Blog

Archive for the ‘encryption’ category: Page 2

Aug 23, 2024

Researchers propose a smaller, more noise-tolerant quantum factoring circuit for cryptography

Posted by in categories: computing, encryption, information science, quantum physics

The most recent email you sent was likely encrypted using a tried-and-true method that relies on the idea that even the fastest computer would be unable to efficiently break a gigantic number into factors.

Quantum computers, on the other hand, promise to rapidly crack complex cryptographic systems that a classical computer might never be able to unravel. This promise is based on a quantum factoring proposed in 1994 by Peter Shor, who is now a professor at MIT.

But while researchers have taken great strides in the last 30 years, scientists have yet to build a quantum computer powerful enough to run Shor’s algorithm.

Aug 20, 2024

Kirigami cubes make a novel mechanical computer

Posted by in categories: computing, encryption

A new mechanical computer made from an array of rigid, interconnected plastic cubes can store, retrieve and erase data simply by stretching the array and manipulating the position of the cubes. The device’s construction is inspired by the ancient Japanese art of paper cutting, or kirigami, and its designers at North Carolina State University in the US say that more advanced versions could be used in stable, high-density memory and logic computing; in information encryption and decryption; and to create displays based on three-dimensional units called voxels.

Mechanical computers were first developed in the 19th century and do not contain any electronic components. Instead, they perform calculations with levers and gears. We don’t often hear about such contraptions these days, but researchers led by NC State mechanical and aerospace engineer Jie Yin are attempting to bring them back due to their stability and their capacity for storing complex information.

Aug 17, 2024

General Dynamics to build multifunction maritime radios with NSA Type 1 encryption for ships and submarines

Posted by in categories: computing, encryption, military, privacy

Related: SDR: a spectrum of possibilities

NAVWAR awarded the order on behalf of the Navy’s Program Executive Office for Command, Control, Communication, Computers, and Intelligence (PEO C4I) in San Diego.

The AN/USC-61© is a maritime software-defined radio (SDR) that has become standard for the U.S. military. The compact, multi-channel DMR provides several different waveforms and multi-level information security for voice and data communications.

Aug 14, 2024

NIST’s post-quantum cryptography standards are here

Posted by in categories: encryption, information science, quantum physics

The US National Institute of Standards and Technology has released Federal Information Processing Standards (FIPS) publications for three quantum-resistant cryptographic algorithms.

In a landmark announcement, the National Institute of Standards and Technology (NIST) has published its first set of post-quantum cryptography (PQC) standards. This announcement serves as an inflection point in modern cybersecurity: as the global benchmark for cryptography, the NIST standards signal to enterprises, government agencies, and supply chain vendors that the time has come to make the world’s information security systems resistant to future cryptographically relevant quantum computers.

Continue reading “NIST’s post-quantum cryptography standards are here” »

Aug 13, 2024

NIST Finalizes Post-Quantum Encryption Standards

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

Three new encryption algorithms to bolster global cybersecurity efforts against future attacks using quantum technologies were published today by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. The new standards are designed for two tasks: general encryption and digital signatures.

These new standards are the culmination of an eight-year effort from the agency to tap the best minds in cybersecurity to devise the next generation of cryptography strong enough to withstand quantum computers. Experts expect quantum computers capable of breaking current current cryptographic algorithms within a decade. The new standards, the first released by NIST’s post-quantum cryptography (PQC) standardization project, are published on the department’s website. The documents contain the algorithms’ computer code, instructions for how to implement them in products and in encryption systems, and use cases for each.

Aug 12, 2024

Chip that entangles four photons opens up possibility of inviolable quantum encryption

Posted by in categories: computing, encryption, information science, mathematics, quantum physics, security

Unlike classical encryption, which relies on mathematical algorithms, quantum encryption assures security based on physical principles. Detection of espionage or interference is guaranteed by unavoidable alteration of the quantum states involved.

Jul 24, 2024

Event-driven optical encryption advances information security through neuromorphic imaging

Posted by in categories: computing, encryption, internet, security

In an era where the internet connects virtually every aspect of our lives, the security of information systems has become paramount. Safeguarding critical databases containing private and commercial information presents a formidable challenge, driving researchers to explore advanced encryption techniques for enhanced protection.

Data encryption, a cornerstone of modern practices, transforms readable plaintext into encoded ciphertext, ensuring that only authorized recipients can decipher the data using a decryption key or password. Optical techniques have emerged as promising tools for encryption due to their capabilities for parallel, high-speed transmission, and low-power consumption. However, traditional optical encryption systems often suffer from vulnerabilities where plaintext-ciphertext forms remain identical, potentially compromising security.

Reporting in Advanced Photonics Nexus, scientists have unveiled an approach inspired by bio-inspired neuromorphic imaging and speckle correlography. Their innovative technique leverages computational neuromorphic imaging (CNI) to encrypt images into event-stream ciphertexts, marking a significant departure from conventional methods. This method introduces a new paradigm in optical encryption by converting data into event-driven formats, thereby significantly enhancing security and complexity.

Jul 8, 2024

How Quantum Computing Is Already Changing the World

Posted by in categories: computing, encryption, quantum physics, security

The power of quantum computing drives a desperate need for quantum encryption. This megatrend is creating a multi-billion-dollar security market.

Jul 8, 2024

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Posted by in categories: computing, encryption, security

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews.

This innovative work, led by Professor Aydogan Ozcan and his team, showcases a reconfigurable diffractive optical network capable of executing high-dimensional permutation operations, offering a significant leap forward in telecommunications and data security applications.

Permutation operations, essential for various applications, including telecommunications and encryption, have traditionally relied on electronic hardware. However, the UCLA team’s advancement uses all-optical diffractive computing to perform these operations in a multiplexed manner, significantly improving efficiency and scalability.

Jul 8, 2024

Europol says Home Routing mobile encryption feature aids criminals

Posted by in categories: encryption, habitats, law enforcement

Europol is proposing solutions to avoid challenges posed by privacy-enhancing technologies in Home Routing that hinder law enforcement’s ability to intercept communications during criminal investigations.

The agency has previously highlighted in its Digital Challenges series that law enforcement problem of end-to-end encryption on communication platforms is a hurdle when it comes to collecting admissible evidence.

Page 2 of 5812345678Last