Blog

Archive for the ‘encryption’ category: Page 25

Jan 6, 2021

Physicists observe competition between magnetic orders

Posted by in categories: computing, encryption, nanotechnology, quantum physics, security

They are as thin as a hair, only a hundred thousand times thinner—so-called two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They became known to a wider audience when two Russian-British scientists were awarded the Nobel Prize in Physics in 2010 for the discovery of graphene, a building block of graphite. The special feature of such materials is that they possess novel properties that can only be explained with the help of the laws of quantum mechanics and that may be relevant for enhanced technologies. Researchers at the University of Bonn (Germany) have now used ultracold atoms to gain new insights into previously unknown quantum phenomena. They found out that the magnetic orders between two coupled thin films of atoms compete with each other. The study has been published in the journal Nature.

Quantum systems realize very unique states of matter originating from the world of nanostructures. They facilitate a wide variety of new technological applications, e.g. contributing to secure data encryption, introducing ever smaller and faster technical devices and even enabling the development of a quantum computer. In the future, such a computer could solve problems which conventional computers cannot solve at all or only over a long period of time.

How unusual quantum phenomena arise is still far from being fully understood. To shed light on this, a team of physicists led by Prof. Michael Köhl at the Matter and Light for Quantum Computing Cluster of Excellence at the University of Bonn are using so-called quantum simulators, which mimic the interaction of several quantum particles—something that cannot be done with conventional methods. Even state-of-the-art computer models cannot calculate complex processes such as magnetism and electricity down to the last detail.

Jan 6, 2021

The world’s first integrated quantum communication network

Posted by in categories: encryption, energy, finance, quantum physics, satellites

Chinese scientists have established the world’s first integrated quantum communication network, combining over 700 optical fibers on the ground with two ground-to-satellite links to achieve quantum key distribution over a total distance of 4600 kilometers for users across the country. The team, led by Jianwei Pan, Yuao Chen, Chengzhi Peng from the University of Science and Technology of China in Hefei, reported in Nature their latest advances towards the global, practical application of such a network for future communications.

Unlike conventional encryption, quantum communication is considered unhackable and therefore the future of secure information transfer for banks, power grids and other sectors. The core of quantum communication is quantum key distribution (QKD), which uses the quantum states of particles—e.g. photons—to form a string of zeros and ones, while any eavesdropping between the sender and the receiver will change this string or key and be noticed immediately. So far, the most common QKD technology uses optical fibers for transmissions over several hundred kilometers, with high stability but considerable channel loss. Another major QKD technology uses the free space between satellites and ground stations for thousand-kilometer-level transmissions. In 2016, China launched the world’s first quantum communication satellite (QUESS, or Mozi/Micius) and achieved QKD with two ground stations which are 2600 km apart.

Dec 30, 2020

LeukemiaAiResearch/HIAS

Posted by in categories: biotech/medical, encryption, robotics/AI

Genies like Adam are busy.


HIAS is an open-source Hospital Intelligent Automation System designed to control and manage an intelligent network of IoT connected devices. The network server provides locally hosted and encrypted databases, and a secure proxy to route traffic to the connected devices.

Dec 30, 2020

Aerolysin nanopores decode digital information stored in tailored macromolecular analytes

Posted by in categories: bioengineering, biological, chemistry, computing, encryption, genetics, information science

Digital data storage is a growing need for our society and finding alternative solutions than those based on silicon or magnetic tapes is a challenge in the era of “big data.” The recent development of polymers that can store information at the molecular level has opened up new opportunities for ultrahigh density data storage, long-term archival, anticounterfeiting systems, and molecular cryptography. However, synthetic informational polymers are so far only deciphered by tandem mass spectrometry. In comparison, nanopore technology can be faster, cheaper, nondestructive and provide detection at the single-molecule level; moreover, it can be massively parallelized and miniaturized in portable devices. Here, we demonstrate the ability of engineered aerolysin nanopores to accurately read, with single-bit resolution, the digital information encoded in tailored informational polymers alone and in mixed samples, without compromising information density. These findings open promising possibilities to develop writing-reading technologies to process digital data using a biological-inspired platform.

