Blog

Archive for the ‘encryption’ category: Page 29

May 26, 2020

First Object Teleported from Earth to Orbit

Posted by in categories: encryption, quantum physics, satellites

Essentially a quantum radar teleportation device could entangle objects anywhere in the universe.


Last year, a Long March 2D rocket took off from the Jiuquan Satellite Launch Centre in the Gobi Desert carrying a satellite called Micius, named after an ancient Chinese philosopher who died in 391 B.C. The rocket placed Micius in a Sun-synchronous orbit so that it passes over the same point on Earth at the same time each day.

Micius is a highly sensitive photon receiver that can detect the quantum states of single photons fired from the ground. That’s important because it should allow scientists to test the technological building blocks for various quantum feats such as entanglement, cryptography, and teleportation.

Continue reading “First Object Teleported from Earth to Orbit” »

May 23, 2020

Critical “Starbleed” vulnerability in FPGA chips identified

Posted by in categories: computing, encryption, mobile phones, security

April 2020


Field programmable gate arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. In a joint research project, scientists from the Horst Görtz Institute for IT Security at Ruhr-Universität Bochum and from Max Planck Institute for Security and Privacy have now discovered that a critical vulnerability is hidden in these chips. They called the security bug “Starbleed.” Attackers can gain complete control over the chips and their functionalities via the vulnerability. Since the bug is integrated into the hardware, the security risk can only be removed by replacing the chips. The manufacturer of the FPGAs has been informed by the researchers and has already reacted.

The researchers will present the results of their work at the 29th Usenix Security Symposium to be held in August 2020 in Boston, Massachusetts, U.S… The has been available for download on the Usenix website since April 15, 2020.

Continue reading “Critical ‘Starbleed’ vulnerability in FPGA chips identified” »

May 21, 2020

Samsung made a Galaxy S20 Tactical Edition for the military

Posted by in categories: encryption, government, military, mobile phones

Samsung has a hardened version of the Galaxy S20, but don’t reach for your credit card — it’s not what you were expecting, and you probably can’t get one. The company has introduced a Galaxy S20 Tactical Edition that, as the name suggests, is designed to meet the needs of the US military and federal government. It touts two layers of encryption strong enough to handle top secret data and connects to tactical radios and mission systems out of the box.

There are combat-related conveniences, too. One mode can turn the display on and off while you’re wearing night vision goggles, while a stealth mode turns off LTE and and mutes all RF broadcasts to eliminate even the slightest chance of eavesdropping. It’s also easy to unlock the phone in landscape mode so that you can quickly launch an app while the device is mounted to your chest.

This is otherwise a run-of-the-mill Galaxy S20 with a 6.2-inch, 1440p display, a Snapdragon 865 processor, 12GB of RAM, 128GB of expandable storage, a 4,000mAh battery and the usual arrays of front and rear cameras. Although Samsung shows the Tactical Edition in a rugged casing, there’s no mention of the phone itself being rugged.

May 17, 2020

Samsung Galaxy A Quantum announced with quantum encryption technology

Posted by in categories: encryption, internet, mobile phones, quantum physics, security

Samsung and South Korean carrier SK Telecom today announced a new 5G smartphone dubbed Galaxy A Quantum.

The Samsung Galaxy A Quantum is the world’s first 5G smartphone equipped with a quantum random number generator (QRNG) chipset, which is developed by SK Telecom’s Switzerland-based subsidiary ID Quantique.

The QRNG chipset is the SKT IDQ S2Q000 and it enhances the security of the phone’s data by using quantum encryption technology to generate random numbers and create unpredictable secure keys.

May 16, 2020

Microwave quantum illumination using a digital receiver

Posted by in categories: biotech/medical, encryption, internet, quantum physics

Quantum illumination uses entangled signal-idler photon pairs to boost the detection efficiency of low-reflectivity objects in environments with bright thermal noise. Its advantage is particularly evident at low signal powers, a promising feature for applications such as noninvasive biomedical scanning or low-power short-range radar. Here, we experimentally investigate the concept of quantum illumination at microwave frequencies. We generate entangled fields to illuminate a room-temperature object at a distance of 1 m in a free-space detection setup. We implement a digital phase-conjugate receiver based on linear quadrature measurements that outperforms a symmetric classical noise radar in the same conditions, despite the entanglement-breaking signal path. Starting from experimental data, we also simulate the case of perfect idler photon number detection, which results in a quantum advantage compared with the relative classical benchmark. Our results highlight the opportunities and challenges in the way toward a first room-temperature application of microwave quantum circuits.

