Menu

Blog

Archive for the ‘encryption’ category: Page 43

Nov 23, 2016

Microsoft Sets Sights on Building Practical Quantum Computer

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

DAILY VIDEO: Microsoft Starts Quantum Computer Development Program; Cerber Ransomware Expands Database Encryption Attacks; IBM Debuts Watson Internet of Things Services Practice; and there’s more.

Today’s topics include Microsoft’s plan to build a Quantum computer, Trend Micro’s find that the Cerber malware is seeking out database files to encrypt and hold for ransom, IBM’s new Watson internet of things services for the automotive, electronics and insurance industries, and the release of the Microsoft Office Online Server update.

Microsoft is on a mission to build a quantum computer, and the company has appointed Todd Holmdahl to manage the project. Holmdahl is the corporate vice president of Microsoft Quantum, a unit dedicated to turning the company’s quantum computing research into real-world products.

Continue reading “Microsoft Sets Sights on Building Practical Quantum Computer” »

Nov 23, 2016

How will quantum computing impact security processes?

Posted by in categories: cybercrime/malcode, encryption, mobile phones, quantum physics

How does one prevent hacking from a QC system? Easy, on board to QC first before others do.


Quantum computers have the potential to perform calculations faster than ever possible before, inviting a significant rethink in how we approach cyber security.

Given the amount of research being ploughed into this area, we are likely to see a commercially viable machine in the near future, so cryptographers and the cyber security industry in general should work to have a clear view on the implications way ahead of that achievement.

Continue reading “How will quantum computing impact security processes?” »

Nov 13, 2016

Quantum Computers and the End of Privacy #Infographic ~ Visualistan

Posted by in categories: computing, encryption, law enforcement, quantum physics

Luv the map; however, missing a lot of info. Namely, many decades and contributors. QC officially recorded to start in 1960 with Stephen Wiesner discovery of a cryptographic tool. And, even modern day QC such as a QC Net has been in existence since late 90s with Los Alamos.

Still nice colored map for a limited view of 2014, 2015, and current. However, I don’t see the ORNL, Oxford, U. of Sydney, China, USC, MIT, etc. breakthroughs most importantly the scalable Quantum, syn. diamonds contribution to enable stable QC and QC Net.


From law enforcement to criminals, governments to insurgents, and activists to Facebook dabblers, many people have come to rely on encryption to protect their digital information and keep their communications secure. But the current forms of encryption could be obsolete the moment anyone succeeds in building a quantum computer. A what! Read on about the brave new world awaiting us.

Continue reading “Quantum Computers and the End of Privacy #Infographic ~ Visualistan” »

Nov 11, 2016

Bitcoin users relax: Quantum computing no match for SHA-2 encryption

Posted by in categories: bitcoin, cryptocurrencies, economics, encryption, quantum physics

Worried about security for your bitcoin in the face of quantum computing? According to computer researchers, there’s no reason to be.

Source: https://hacked.com/breathe-easy-bitcoiners-quantum-computing…encryption

Quantum mech

Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future.

Continue reading “Bitcoin users relax: Quantum computing no match for SHA-2 encryption” »

Nov 11, 2016

Battle of the Bots: How AI Is Taking Over the World of Cybersecurity

Posted by in categories: cybercrime/malcode, encryption, information science, robotics/AI

Google has built machine learning systems that can create their own cryptographic algorithms — the latest success for AI’s use in cybersecurity. But what are the implications of our digital security increasingly being handed over to intelligent machines?

Google Brain, the company’s California-based AI unit, managed the recent feat by pitting neural networks against each other. Two systems, called Bob and Alice, were tasked with keeping their messages secret from a third, called Eve. None were told how to encrypt messages, but Bob and Alice were given a shared security key that Eve didn’t have access too.

ai-cybersecurity-7

Continue reading “Battle of the Bots: How AI Is Taking Over the World of Cybersecurity” »

Nov 5, 2016

New Distance Record Offers Preview of Everyday Quantum Encryption

Posted by in categories: encryption, quantum physics

AWESOME!

Read more

Nov 2, 2016

China to complete first stretch of dedicated ‘quantum’ encryption fibre network next month

Posted by in categories: computing, encryption, quantum physics

2,000km network to provide foundation for secure quantum key distribution.

Read more

Nov 1, 2016

Google’s A.I. Learns How to Encrypt Itself

Posted by in categories: education, encryption, robotics/AI

And how to keep secrets.

Read more

Oct 31, 2016

Researchers nearly reach quantum limit with nanodrums

Posted by in categories: encryption, quantum physics

Extremely accurate measurements of microwave signals can potentially be used for data encryption based on quantum cryptography and other purposes.

Researchers at Aalto University and the University of Jyväskylä have developed a new method of measuring extremely accurately. This method can be used for processing quantum information, for example, by efficiently transforming signals from microwave circuits to the optical regime.

Read more

Oct 30, 2016

Google’s neural networks created their own encryption method

Posted by in categories: cybercrime/malcode, encryption, information science, robotics/AI

Fortifying cybersecurity is on everyone’s mind after the massive DDoS attack from last week. However, it’s not an easy task as the number of hackers evolves the same as security. What if your machine can learn how to protect itself from prying eyes? Researchers from Google Brain, Google’s deep Learning project, has shown that neural networks can learn to create their own form of encryption.

According to a research paper, Martín Abadi and David Andersen assigned Google’s AI to work out how to use a simple encryption technique. Using machine learning, those machines could easily create their own form of encrypted message, though they didn’t learn specific cryptographic algorithms. Albeit, compared to the current human-designed system, that was pretty basic, but an interesting step for neural networks.

To find out whether artificial intelligence could learn to encrypt on its own or not, the Google Brain team built an encryption game with its three different entities: Alice, Bob and Eve, powered by deep learning neural networks. Alice’s task was to send an encrypted message to Bob, Bob’s task was to decode that message, and Eve’s job was to figure out how to eavesdrop and decode the message Alice sent herself.

Continue reading “Google’s neural networks created their own encryption method” »

Page 43 of 57First4041424344454647Last