Menu

Blog

Archive for the ‘encryption’ category: Page 25

Dec 30, 2020

Aerolysin nanopores decode digital information stored in tailored macromolecular analytes

Posted by in categories: bioengineering, biological, chemistry, computing, encryption, genetics, information science

Digital data storage is a growing need for our society and finding alternative solutions than those based on silicon or magnetic tapes is a challenge in the era of “big data.” The recent development of polymers that can store information at the molecular level has opened up new opportunities for ultrahigh density data storage, long-term archival, anticounterfeiting systems, and molecular cryptography. However, synthetic informational polymers are so far only deciphered by tandem mass spectrometry. In comparison, nanopore technology can be faster, cheaper, nondestructive and provide detection at the single-molecule level; moreover, it can be massively parallelized and miniaturized in portable devices. Here, we demonstrate the ability of engineered aerolysin nanopores to accurately read, with single-bit resolution, the digital information encoded in tailored informational polymers alone and in mixed samples, without compromising information density. These findings open promising possibilities to develop writing-reading technologies to process digital data using a biological-inspired platform.

DNA has evolved to store genetic information in living systems; therefore, it was naturally proposed to be similarly used as a support for data storage (1–3), given its high-information density and long-term storage with respect to existing technologies based on silicon and magnetic tapes. Alternatively, synthetic informational polymers have also been described (5–9) as a promising approach allowing digital storage. In these polymers, information is stored in a controlled monomer sequence, a strategy that is also used by nature in genetic material. In both cases, single-molecule data writing is achieved mainly by stepwise chemical synthesis (3, 10, 11), although enzymatic approaches have also been reported (12). While most of the progress in this area has been made with DNA, which was an obvious starting choice, the molecular structure of DNA is set by biological function, and therefore, there is little space for optimization and innovation.

Dec 26, 2020

The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing

Posted by in category: encryption

We can’t let the FBI keep the public in the dark about its ability to gain access to information stored on our personal mobile devices.

Dec 17, 2020

Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states

Posted by in categories: computing, encryption, quantum physics, security

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets1,2,3.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols5,6,7,8. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available9,10,11.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

Nov 29, 2020

What Is the Signal Encryption Protocol?

Posted by in category: encryption

As the Signal protocol becomes the industry standard, it’s worth understanding what sets it apart from other forms of end-to-end encrypted messaging.

Nov 23, 2020

Why You Should Stop Texting From Your Android Messages App

Posted by in categories: encryption, mobile phones, security

If you’re a user of Google’s Messages app on your Android smartphone, then you will now likely have the RCS update intended to bring standard text messaging into the current century. RCS is now available in all major countries except China, Russia and Iran. Building on standard SMS capabilities, this adds chat functionality to compete with WhatsApp and iMessage. But, in truth, it doesn’t compete at all. There’s a glaring issue that doesn’t look like being properly fixed anytime soon. This is now bad enough that you should now go use something else.

The issue, of course, is end-to-end encryption. Six months ago, reports emerged that Google was developing this level of security to upgrade RCS. As of this week, this is now finally available for public beta testing. On the surface, its intent is to deliver Android users with an iMessage alternative. But there is a glaring issue—and it’s a deal breaker. This deployment of end-to-end encryption on RCS is not available for groups—that’s seemingly too complex to handle right now. And there’s also no word yet as to when this limited upgrade might be rolled out.

With that in mind, Android users should opt for a different iMessage-like alternative. Fortunately, there is a simple solution available now. While its standard messenger is not end-to-end encrypted by default, Android offers users the option to select an alternative default messenger that does. Signal is the best secure messenger available. And while its install base is modest in comparison to WhatsApp or iMessage, it’s growing fast.

Nov 13, 2020

Graphene for quantum computing

Posted by in categories: computing, encryption, quantum physics

Quantum computing is a new paradigm in computing that utilizes the benefits of quantum mechanics to enhance the computing experience. Quantum computers will no longer rely on binary digits (0 and 1 states), that computers have relied on since the early beginnings, but will instead use quantum bits, which can be in a superposition of states. Quantum bits, or qubits, have the advantage of being in many states at once, offering parallel computing advantages. For example, they have long been regarded as far superior to classical computers for applications in data encryption.

Although the concept of quantum computers has been known for several decades, practical realizations are still lacking. The main limiting factor has been the critical influence of the environment on a qubit. Most physical systems need to be in perfectly controlled conditions in order to remain in the superposition state, whereas any interaction (mechanical, thermal, or other) with the environment perturbs this state and ruins the qubit. Such perturbation is termed “decoherence” that has plagued many potential qubit systems.

Graphene, having spurred research into numerous novel directions, is naturally also considered as a candidate material host for qubits. For example, back in 2013, a team of researchers from MIT found that graphene can be made into a topological insulator – meaning that electrons with one spin direction move around the graphene edges clockwise, whereas those that have the opposite spin move counterclockwise. They made this happen by applying two magnetic fields: one perpendicular to the graphene sheet, to make the electrons flow at sheet edges only, and another parallel to the sheet, that separates the two spin contributions. Electron spin has long been considered a candidate qubit, because it is inherently a quantum system that is in a superposition of states. In graphene, the spins move along the sheet edges robustly, without much decoherence. Furthermore, the same research showed switching the spin selection on and off, an important feature of q-bit transistors.

Nov 10, 2020

Computer Scientists Achieve ‘Crown Jewel’ of Cryptography

Posted by in categories: computing, encryption

A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work.

Nov 9, 2020

Quantum cryptography using qutrits

Posted by in categories: encryption, quantum physics

Circa 2006


Quantum cryptography (QC) is still in a very early stage and there are very few commercial products available. But this doesn’t prevent researchers to look at new solutions. For example, physicists from the University of Wien, Austria, are testing qutrits instead of the more common qubits. These qutrits can simultaneously exist in three basic states — instead of two for the qubits. This means that QC systems based on qutrits will inherently be more secure. But if QC using qubits has been demonstrated over distances exceeding 100 kilometers, the experiments with qutrits are today confined within labs. For more information, read this abstract of a highly technical paper or continue below.

Nov 8, 2020

Older Android phones won’t support many secure websites

Posted by in categories: encryption, mobile phones

Let’s Encrypt has warned that older Android phones won’t support many secure websites after they lose key certificates by September 2021.

Oct 31, 2020

Quantum-computing pioneer warns of complacency over Internet security

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Quantum computers are now a reality, although they are still too rudimentary to factor numbers of more than two digits. But it is only a matter of time until quantum computers threaten Internet encryption.

Nature caught up with Shor to ask him about the impact of his work — and where Internet security is heading.


Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Page 25 of 58First2223242526272829Last