Menu

Blog

Archive for the ‘encryption’ category: Page 51

May 5, 2016

IBM Brings Quantum Computing to the Masses

Posted by in categories: computing, encryption, quantum physics

My verdict will continue to be out on this version. Unless we truly see a QC environment where the full testing of Cryptography, infrastructure, etc. is tested then at best we’re only looking at a pseudo version of QC. Real QC is reached when the infrastructure fully can take advantage of QC not just one server or one platform means we have arrived on QC. So, I caution folks from over-hyping things because the backlash will be extremely costly and detrimental to many.


IBM has taken its quantum computing technology to the cloud to enable users to run experiments on an IBM quantum processor.

Big Blue has come a long way, baby. IBM announced it is making quantum computing available on the IBM Cloud to accelerate innovation in the field and find new applications for the technology.

Continue reading “IBM Brings Quantum Computing to the Masses” »

May 2, 2016

Could Aluminum Nitride Be Engineered to Produce Quantum Bits?

Posted by in categories: encryption, quantum physics, supercomputing

Interesting insight on Aluminum Nitride used to create Qubits.

http:///articles/could-aluminum-nitride-be-engineered-to-pro…nteresting insight.


Newswise — Quantum computers have the potential to break common cryptography techniques, search huge datasets and simulate quantum systems in a fraction of the time it would take today’s computers. But before this can happen, engineers need to be able to harness the properties of quantum bits or qubits.

Continue reading “Could Aluminum Nitride Be Engineered to Produce Quantum Bits?” »

Apr 30, 2016

Russia’s NDS Uses Blockchain For E-Proxy Voting

Posted by in categories: bitcoin, encryption

Recently the Russia’s National Settlement Depository (NDS), an organization that provides settlement and depository services, began testing blockchain technology as a potential solution for a corporate e-proxy voting system. The results will not shock you but the origin of praise for the system just might.

NDS began looking into solutions for e-proxy voting in August of 2014. The prototype they recently tested is based on the NXT platform. The system also adheres to the ISO 20022 standard for messaging. NDS worked with the UK based DSX Technologies to develop the e-proxy voting system. The recent testing was conducted during a bondholder meeting.

With this e-proxy voting system, cascade messaging is enabled through a chain of nominee accounts. This chain is from the issuer to the voter and then back. In this configuration, NSD manages the database for the chain in order to ultimately oversee that all voting protocol was followed during the process. All of the information that is on the blockchain is then encrypted and able to be viewed by participants. The digital signatures embedded in the blockchain provide verification that the voting is within the time constraints allotted, all votes are accounted for, and that the process is transparent.

Continue reading “Russia’s NDS Uses Blockchain For E-Proxy Voting” »

Apr 29, 2016

Futuristic ‘post-quantum’ cryptography is subject of UWT symposium

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics, supercomputing

Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the responses.


The University of Washington Tacoma Institute of Technology will present a discussion about the esoteric field of post-quantum cryptography at the Northwest Cybersecurity Symposium on May 5.

“I’ve been researching post-quantum cryptography for years, finding ways to protect against a threat that doesn’t yet exist,” said Anderson Nascimento, assistant professor of computer science at the institute, in a release.

Continue reading “Futuristic ‘post-quantum’ cryptography is subject of UWT symposium” »

Apr 28, 2016

Technology moving too fast for governments to keep up, says former DARPA chief

Posted by in categories: drones, encryption, government, internet, military, satellites

Hmmm; I guess the government needs to change its mode of operations. I believe that everyone has been saying this for a while now.


Technology companies are moving too fast for governments to keep up, according to a former chief of the US Defense Advanced Research Projects Agency (DARPA).

Kaigham (Ken) Gabriel was acting director of DARPA and the man behind drone technology and global positioning satellites, as well as the military’s top secret, high-tech operation responsible for inventing the forerunner to the internet, Arpanet.

Continue reading “Technology moving too fast for governments to keep up, says former DARPA chief” »

Apr 23, 2016

DARPA looking to develop encrypted message app

Posted by in categories: encryption, innovation

The Defense Advanced Research Projects Agency is looking to take its own swing at an encrypted messaging app.

April 22, 2016.

The Defense Information Systems Agency, like many other federal agencies and the Defense Department as a whole, is bullish on embracing the small, innovative startups popping up in private sector, particularly Silicon Valley. But finding a way to integrate those fast-moving startups into DISA’s rules-encumbered procurement process remains a major hurdle.

Read more

Apr 18, 2016

Will Quantum Encryption Arrive Before Quantum Computers Break All Our Passwords?

Posted by in categories: computing, encryption, engineering, quantum physics

Australia is making great strides in this area as well.


Scientists are racing to deploy foolproof quantum encryption before quantum computers come along that render all our passwords useless.

Passwords work today because the computers we have, while theoretically capable of breaking passwords, would take an impractical amount of time to do so.

Continue reading “Will Quantum Encryption Arrive Before Quantum Computers Break All Our Passwords?” »

Apr 12, 2016

Long-range secure quantum communication system developed

Posted by in categories: business, encryption, finance, information science, quantum physics, security

Scientists from ITMO University in Saint Petersburg, Russia have enabled the longer distance (250 Kilos) of secured data transmission occur via Quantum. Nice; and should be a wake up call to the US as well on advancing their efforts more.


A group of scientists from ITMO University in Saint Petersburg, Russia has developed a novel approach to the construction of quantum communication systems for secure data exchange. The experimental device based on the results of the research is capable of transmitting single-photon quantum signals across distances of 250 kilometers or more, which is on par with other cutting edge analogues. The research paper was published in the Optics Express journal.

Information security is becoming more and more of a critical issue not only for large companies, banks and defense enterprises, but even for small businesses and individual users. However, the data encryption algorithms we currently use for protecting our data are imperfect — in the long-term, their logic can be cracked. Regardless of how complex and intricate the algorithm is, getting round it is just the matter of time.

Continue reading “Long-range secure quantum communication system developed” »

Apr 7, 2016

Quantum technologies: from mobile phones to supercomputers

Posted by in categories: encryption, mobile phones, quantum physics, supercomputing

Beautiful future lays ahead in QC.


Quantum physics not only explains how matter behaves at the subatomic level, but is also used to create many devices in our everyday lives, from lasers and transistors to GPS and mobile phones. The next wave of innovation could lead to unbreakable encryption and computers that are up to one million times faster. On 6 April, Parliament’s Science and Technology Options Assessment (STOA) unit organised a workshop to discuss with experts the potential of these new quantum technologies.

Exploiting the quirks of the quantum world

Continue reading “Quantum technologies: from mobile phones to supercomputers” »

Apr 6, 2016

How AI-powered robots will protect the networked soldier

Posted by in categories: encryption, robotics/AI

DARPA’s “Squad X” uses Android tablets, encrypted real-time communication, and Artificial Intelligence to save lives.

Read more

Page 51 of 58First4849505152535455Last