Quantum sensing is well developed for photonic applications (1) in line with other advanced areas of quantum information (25). Quantum optics has been, so far, the most natural and convenient setting for implementing the majority of protocols in quantum communication, cryptography, and metrology (6). The situation is different at longer wavelengths, such as tetrahertz or microwaves, for which the current variety of quantum technologies is more limited and confined to cryogenic environments. With the exception of superconducting quantum processing (7), no microwave quanta are typically used for applications such as sensing and communication. For these tasks, high-energy and low-loss optical and telecom frequency signals represent the first choice and form the communication backbone in the future vision of a hybrid quantum internet (810).

Despite this general picture, there are applications of quantum sensing that are naturally embedded in the microwave regime. This is exactly the case with quantum illumination (QI) (11–17) for its remarkable robustness to background noise, which, at room temperature, amounts to ∼103 thermal quanta per mode at a few gigahertz. In QI, the aim is to detect a low-reflectivity object in the presence of very bright thermal noise. This is accomplished by probing the target with less than one entangled photon per mode, in a stealthy noninvasive fashion, which is impossible to reproduce with classical means. In the Gaussian QI protocol (12), the light is prepared in a two-mode squeezed vacuum state with the signal mode sent to probe the target, while the idler mode is kept at the receiver.

May 7, 2020

Intro to Quantum Computing

Posted by in categories: computing, encryption, quantum physics

Quantum computing is seen by many as a technology of the future. In this article, we’re going to look at how to run some non-trivial programs on actual quantum computers. In particular, we’re going to discuss something called graph states. Graph states are used for quantum cryptography, quantum error correction, and measurement based quantum computing. If all of that sounds like a foreign language, that’s okay. We’re going to go through everything, from the ground up, and in detail…and don’t worry, we’ll keep it light and fun.

May 2, 2020

Could Photonic Chips Outpace the Fastest Supercomputers?

Posted by in categories: encryption, quantum physics, robotics/AI, supercomputing

There’s been a lot of talk about quantum computers being able to solve far more complex problems than conventional supercomputers. The authors of a new paper say they’re on the pat h to showing an optical computer c an do so, too.

The idea of using light to carry out computing has a long pedigree, and it has gained traction in recent years with the advent of silicon photonics, which makes it possible to build optical circuits using the same underlying technology used for electronics. The technology s hows particular promise for accelerating deep learning, and is being actively pursued by Intel and a number of startups.

Now Chinese researchers have put a photonic chip t o work tackling a fiendishly complex computer science challenge called the s ubset sum problem in a paper in Science Advances. It ha s some potential applications in cryptography and resource allocation, but primarily it’s used as a benchmark to test the limits of computing.

Apr 29, 2020

German scientists invent working teleporter, of sorts

Posted by in category: encryption

Circa 2015


New system destructively scans objects transmits them through encrypted communications across any distance and rebuilds it the other side.

Apr 21, 2020

Scientists Explore Underwater Quantum Links for Submarines

Posted by in categories: encryption, internet, quantum physics, satellites

:oooo.


Underwater quantum links are possible across 30 meters (100 feet) of turbulent water, scientists have shown. Such findings could help to one day secure quantum communications for submarines.

Quantum cryptography exploits the quantum properties of particles such as photons to help encrypt and decrypt messages in a theoretically unhackable way. Scientists worldwide are now endeavoring to develop satellite-based quantum communications networks for a global real-time quantum Internet.

Continue reading “Scientists Explore Underwater Quantum Links for Submarines” »

Apr 2, 2020

Elon Musk’s SpaceX bans Zoom over privacy concerns

Posted by in categories: education, Elon Musk, encryption, privacy, space travel

NASA, one of SpaceX’s biggest customers, also prohibits its employees from using Zoom, said Stephanie Schierholz, a spokeswoman for the U.S. space agency.

The Federal Bureau of Investigation’s Boston office on Monday issued a warning about Zoom, telling users not to make meetings on the site public or share links widely after it received two reports of unidentified individuals invading school sessions, a phenomenon known as “zoombombing.”

Investigative news site The Intercept on Tuesday reported that Zoom video is not end-to-end encrypted between meeting participants, and that the company could view sessions.

Page 29 of 58First2627282930313233Last