Menu

Blog

Archive for the ‘encryption’ category: Page 4

Jan 3, 2024

Nearly 11 million SSH servers vulnerable to new Terrapin attacks

Posted by in categories: encryption, internet

Almost 11 million internet-exposed SSH servers are vulnerable to the Terrapin attack that threatens the integrity of some SSH connections.

The Terrapin attack targets the SSH protocol, affecting both clients and servers, and was developed by academic researchers from Ruhr University Bochum in Germany.

It manipulates sequence numbers during the handshake process to compromise the integrity of the SSH channel, particularly when specific encryption modes like ChaCha20-Poly1305 or CBC with Encrypt-then-MAC are used.

Jan 2, 2024

Quantum Key Distribution for Secure Optical Communication

Posted by in categories: encryption, quantum physics, security

In the modern digital age, where data flows freely and sensitive information is constantly in transit, secure communication has become essential. Traditional encryption methods, while effective, are not immune to the evolving threat landscape. This is where quantum key distribution (QKD) emerges as a revolutionary solution, offering unmatched security for transmitting sensitive data.

Image Credit: asharkyu/Shutterstock.com

The idea of quantum key distribution (QKD) dates back to Stephen Wiesner’s concept of quantum conjugate coding at Columbia University in the 1970s. Charles H. Bennett later built on this idea, introducing the first QKD protocol, BB84, in the 1980s, using nonorthogonal states. Since then, it has matured into one of the most established quantum technologies, commercially available for over 15 years.

Jan 2, 2024

China, Russia claim to have tested hack-proof quantum communication link

Posted by in categories: cybercrime/malcode, encryption, quantum physics

The secure quantum communication covered a distance of about 4,000 kilometers using China’s quantum satellite Mozi.


Scientists in Russia and China have established quantum communication encrypted with the help of secure keys transmitted by China’s quantum satellite, reports SCMP.

Dec 29, 2023

Post-quantum cryptography counters computing like Schrödinger’s Cat

Posted by in categories: business, computing, encryption, government, quantum physics

Businesses and government agencies must scan code for RSA & old protocols, replacing them with post-quantum cryptography to thwart quantum threats to encryption.

Dec 28, 2023

Can a New Law of Physics Explain a Black Hole Paradox?

Posted by in categories: blockchains, cosmology, encryption, quantum physics, robotics/AI

When the theoretical physicist Leonard Susskind encountered a head-scratching paradox about black holes, he turned to an unexpected place: computer science. In nature, most self-contained systems eventually reach thermodynamic equilibrium… but not black holes. The interior volume of a black hole appears to forever expand without limit. But why? Susskind had a suspicion that a concept called computational complexity, which underpins everything from cryptography to quantum computing to the blockchain and AI, might provide an explanation.

He and his colleagues believe that the complexity of quantum entanglement continues to evolve inside a black hole long past the point of what’s called “heat death.” Now Susskind and his collaborator, Adam Brown, have used this insight to propose a new law of physics: the second law of quantum complexity, a quantum analogue of the second law of thermodynamics.

Continue reading “Can a New Law of Physics Explain a Black Hole Paradox?” »

Dec 27, 2023

A logical magic state with fidelity beyond distillation threshold realized on superconducting quantum processor

Posted by in categories: computing, encryption, quantum physics

Quantum computers have the potential to outperform conventional computers on some tasks, including complex optimization problems. However, quantum computers are also vulnerable to noise, which can lead to computational errors.

Engineers have been trying to devise fault-tolerant approaches that could be more resistant to noise and could thus be scaled up more robustly. One common approach to attain fault-tolerance is the preparation of magic states, which introduce so-called non-Clifford gates.

Researchers at University of Science and Technology of China, the Henan Key Laboratory of Quantum Information and Cryptography and the Hefei National Laboratory recently demonstrated the preparation of a logical magic state with fidelity beyond the distillation threshold on a superconducting quantum processor. Their paper, published in Physical Review Letters, outlines a viable and effective strategy to generate high-fidelity logical magic states, an approach to realize fault-tolerant quantum computing.

Dec 24, 2023

Dynamic interactive bitwise meta-holography with ultra-high computational and display frame rates

Posted by in categories: computing, encryption, information science, nanotechnology

Computer-generated holography (CGH) represents a cutting-edge technology that employs computer algorithms to dynamically reconstruct virtual objects. This technology has found extensive applications across diverse fields such as three-dimensional display, optical information storage and processing, entertainment, and encryption.

Despite the broad application spectrum of CGH, contemporary techniques predominantly rely on projection devices like spatial light modulators (SLMs) and digital micromirror devices (DMDs). These devices inherently face limitations in display capabilities, often resulting in narrow field-of-view and multilevel diffraction in projected images.

In recent developments, metasurfaces composed of an array of subwavelength nanostructures have demonstrated exceptional capabilities in modulating electromagnetic waves. By introducing abrupt changes to fundamental wave properties like amplitude and phase through nanostructuring at subwavelength scales, metasurfaces enable modulation effects that are challenging to achieve with traditional devices.

Dec 24, 2023

Chips to Compute With Encrypted Data Are Coming

Posted by in categories: biotech/medical, encryption, finance, health, law, robotics/AI

Regulatory efforts to protect data are making strides globally. Patient data is protected by law in the United States and elsewhere. In Europe the General Data Protection Regulation (GDPR) guards personal data and recently led to a US $1.3 billion fine for Meta. You can even think of Apple’s App Store policies against data sharing as a kind of data-protection regulation.

“These are good constraints. These are constraints society wants,” says Michael Gao, founder and CEO of Fabric Cryptography, one of the startups developing FHE-accelerating chips. But privacy and confidentiality come at a cost: They can make it more difficult to track disease and do medical research, they potentially let some bad guys bank, and they can prevent the use of data needed to improve AI.

“Fully homomorphic encryption is an automated solution to get around legal and regulatory issues while still protecting privacy,” says Kurt Rohloff, CEO of Duality Technologies, in Hoboken, N.J., one of the companies developing FHE accelerator chips. His company’s FHE software is already helping financial firms check for fraud and preserving patient privacy in health care research.

Dec 15, 2023

U.S. and China race to shield secrets from quantum computers

Posted by in categories: cybercrime/malcode, encryption, mathematics, quantum physics

No one knows who might get there first. The United States and China are considered the leaders in the field; many experts believe America still holds an edge.

As the race to master quantum computing continues, a scramble is on to protect critical data. Washington and its allies are working on new encryption standards known as post-quantum cryptography – essentially codes that are much harder to crack, even for a quantum computer. Beijing is trying to pioneer quantum communications networks, a technology theoretically impossible to hack, according to researchers. The scientist spearheading Beijing’s efforts has become a minor celebrity in China.

Quantum computing is radically different. Conventional computers process information as bits – either 1 or 0, and just one number at a time. Quantum computers process in quantum bits, or “qubits,” which can be 1, 0 or any number in between, all at the same time, which physicists say is an approximate way of describing a complex mathematical concept.

Dec 7, 2023

Messenger is finally getting end-to-end encryption by default

Posted by in category: encryption

Years after Mark Zuckerberg said encrypted chats were coming to Messenger, it’s finally being enabled by default.

Meta is rolling out end-to-end encryption for one-on-one chats and calls on Messenger, finally fulfilling a promise that’s been in the works for quite awhile.


The switch to default has been in the works for a long time.

Continue reading “Messenger is finally getting end-to-end encryption by default” »

Page 4 of 5512345678Last