Menu

Blog

Archive for the ‘encryption’ category: Page 40

Jan 19, 2018

Real-world intercontinental quantum communications enabled by the Micius satellite

Posted by in categories: encryption, internet, mathematics, quantum physics, security, space

A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons’ propagation path is through empty space with negligible loss and decoherence.

A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (37°22’44.43’‘N, 97°43’37.01” E), Lijiang (26°41’38.15’‘N, 100°1’45.55’‘E), and Ngari in Tibet (32°19’30.07’‘N, 80°1’34.18’‘E).

Continue reading “Real-world intercontinental quantum communications enabled by the Micius satellite” »

Jan 12, 2018

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

Posted by in categories: encryption, military, privacy

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

Jan 11, 2018

Tougher WiFi security will keep you safe at the coffee shop

Posted by in categories: encryption, habitats, internet, security, wearables

WiFi security hasn’t changed much since WPA2 came to be in 2004, and that’s becoming increasingly apparent when public hotspots are frequently risky and glaring exploits are all too common. It’s about to get a long-due upgrade, though: the Wi-Fi Alliance plans to roll out a WPA3 standard that addresses a number of weak points. For many, the highlight will be individualized data encryption. Even if you’re on an open public network, you won’t have to worry quite so much about someone snooping on your data.

You’ll also see safeguards even when people have terrible passwords, and a simplified security process for devices that have either a tiny display or none at all (say, wearable devices or smart home gadgets). And companies or governments that need stricter security will have access to a 192-bit security suite.

WPA3 should arrive sometime in 2018, and comes on the back of other improvements like more thorough testing to catch potential vulnerabilities before they require emergency patches. These initiatives aren’t going to guarantee airtight security when you’re at the coffee shop, but they could at least eliminate some of WiFi’s more worrying flaws.

Continue reading “Tougher WiFi security will keep you safe at the coffee shop” »

Jan 4, 2018

Nanoscale cryptography method gains robustness from stiction

Posted by in categories: encryption, internet, nanotechnology, security

Most of the cryptographic methods that keep important data secure use complex encryption software, and as a result, consume large amounts of power. As more and more electronic devices are being connected to the internet, there is a growing need for alternative low-power security methods, and this is often done by basing the security on hardware rather than software.

One of the most promising approaches to hardware-based, low-power security is to derive cryptographic keys from the randomness that inherently and uncontrollably emerges during the of nanoscale devices. These methods, called “physical unclonable functions” (PUFs), convert the random variations in the physical devices into the binary states of “0” and “1” to create unique, random cryptographic keys. These keys can then be used to encrypt data into cipher text, as well as decrypt it back into plain text, in a process that remains secure as long as the key remains private.

However, one of the biggest challenges facing PUF technology is its vulnerability to harsh environments. Since the physical randomness that forms the basis of the key usually arises from variations in electrical characteristics, and electrical characteristics are affected by external factors such as high temperatures and radiation, these devices often do not preserve their states when exposed to such conditions.

Continue reading “Nanoscale cryptography method gains robustness from stiction” »

Dec 18, 2017

Canadian QEYSSat Quantum Satellite Program Gets Next Round of Funding

Posted by in categories: economics, encryption, government, quantum physics, space travel

The Canadian Space Agency (CSA) has awarded $1.85M contract to the University of Waterloo for the Quantum Encryption and Science Satellite (QEYSSat) mission.

The QEYSSat mission was one of two projects cited in the 2017 budget when it was unveiled in March of this year. In April, the government sent Innovation Science and Economic Development (ISED) Minister Navdeep Bains to the CSA’s headquarters to formally announce the funding for the QEYSSat mission along with funding for a radar instrument that will be developed for a future orbiter mission to Mars and to announce the Canadian CubeSat Project. The $80.9M of funding would be over five years.

A short history of the QEYSSat mission.

