Menu

Blog

Archive for the ‘computing’ category: Page 313

Oct 8, 2022

Paper reveals a quarter of the world’s internet users rely on infrastructure that is susceptible to attacks

Posted by in categories: computing, internet

About a quarter of the world’s internet users live in countries that are more susceptible than previously thought to targeted attacks on their internet infrastructure. Many of the at-risk countries are located in the Global South.

That’s the conclusion of a sweeping, large-scale study conducted by computer scientists at the University of California San Diego. The researchers surveyed 75 .

“We wanted to study the topology of the internet to find weak links that, if compromised, would expose an entire nation’s traffic,” said Alexander Gamero-Garrido, the paper’s first author, who earned his Ph.D. in computer science at UC San Diego.

Oct 7, 2022

Nobel Prize: Quantum Entanglement Unveiled

Posted by in categories: computing, encryption, quantum physics

The 2022 Nobel Prize in Physics honors research on the foundations of quantum mechanics, which opened up the quantum information frontier.

7 October 2022: We have replaced our initial one-paragraph announcement with a full-length Focus story.

The Nobel Prize in Physics this year recognizes efforts to take quantum weirdness out of philosophy discussions and to place it on experimental display for all to see. The award is shared by Alain Aspect, John Clauser, and Anton Zeilinger, all of whom showed a mastery of entanglement—a quantum relationship between two particles that can exist over long distances. Using entangled photons, Clauser and Aspect performed some of the first “Bell tests,” which confirmed quantum mechanics predictions while putting to bed certain alternative theories based on classical physics. Zeilinger used some of those Bell-test techniques to demonstrate entanglement control methods that can be applied to quantum computing, quantum cryptography, and other quantum information technologies.

Oct 7, 2022

Intel Achieves Quantum Computing Chip Fab Milestone Paving The Way For Mass Production

Posted by in categories: computing, quantum physics

Intel has just announced a monumental achievement that could make quantum processors available at scale.

Oct 7, 2022

Intel hits major milestone as it moves toward mass production of quantum computer chips

Posted by in categories: computing, quantum physics

Intel Corp.’s two primary research organizations, Intel Labs and Components Research, announced today that they’re making big progress as they work toward large-scale production of quantum computing processors.

At the 2022 Silicon Quantum Electronics Workshop in Orford, Quebec, Intel’s researchers said that they’ve been able to demonstrate the highest reported yield and uniformity rate when manufacturing “silicon spin qubit devices” at the company’s transistor research and development facility. The research is believed to be a key milestone for Intel as it moves toward being able to fabricate quantum computing chips on its existing transistor manufacturing processes.

Intel is a key player in the race to build quantum computers, which are more advanced machines that encode data as “qubits,” as opposed to the conventional bits used in traditional computers. The advantage of qubits is they’re not restricted to states of 1 or 0. They can also exist as both states at the same time, a characteristic that’s known as superposition.

Oct 6, 2022

3 critical malicious code execution vulnerabilities in Linux kernel

Posted by in categories: computing, security

A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerable computers and run arbitrary code. The roccat_report_event function in drivers/hid/hid-roccat.c has a use-after-free vulnerability identified as CVE-2022–41850 (CVSS score: 8.4). A local attacker might exploit this flaw to run malicious script on the system by submitting a report while copying a report->value. Patch has be released to addresses the Linux Kernel 5.19.12 vulnerability CVE-2022–41850.

The second flaw tracked as CVE-2022–41848 (CVSS score: 6.8), is also a use-after-free flaw due to a race condition between mgslpc_ioctl and mgslpc_detach in drivers/char/pcmcia/synclink_cs.c. By removing a PCMCIA device while calling ioctl, an attacker could exploit this vulnerability to execute arbitrary code on the system. The bug affects Linux Kernel 5.19.12 and was fixed via this patch.

Continue reading “3 critical malicious code execution vulnerabilities in Linux kernel” »

Oct 6, 2022

Achieving greater entanglement: Milestones on the path to useful quantum technologies

Posted by in categories: computing, information science, particle physics, quantum physics, security

Tiny particles are interconnected despite sometimes being thousands of kilometers apart—Albert Einstein called this “spooky action at a distance.” Something that would be inexplicable by the laws of classical physics is a fundamental part of quantum physics. Entanglement like this can occur between multiple quantum particles, meaning that certain properties of the particles are intimately linked with each other.

Entangled systems containing multiple offer significant benefits in implementing quantum algorithms, which have the potential to be used in communications, or quantum computing. Researchers from Paderborn University have been working with colleagues from Ulm University to develop the first programmable optical quantum memory. The study was published as an “Editor’s suggestion” in the Physical Review Letters journal.

Oct 6, 2022

This micro molten salt reactor is designed to fit on a truck

Posted by in categories: computing, nuclear energy

Small, safer vessels could be ‘silicon chip’ that ushers in new nuclear age.

Oct 5, 2022

A Quantum Entanglement Assembly Line

Posted by in categories: computing, quantum physics

Quantum computing and communication often rely on the entanglement of several photons together. But obtaining these multiphoton states is a bit like playing the lottery, as generating entanglement between photons only succeeds a small fraction of the time. A new experiment shows how to improve one’s odds in this quantum game of chance. The method works like an entanglement assembly line, in which entangled pairs of photons are created in successive order and combined with stored photons.

The traditional method for obtaining multiphoton entanglement requires a large set of photon sources. Each source simultaneously generates an entangled photon pair, and those photons are subsequently interfered with each other. The process is probabilistic in that each step only succeeds in producing pair entanglement, say, once in every 20 tries. The odds become exponentially worse as entanglement of more and more photons is attempted.

Christine Silberhorn from Paderborn University, Germany, and her colleagues have developed a new method that offers a relatively high success rate [1]. They use a single source that generates pairs of polarization-entangled photons in succession. After the first pair is created, one of these photons is stored in an optical loop. When the source creates a new pair (which can take several tries), one of these photons is interfered with the stored photon. If successful, this interference creates a four-photon entangled state. The process can continue—with new pairs being generated and one photon being stored—until the desired multiphoton state is reached.

Oct 5, 2022

How Quantum Physics Leads to Decrypting Common Algorithms

Posted by in categories: computing, encryption, information science, mathematics, quantum physics, weapons

The rise of quantum computing and its implications for current encryption standards are well known. But why exactly should quantum computers be especially adept at breaking encryption? The answer is a nifty bit of mathematical juggling called Shor’s algorithm. The question that still leaves is: What is it that this algorithm does that causes quantum computers to be so much better at cracking encryption? In this video, YouTuber minutephysics explains it in his traditional whiteboard cartoon style.

“Quantum computation has the potential to make it super, super easy to access encrypted data — like having a lightsaber you can use to cut through any lock or barrier, no matter how strong,” minutephysics says. “Shor’s algorithm is that lightsaber.”

Continue reading “How Quantum Physics Leads to Decrypting Common Algorithms” »

Oct 5, 2022

Nobel Prize in Physics goes to scientists who paved the way for quantum computing

Posted by in categories: computing, particle physics, quantum physics

Three scientists who laid the groundwork for the understanding of the odd “entangling” behavior of quantum particles have received the 2022 Nobel Prize in Physics.

French physicist Alain Aspect, Austria’s Anton Zeilinger and American John Clauser were honored for their experiments exploring the nature of entangled quantum particles.