Menu

Blog

Archive for the ‘encryption’ category: Page 15

Dec 30, 2022

Experts Warn of “Quantum Apocalypse”

Posted by in categories: computing, encryption, quantum physics

Experts are warning that quantum computers could eventually overpower conventional encryption methods, a potentially dangerous fate for humanity that they’re evocatively dubbing the “quantum apocalypse,” the BBC reports.

Cracking today’s toughest encryption would take virtually forever today — but with the advent of quantum computers, they’re warning, the process could be cut down to mere seconds.

And that kind of number-crunching power could have disastrous consequences if it were to land in the wrong hands.

Dec 25, 2022

The Biggest Discoveries in Computer Science in 2022

Posted by in categories: computing, encryption, internet, mathematics, quantum physics, science, security

As computer scientists tackle a greater range of problems, their work has grown increasingly interdisciplinary. This year, many of the most significant computer science results also involved other scientists and mathematicians. Perhaps the most practical involved the cryptographic questions underlying the security of the internet, which tend to be complicated mathematical problems. One such problem — the product of two elliptic curves and their relation to an abelian surface — ended up bringing down a promising new cryptography scheme that was thought to be strong enough to withstand an attack from a quantum computer. And a different set of mathematical relationships, in the form of one-way functions, will tell cryptographers if truly secure codes are even possible.

Computer science, and quantum computing in particular, also heavily overlaps with physics. In one of the biggest developments in theoretical computer science this year, researchers posted a proof of the NLTS conjecture, which (among other things) states that a ghostly connection between particles known as quantum entanglement is not as delicate as physicists once imagined. This has implications not just for our understanding of the physical world, but also for the myriad cryptographic possibilities that entanglement makes possible.

Dec 3, 2022

Google is testing end-to-end encryption for group chats in the Messages app

Posted by in category: encryption

Google said today it is testing end-to-end encryption for RCS-based group chats on its Messages app — RCS stands for Rich Communication Services. The company noted that in the coming weeks it will be rolling out this feature to select users that are part of the app’s open beta program.

This comes after a bunch of Redditors noticed that Google was testing end-to-end encryption for group chats in October. The company’s latest announcement makes it official.

The search giant first started testing end-to-end encryption for individual RCS chats in 2020. In June, it rolled out the feature to all users of its Messages app.

Nov 24, 2022

Decades-old math theorem cracks US government encryption algorithm

Posted by in categories: computing, encryption, government, information science, mathematics, quantum physics, security

The information security landscape is rapidly changing in response to quantum computing technology, which is capable of cracking modern encryption techniques in minutes, but a promising US government encryption algorithm for the post-quantum world was just cracked in less than an hour thanks to a decades-old math theorem.

In July 2022, the US National Institute of Standards and Technology (NIST) chose a set of encryption algorithms that it hoped would stand up to the encryption-cracking power of quantum computers and tasked researchers with probing them for vulnerabilities, offering a $50,000 prize for anyone who was able to break the encryption.

Nov 22, 2022

Cybersecurity 101: How to choose and use an encrypted messaging app

Posted by in categories: cybercrime/malcode, encryption, mobile phones

Secure communications provider Wickr has announced that it will shutter its free encrypted messaging app, Wickr Me, next year.


Text messaging has been around since the dawn of cellular technology, and sparked its own unique language. But it’s time to put sending regular SMS messages out to pasture.

If you have an iPhone, you’re already on your way. iPhones (as well as iPads and Macs) use iMessage to send messages between Apple devices. It’s a data-based messaging system reliant on 3G, 4G, and Wi-Fi, rather than SMS messaging, which uses an old, outdated but universal 2G cellular network. iMessage has grown in popularity, but has left Android devices and other computers out in the dark.

Continue reading “Cybersecurity 101: How to choose and use an encrypted messaging app” »

Nov 21, 2022

Amazon-owned Wickr is shutting down its free encrypted messaging app

Posted by in category: encryption

Secure communications provider Wickr has announced that it will shutter its free encrypted messaging app, Wickr Me, next year.

Wickr was founded in 2011 and became one of the first mainstream end-to-end encrypted messaging apps, until it was acquired by Amazon’s cloud services giant Amazon Web Services in 2021.