DNA has evolved to store genetic information in living systems; therefore, it was naturally proposed to be similarly used as a support for data storage (1–3), given its high-information density and long-term storage with respect to existing technologies based on silicon and magnetic tapes. Alternatively, synthetic informational polymers have also been described (5–9) as a promising approach allowing digital storage. In these polymers, information is stored in a controlled monomer sequence, a strategy that is also used by nature in genetic material. In both cases, single-molecule data writing is achieved mainly by stepwise chemical synthesis (3, 10, 11), although enzymatic approaches have also been reported (12). While most of the progress in this area has been made with DNA, which was an obvious starting choice, the molecular structure of DNA is set by biological function, and therefore, there is little space for optimization and innovation.

Dec 26, 2020

The FBI is Secretly Breaking Into Encrypted Devices. We’re Suing

Posted by in category: encryption

We can’t let the FBI keep the public in the dark about its ability to gain access to information stored on our personal mobile devices.

Dec 17, 2020

Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states

Posted by in categories: computing, encryption, quantum physics, security

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets1,2,3.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols5,6,7,8. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available9,10,11.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

Nov 29, 2020

What Is the Signal Encryption Protocol?

Posted by in category: encryption

As the Signal protocol becomes the industry standard, it’s worth understanding what sets it apart from other forms of end-to-end encrypted messaging.

Nov 23, 2020

Why You Should Stop Texting From Your Android Messages App

Posted by in categories: encryption, mobile phones, security

If you’re a user of Google’s Messages app on your Android smartphone, then you will now likely have the RCS update intended to bring standard text messaging into the current century. RCS is now available in all major countries except China, Russia and Iran. Building on standard SMS capabilities, this adds chat functionality to compete with WhatsApp and iMessage. But, in truth, it doesn’t compete at all. There’s a glaring issue that doesn’t look like being properly fixed anytime soon. This is now bad enough that you should now go use something else.

The issue, of course, is end-to-end encryption. Six months ago, reports emerged that Google was developing this level of security to upgrade RCS. As of this week, this is now finally available for public beta testing. On the surface, its intent is to deliver Android users with an iMessage alternative. But there is a glaring issue—and it’s a deal breaker. This deployment of end-to-end encryption on RCS is not available for groups—that’s seemingly too complex to handle right now. And there’s also no word yet as to when this limited upgrade might be rolled out.

With that in mind, Android users should opt for a different iMessage-like alternative. Fortunately, there is a simple solution available now. While its standard messenger is not end-to-end encrypted by default, Android offers users the option to select an alternative default messenger that does. Signal is the best secure messenger available. And while its install base is modest in comparison to WhatsApp or iMessage, it’s growing fast.

Nov 13, 2020

Graphene for quantum computing

Posted by in categories: computing, encryption, quantum physics

Quantum computing is a new paradigm in computing that utilizes the benefits of quantum mechanics to enhance the computing experience. Quantum computers will no longer rely on binary digits (0 and 1 states), that computers have relied on since the early beginnings, but will instead use quantum bits, which can be in a superposition of states. Quantum bits, or qubits, have the advantage of being in many states at once, offering parallel computing advantages. For example, they have long been regarded as far superior to classical computers for applications in data encryption.

Although the concept of quantum computers has been known for several decades, practical realizations are still lacking. The main limiting factor has been the critical influence of the environment on a qubit. Most physical systems need to be in perfectly controlled conditions in order to remain in the superposition state, whereas any interaction (mechanical, thermal, or other) with the environment perturbs this state and ruins the qubit. Such perturbation is termed “decoherence” that has plagued many potential qubit systems.

Graphene, having spurred research into numerous novel directions, is naturally also considered as a candidate material host for qubits. For example, back in 2013, a team of researchers from MIT found that graphene can be made into a topological insulator – meaning that electrons with one spin direction move around the graphene edges clockwise, whereas those that have the opposite spin move counterclockwise. They made this happen by applying two magnetic fields: one perpendicular to the graphene sheet, to make the electrons flow at sheet edges only, and another parallel to the sheet, that separates the two spin contributions. Electron spin has long been considered a candidate qubit, because it is inherently a quantum system that is in a superposition of states. In graphene, the spins move along the sheet edges robustly, without much decoherence. Furthermore, the same research showed switching the spin selection on and off, an important feature of q-bit transistors.

Nov 10, 2020

Computer Scientists Achieve ‘Crown Jewel’ of Cryptography

Posted by in categories: computing, encryption

A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work.

Page 25 of 58First2223242526272829Last