Continue reading “Canadian QEYSSat Quantum Satellite Program Gets Next Round of Funding” »

Dec 1, 2017

Cryptography and radar won WW2 and today Quantum military technologies are similarly critical

Posted by in categories: encryption, military, policy, quantum physics

Cryptography and radar were technologies that won World War 2. Broken codes let the allies know where major forces were being moved. So the US fleet could choose where to intercept the Japanese Navy for the Battle of Midway. Radar and sonar then provided realtime tracking of the Japanese forces during the battle.

This is a summary of information from a Foreign Policy article by Thomas E. Ricks.

Quantum entanglement, quantum superposition, and quantum tunneling can be applied in new forms of computation, sensing, and cryptography.

Continue reading “Cryptography and radar won WW2 and today Quantum military technologies are similarly critical” »

Nov 29, 2017

This breakthrough quantum encryption tool could make the web “hack-proof”

Posted by in categories: encryption, internet, quantum physics

Researchers have doubled the speed at which quantum distribution keys can be transmitted.

Science.

Read more

Nov 4, 2017

Supporting a decentralized, uncensored Internet for every person on the planet

Posted by in categories: bitcoin, cryptocurrencies, encryption, internet

What makes a better Internet possible? At Orchid Labs, our goal is to ensure that every person on Earth can have access to an open, decentralized, and uncensored Internet. We believe a better Internet is one that isn’t controlled by the few, but open to all.

Currently, Internet access for the majority of the people on Earth is censored and monitored. Because of this, many Internet users are blocked from freely communicating, collaborating, and accessing information. The current centralized system, which limits our ability to communicate and learn — while also harvesting and selling our personal data — is far from the full potential of what the internet could be and strays from the original intention of its creators.

That’s why we’ve launched the Orchid Protocol, an open-source overlay network that uses excess bandwidth on top of the existing Internet to ensure that people — no matter where they live on our planet — can have unrestricted access to information and collaboration. Orchid’s protocol combines surplus bandwidth, state-of-the-art encryption, and a decentralized infrastructure enabling any Internet user to participate and exchange bandwidth for payment in peer-to-peer transactions using Orchid tokens on the Ethereum blockchain.

Read more

Oct 31, 2017

How China is using quantum physics to take over the world and stop hackers

Posted by in categories: encryption, quantum physics

China is leading the world in developing unbreakable encryption using quantum physics.

Read more

Oct 15, 2017

A single photon reveals quantum entanglement of 16 million atoms

Posted by in categories: encryption, quantum physics

Quantum theory predicts that a vast number of atoms can be entangled and intertwined by a very strong quantum relationship, even in a macroscopic structure. Until now, however, experimental evidence has been mostly lacking, although recent advances have shown the entanglement of 2,900 atoms. Scientists at the University of Geneva (UNIGE), Switzerland, recently reengineered their data processing, demonstrating that 16 million atoms were entangled in a one-centimetre crystal. They have published their results in Nature Communications.

The laws of allow immediately detecting when emitted signals are intercepted by a third party. This property is crucial for data protection, especially in the encryption industry, which can now guarantee that customers will be aware of any interception of their messages. These signals also need to be able to travel long distances using special relay devices known as quantum repeaters—crystals enriched with rare earth and cooled to 270 degrees below zero (barely three degrees above absolute zero), whose atoms are entangled and unified by a very strong quantum relationship. When a photon penetrates this small crystal block, is created between the billions of atoms it traverses. This is explicitly predicted by the theory, and it is exactly what happens as the crystal re-emits a single photon without reading the information it has received.

It is relatively easy to entangle two particles: Splitting a photon, for example, generates two that have identical properties and behaviours. Florian Fröwis, a researcher in the applied group in UNIGE’s science faculty, says, “But it’s impossible to directly observe the process of entanglement between several million atoms since the mass of data you need to collect and analyse is so huge.”

Continue reading “A single photon reveals quantum entanglement of 16 million atoms” »

Page 40 of 58First3738394041424344Last