In a post published Friday, Amazon said that Wickr Me will shut down for good on December 31, 2023. Amazon says the app will stop accepting new user registrations on December 31, 2022 before it’s discontinued completely the following year.

Nov 20, 2022

Quantum effects in memristive devices

Posted by in categories: encryption, nanotechnology, quantum physics, robotics/AI

At the nanoscale, the laws of classical physics suddenly become inadequate to explain the behavior of matter. It is precisely at this juncture that quantum theory comes into play, effectively describing the physical phenomena characteristic of the atomic and subatomic world. Thanks to the different behavior of matter on these length and energy scales, it is possible to develop new materials, devices and technologies based on quantum effects, which could yield a real quantum revolution that promises to innovate areas such as cryptography, telecommunications and computation.

The physics of very small objects, already at the basis of many technologies that we use today, is intrinsically linked to the world of nanotechnologies, the branch of applied science dealing with the control of matter at the nanometer scale (a nanometer is one billionth of a meter). This control of matter at the is at the basis of the development of new electronic devices.

Among these, are considered promising devices for the realization of new computational architectures emulating functions of our brain, allowing the creation of increasingly efficient computation systems suitable for the development of the entire artificial intelligence sector, as recently shown by Istituto Nazionale di Ricerca Metrologica (INRiM) researchers in collaboration with several international universities and research institutes.

Nov 16, 2022

Smart home hubs leave users vulnerable to hackers

Posted by in categories: encryption, robotics/AI, security

Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.

Smart technology claims to make our lives easier. You can turn on your lights, lock your front door remotely and even adjust your thermostat with the click of a button.

But new research from the University of Georgia suggests that convenience potentially comes at a cost—your personal security.

Nov 9, 2022

Cryptography’s Future Will Be Quantum-Safe. Here’s How It Will Work

Posted by in categories: computing, encryption, mathematics, quantum physics, security, space

In 1994, the computer scientist Peter Shor discovered that if quantum computers were ever invented, they would decimate much of the infrastructure used to protect information shared online. That frightening possibility has had researchers scrambling to produce new, “post-quantum” encryption schemes, to save as much information as they could from falling into the hands of quantum hackers.

Earlier this year, the National Institute of Standards and Technology revealed four finalists in its search for a post-quantum cryptography standard. Three of them use “lattice cryptography” — a scheme inspired by lattices, regular arrangements of dots in space.

Lattice cryptography and other post-quantum possibilities differ from current standards in crucial ways. But they all rely on mathematical asymmetry. The security of many current cryptography systems is based on multiplication and factoring: Any computer can quickly multiply two numbers, but it could take centuries to factor a cryptographically large number into its prime constituents. That asymmetry makes secrets easy to encode but hard to decode.

Nov 9, 2022

Paving the Way for Satellite Quantum Communications

Posted by in categories: computing, encryption, quantum physics, satellites, security

A series of demonstrations by Micius—a low-orbit satellite with quantum capabilities—lays the groundwork for a satellite-based quantum communication network.

Few things have captured the scientific imagination quite like the vastness of space and the promise of quantum technology. Micius—the Chinese Academy of Science’s quantum communications satellite launched in 2016—has connected these two inspiring domains, producing a string of exciting first demonstrations in quantum space communications. Reviewing the efforts leading up to the satellite launch and the major outcomes of the mission, Jian-Wei Pan and colleagues at the University of Science and Technology of China provide a perspective on what the future of quantum space communications may look like [1]. The success of this quantum-satellite mission proves the viability of several space-based quantum communications protocols, providing a solid foundation for future improvements that may lead to an Earth-spanning quantum communications network (Fig. 1).

Photons, the quanta of light, are wonderful carriers of quantum information because they are easy to manipulate and travel extremely fast. They can be created in a desired quantum state or as the output of some quantum sensor or quantum computer. Quantum entanglement between multiple photons—the nonclassical correlation between their quantum states—can be amazingly useful in quantum communications protocols such as quantum key distribution (QKD), a cryptography approach that can theoretically guarantee absolute information security. QKD schemes have been demonstrated on distances of a few hundreds of kilometers—sufficient to cover communications networks between cities. But increasing their range, eventually to the global scale, is a formidable challenge.

Page 15 of 58First1213141516171819Last