call and text message encryption over a distance of 30 km (19 miles).

Apr 3, 2022

Is the end nigh for end-to-end for encryption?

Posted by in category: encryption

Europe’s new Digital Markets Act aims to make larger messaging platforms ‘interoperable’ with smaller ones. No wonder the tech titans are running scared.

Mar 24, 2022

Using just a laptop, an encryption code designed to prevent a quantum computer attack was cracked in just 53 hours

Posted by in categories: computing, encryption, quantum physics, security

Tech institutions are trying to find ways to guarantee security as new processing systems becoming increasingly sophisticated.

Mar 3, 2022

Comparative analysis of genome code complexity and manufacturability with engineering benchmarks

Posted by in categories: bioengineering, biotech/medical, encryption

When knowledge has advanced to a state that includes a predictive understanding of the relationship between genome sequence and organism phenotype it will be possible for future engineers to design and produce synthetic organisms. However, the possibility of synthetic biology does not necessarily guarantee its feasibility, in much the same way that the possibility of a brute force attack fails to ensure the timely breaking of robust encryption. The size and range of natural genomes, from a few million base pairs for bacteria to over 100 billion base pairs for some plants, suggests it is necessary to evaluate the practical limits of designing genomes of similar complexity.

Page 18 of 57First1516171819202122Last