Blog

Archive for the ‘encryption’ category: Page 2

Jan 11, 2024

Quantum Leap: The New Frontier of Polymer Simulations

Posted by in categories: biological, chemistry, computing, encryption, mathematics, quantum physics

A new study shows how quantum computing can be harnessed to discover new properties of polymer systems central to biology and material science.

The advent of quantum computing is opening previously unimaginable perspectives for solving problems deemed beyond the reach of conventional computers, from cryptography and pharmacology to the physical and chemical properties of molecules and materials. However, the computational capabilities of present-day quantum computers are still relatively limited. A newly published study in Science Advances fosters an unexpected alliance between the methods used in quantum and traditional computing.

The research team, formed by Cristian Micheletti and Francesco Slongo of SISSA in Trieste, Philipp Hauke of the University of Trento, and Pietro Faccioli of the University of Milano-Bicocca, used a mathematical approach called QUBO (from “Quadratic Unconstraint Binary Optimization”) that is ideally suited for specific quantum computers, called “quantum annealers.”

Jan 10, 2024

Single-Photon Source Marks Quantum Cryptography Gain

Posted by in categories: computing, encryption, engineering, internet, nanotechnology, quantum physics

Producing photons one at a time on demand at room temperature is a key requirement for the rollout of a quantum internet—and the practical quantum computers that would undergird that network. The photons can be used as quantum bits (qubits), the quantum equivalent of classical computing’s 0s and 1s. Labs around the world have devised various ways to generate single photons, but they can involve complex engineering techniques such as doped carbon nanotubes or costly cryogenically-cooled conditions. On the other hand, less complicated techniques such as using traditional light sources do not provide the necessary level of control over single-photon emissions required for quantum networks and computers.

Now, researchers from Tokyo University of Science (TUS) and the Okinawa Institute of Science and Technology have collaborated to develop a prototype room temperature single-photon light source using standard materials and methods. The team described the fabrication of the prototype and its results in a recent issue of the journal Physical Review Applied.

“Our single-photon light source … increases the potential to create quantum networks—a quantum internet—that are cost-effective and accessible.” —Kaoru Sanaka, Tokyo University of Science.

Jan 8, 2024

Overcoming ‘Noise’ Challenges: A Leap Forward in Quantum Computing

Posted by in categories: computing, encryption, finance, quantum physics

Over the past twenty years, many companies, including Google, Microsoft, and IBM, have invested in quantum computing development. Investors have contributed over $5 billion to this cause. The aim is to use quantum physics properties to process information in ways that traditional computers cannot. Quantum computing could impact various fields, including drug discovery, cryptography, finance, and supply-chain logistics. However, the excitement around this technology has led to a mix of claims, making it hard to gauge the actual progress.

The main challenge in developing quantum computers is managing the ‘noise’ that can interfere with these sensitive systems. Quantum systems can be disrupted by disturbances like stray photons from heat, random signals from nearby electronics, or physical vibrations. This noise can cause errors or stop a quantum computation. Regardless of the processor size or the technology’s potential uses, a quantum computer will not surpass a classical computer unless the noise is controlled.

For a while, researchers thought they might have to tolerate some noise in their quantum systems, at least temporarily. They looked for applications that could still work effectively with this constraint. However, recent theoretical and experimental advances suggest that the noise issue might soon be resolved. A mix of hardware and software strategies is showing potential for reducing and correcting quantum errors. Earl Campbell, vice president of quantum science at Riverlane, a UK-based quantum computing company, believes there is growing evidence to be hopeful about quantum computing’s future.

Jan 6, 2024

Fear is not an argument for rejecting artificial intelligence

Posted by in categories: biotech/medical, economics, encryption, genetics, quantum physics, robotics/AI

Scientific knowledge can progress rapidly, yet its social, economic, and political impacts often unfold at a painstakingly slow pace. The medicine of the 21st century draws upon genetic and embryological breakthroughs of the 19th century. Our current technology is firmly grounded in quantum physics, which was formulated a century ago. And the topic of the day, artificial intelligence (AI), traces its origins to the secret weapons research during World War II.

‌In 1935, the brilliant British mathematician, Alan Turing, envisioned a conceptual computer. His genius would later lead him to crack the Enigma code used by German submarines for secret communications during the war. Turing’s contributions extended beyond cryptography, as he introduced fundamental concepts of AI, including the training of artificial neural networks. Benedict Cumberbatch portrayed Turing in the 2014 film The Imitation Game, which earned a screenplay Oscar that year. All this historical context brings us to the heart of the current AI revolution.

