Menu

Blog

Archive for the ‘encryption’ category: Page 37

Dec 17, 2018

Mathematicians Seal Back Door to Breaking RSA Encryption

Posted by in categories: encryption, mathematics, security

Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work.

Read more

Dec 7, 2018

Multichannel vectorial holographic display and encryption

Posted by in categories: encryption, holograms, nanotechnology, security

Holography is a powerful tool that can reconstruct wavefronts of light and combine the fundamental wave properties of amplitude, phase, polarization, wave vector and frequency. Smart multiplexing techniques (multiple signal integration) together with metasurface designs are currently in high demand to explore the capacity to engineer information storage systems and enhance optical encryption security using such metasurface holograms.

Holography based on metasurfaces is a promising candidate for applications in optical displays/storage with enormous information bearing capacity alongside a large field of view compared to traditional methods. To practically realize holograms, holographic profiles should be encoded on ultrathin nanostructures that possess strong light-matter interactions (plasmonic interactions) in an ultrashort distance. Metasurfaces can control light and acoustic waves in a manner not seen in nature to provide a flexible and compact platform and realize a variety of vectorial holograms, with high dimensional information that surpass the limits of liquid crystals or optical photoresists.

Among the existing techniques employed to achieve highly desired optical properties, polarization multiplexing (multiple signal integration) is an attractive method. The strong cross-talk associated with such platforms can, however, be prevented with birefringent metasurfaces (two-dimensional surfaces with two different refractive indices) composed of a single meta-atom per unit-cell for optimized multiplexing.

Continue reading “Multichannel vectorial holographic display and encryption” »

Dec 5, 2018

Quantum computers put blockchain security at risk

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, finance, government, health, internet, quantum physics, security

The longer-term answer is to develop and scale up the quantum communication network and, subsequently, the quantum internet. This will take major investments from governments. However, countries will benefit from the greater security offered13. For example, Canada keeps its census data secret for 92 years, a term that only quantum cryptography can assure. Government agencies could use quantum-secured blockchain platforms to protect citizens’ personal financial and health data. Countries leading major research efforts in quantum technologies, such as China, the United States and members of the European Union, will be among the early adopters. They should invest immediately in research. Blockchains should be a case study for Europe’s Quantum Key Distribution Testbed programme, for example.


Bitcoin and other cryptocurrencies will founder unless they integrate quantum technologies, warn Aleksey K. Fedorov, Evgeniy O. Kiktenko and Alexander I. Lvovsky. Bitcoin and other cryptocurrencies will founder unless they integrate quantum technologies, warn Aleksey K. Fedorov, Evgeniy O. Kiktenko and Alexander I. Lvovsky.

Read more

Dec 5, 2018

Experts say it’s high time to create new cryptography for quantum computing age

Posted by in categories: computing, encryption, quantum physics

https://youtube.com/watch?v=WVv5OAR4Nik

A new report says it could take more than a decade to develop new cryptography schemes to keep data secure when quantum computers hit prime time.

Read more

Nov 19, 2018

Can quantum computing prevent an encryption meltdown?

Posted by in categories: computing, encryption, government, quantum physics

Even with government and industry working on quantum-resistant encryption, getting any solutions rolled out will take time and a massive effort.

Read more

Nov 18, 2018

Encrypted Genomic Data Means People Can Participate in Research Without Sacrificing Privacy

Posted by in categories: encryption, information science

Anything that prevents the next big data leak is good news.

Read more

Sep 7, 2018

Quantum cryptography: A foolproof method of preserving data security

Posted by in categories: economics, encryption, quantum physics, security, sustainability

Investment in clean energy is rising as improved economics and energy storage, better regulation, and concerns about air pollution drive the creation of innovative new solutions.

Read more

Sep 3, 2018

US and intelligence allies take aim at tech companies over encryption

Posted by in category: encryption

The “Five Eyes” intelligence alliance wants tech companies to give them access to data and communications, saying “privacy is not absolute.”

Read more

Aug 27, 2018

Physicists race to demystify Einstein’s ‘spooky’ science

Posted by in categories: computing, encryption, mobile phones, neuroscience, quantum physics, science, space

When it comes to fundamental physics, things can get spooky. At least that’s what Albert Einstein said when describing the phenomenon of quantum entanglement—the linkage of particles in such a way that measurements performed on one particle seem to affect the other, even when separated by great distances. “Spooky action at a distance” is how Einstein described what he couldn’t explain.

While quantum mechanics includes many mysterious phenomena like entanglement, it remains the best fundamental physical theory describing how matter and light behave at the smallest scales. Quantum theory has survived numerous experimental tests in the past century while enabling many advanced technologies: modern computers, digital cameras and the displays of TVs, laptops and smartphones. Quantum entanglement itself is also the key to several next-generation technologies in computing, encryption and telecommunications. Yet, there is no clear consensus on how to interpret what quantum theory says about the true nature of reality at the subatomic level, or to definitively explain how entanglement actually works.

According to Andrew Friedman, a research scientist at the University of California San Diego Center for Astrophysics and Space Sciences (CASS), “the race is on” around the globe to identify and experimentally close potential loopholes that could still allow alternative theories, distinct from quantum theory, to explain perplexing phenomena like quantum entanglement. Such loopholes could potentially allow future quantum encryption schemes to be hacked. So, Friedman and his fellow researchers conducted a “Cosmic Bell” test with polarization-entangled photons designed to further close the “freedom-of-choice” or “free will” loophole in tests of Bell’s inequality, a famous theoretical result derived by physicist John S. Bell in the 1960s. Published in the Aug. 20 issue of Physical Review Letters, their findings are consistent with quantum theory and push back to at least 7.

Continue reading “Physicists race to demystify Einstein’s ‘spooky’ science” »

Aug 18, 2018

Government seeks Facebook help to wiretap Messenger — sources

Posted by in categories: encryption, government, law enforcement, surveillance

SAN FRANCISCO (Reuters) — The U.S. government is trying to force Facebook Inc ( FB.O ) to break the encryption in its popular Messenger app so law enforcement may listen to a suspect’s voice conversations in a criminal probe, three people briefed on the case said, resurrecting the issue of whether companies can be compelled to alter their products to enable surveillance.

The previously unreported case in a federal court in California is proceeding under seal, so no filings are publicly available, but the three people told Reuters that Facebook is contesting the U.S. Department of Justice’s demand.

The judge in the Messenger case heard arguments on Tuesday on a government motion to hold Facebook in contempt of court for refusing to carry out the surveillance request, according to the sources, who spoke on condition of anonymity.

Continue reading “Government seeks Facebook help to wiretap Messenger — sources” »

Page 37 of 58First3435363738394041Last