‌AI uses neural networks, also known as artificial neural networks, which are comprised of multiple layers of artificial neurons. Each neuron receives numerous inputs from the lower layer and produces a single output to the upper layer, similar to the dendrites and axon of natural neurons. As information progresses through each layer, it gradually becomes more abstract, resembling the process that occurs in the visual cortex of our brains.

Jan 3, 2024

Nearly 11 million SSH servers vulnerable to new Terrapin attacks

Posted by in categories: encryption, internet

Almost 11 million internet-exposed SSH servers are vulnerable to the Terrapin attack that threatens the integrity of some SSH connections.

The Terrapin attack targets the SSH protocol, affecting both clients and servers, and was developed by academic researchers from Ruhr University Bochum in Germany.

It manipulates sequence numbers during the handshake process to compromise the integrity of the SSH channel, particularly when specific encryption modes like ChaCha20-Poly1305 or CBC with Encrypt-then-MAC are used.

Jan 2, 2024

Quantum Key Distribution for Secure Optical Communication

Posted by in categories: encryption, quantum physics, security

In the modern digital age, where data flows freely and sensitive information is constantly in transit, secure communication has become essential. Traditional encryption methods, while effective, are not immune to the evolving threat landscape. This is where quantum key distribution (QKD) emerges as a revolutionary solution, offering unmatched security for transmitting sensitive data.

Image Credit: asharkyu/Shutterstock.com

The idea of quantum key distribution (QKD) dates back to Stephen Wiesner’s concept of quantum conjugate coding at Columbia University in the 1970s. Charles H. Bennett later built on this idea, introducing the first QKD protocol, BB84, in the 1980s, using nonorthogonal states. Since then, it has matured into one of the most established quantum technologies, commercially available for over 15 years.

Jan 2, 2024

China, Russia claim to have tested hack-proof quantum communication link

Posted by in categories: cybercrime/malcode, encryption, quantum physics

The secure quantum communication covered a distance of about 4,000 kilometers using China’s quantum satellite Mozi.


Scientists in Russia and China have established quantum communication encrypted with the help of secure keys transmitted by China’s quantum satellite, reports SCMP.

Dec 29, 2023

Post-quantum cryptography counters computing like Schrödinger’s Cat

Posted by in categories: business, computing, encryption, government, quantum physics

Businesses and government agencies must scan code for RSA & old protocols, replacing them with post-quantum cryptography to thwart quantum threats to encryption.

Dec 28, 2023

Can a New Law of Physics Explain a Black Hole Paradox?

Posted by in categories: blockchains, cosmology, encryption, quantum physics, robotics/AI

When the theoretical physicist Leonard Susskind encountered a head-scratching paradox about black holes, he turned to an unexpected place: computer science. In nature, most self-contained systems eventually reach thermodynamic equilibrium… but not black holes. The interior volume of a black hole appears to forever expand without limit. But why? Susskind had a suspicion that a concept called computational complexity, which underpins everything from cryptography to quantum computing to the blockchain and AI, might provide an explanation.

He and his colleagues believe that the complexity of quantum entanglement continues to evolve inside a black hole long past the point of what’s called “heat death.” Now Susskind and his collaborator, Adam Brown, have used this insight to propose a new law of physics: the second law of quantum complexity, a quantum analogue of the second law of thermodynamics.

Continue reading “Can a New Law of Physics Explain a Black Hole Paradox?” »

Dec 27, 2023

A logical magic state with fidelity beyond distillation threshold realized on superconducting quantum processor

Posted by in categories: computing, encryption, quantum physics

Quantum computers have the potential to outperform conventional computers on some tasks, including complex optimization problems. However, quantum computers are also vulnerable to noise, which can lead to computational errors.

Engineers have been trying to devise fault-tolerant approaches that could be more resistant to noise and could thus be scaled up more robustly. One common approach to attain fault-tolerance is the preparation of magic states, which introduce so-called non-Clifford gates.

Researchers at University of Science and Technology of China, the Henan Key Laboratory of Quantum Information and Cryptography and the Hefei National Laboratory recently demonstrated the preparation of a logical magic state with fidelity beyond the distillation threshold on a superconducting quantum processor. Their paper, published in Physical Review Letters, outlines a viable and effective strategy to generate high-fidelity logical magic states, an approach to realize fault-tolerant quantum computing.

Page 2 of 5412345678Last