Blog

Archive for the ‘encryption’ category: Page 36

Apr 8, 2019

QC — Cracking RSA with Shor’s Algorithm

Posted by in categories: cybercrime/malcode, encryption, information science

With new advances in technology it all comes down to simple factoring. Classical factoring systems are outdated where some problems would take 80 billion years to solve but with new technologies such as the dwave 2 it can bring us up to speed to do the same problems in about 2 seconds. Shores algorithm shows us also we can hack anything with it simply would need the technology and code simple enough and strong enough. Basically with new infrastructure we can do like jason…


RSA is the standard cryptographic algorithm on the Internet. The method is publicly known but extremely hard to crack. It uses two keys for encryption. The public key is open and the client uses it to encrypt a random session key. Anyone intercepts the encrypted key must use the second key, the private key, to decrypt it. Otherwise, it is just garbage. Once the session key is decrypted, the server uses it to encrypt and decrypt further messages with a faster algorithm. So, as long as we keep the private key safe, the communication will be secure.

RSA encryption is based on a simple idea: prime factorization. Multiplying two prime numbers is pretty simple, but it is hard to factorize its result. For example, what are the factors for 507,906,452,803? Answer: 566,557 × 896,479.

Continue reading “QC — Cracking RSA with Shor’s Algorithm” »

Mar 6, 2019

Inside the high-stakes race to make quantum computers work

Posted by in categories: computing, encryption, finance, quantum physics

Quantum computers could help explain some of the most fundamental mysteries in the universe and upend everything from finance to encryption – if only someone could get them to work.

Read more

Feb 28, 2019

Mammalian Near-Infrared Image Vision through Injectable and Self-Powered Retinal Nanoantennae

Posted by in categories: encryption, energy, military, nanotechnology

Mice with vision enhanced by nanotechnology were able to see infrared light as well as visible light, reports a study published February 28 in the journal Cell. A single injection of nanoparticles in the mice’s eyes bestowed infrared vision for up to 10 weeks with minimal side effects, allowing them to see infrared light even during the day and with enough specificity to distinguish between different shapes. These findings could lead to advancements in human infrared vision technologies, including potential applications in civilian encryption, security, and military operations.


Injectable photoreceptor-binding nanoparticles with the ability to convert photons from low-energy to high-energy forms allow mice to develop infrared vision without compromising their normal vision and associated behavioral responses.

Read more

Feb 15, 2019

One step closer to complex quantum teleportation

Posted by in categories: encryption, information science, quantum physics, robotics/AI

Circa 2018


The experimental mastery of complex quantum systems is required for future technologies like quantum computers and quantum encryption. Scientists from the University of Vienna and the Austrian Academy of Sciences have broken new ground. They sought to use more complex quantum systems than two-dimensionally entangled qubits and thus can increase the information capacity with the same number of particles. The developed methods and technologies could in the future enable the teleportation of complex quantum systems. The results of their work, “Experimental Greenberger-Horne-Zeilinger entanglement beyond qubits,” is published recently in the renowned journal Nature Photonics.

Similar to bits in conventional computers, qubits are the smallest unit of in . Big companies like Google and IBM are competing with research institutes around the world to produce an increasing number of entangled qubits and develop a functioning quantum computer. But a research group at the University of Vienna and the Austrian Academy of Sciences is pursuing a new path to increase the information capacity of complex quantum systems.

Continue reading “One step closer to complex quantum teleportation” »

Feb 4, 2019

Canadian cryptocurrency fund boss Gerald Cotten died – and US$190million of his investors’ money may be encrypted forever

Posted by in categories: cosmology, cryptocurrencies, economics, encryption

US$190 million in investors’ money has been locked since Cotten died in December. His widow says she doesn’t know his passwords.


About US$190 million in cryptocurrency has been locked away in a online black hole after the founder of a currency exchange died, apparently taking his encrypted access to their money with him.

Investors in QuadrigaCX, Canada’s largest cryptocurrency exchange, have been unable to access their funds since its founder, Gerald Cotten, died last year.

Continue reading “Canadian cryptocurrency fund boss Gerald Cotten died – and US$190million of his investors’ money may be encrypted forever” »

Jan 12, 2019

Quantum computing explained in 10 minutes

Posted by in categories: biotech/medical, computing, encryption, quantum physics

A quantum computer isn’t just a more powerful version of the computers we use today; it’s something else entirely, based on emerging scientific understanding — and more than a bit of uncertainty. Enter the quantum wonderland with TED Fellow Shohini Ghose and learn how this technology holds the potential to transform medicine, create unbreakable encryption and even teleport information.

Read more

Jan 4, 2019

The Unlikely Origins of the First Quantum Computer

Posted by in categories: biotech/medical, chemistry, encryption, quantum physics, robotics/AI

Within days of each other back in 1998, two teams published the results of the first real-world quantum computations. But the first quantum computers weren’t computers at all. They were biochemistry equipment, relying on the same science as MRI machines.

You might think of quantum computing as a hyped-up race between computer companies to build a powerful processing device that will make more lifelike AI, revolutionize medicine, and crack the encryption that protects our data. And indeed, the prototype quantum computers of the late 1990s indirectly led to the quantum computers built by Google and IBM. But that’s not how it all began—it started with physicists tinkering with mathematics and biochemistry equipment for curiosity’s sake.

Read more

Dec 31, 2018

T cell photos make data encryption truly random

Posted by in categories: encryption, security

Uncrackable encryption keys made from images of 2,000 wiggling T cells could keep your data safe from hackers and security breaches.

Read more

Dec 28, 2018

Start Preparing Now for the Post-Quantum Future

Posted by in categories: economics, encryption, quantum physics, robotics/AI, security

Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.

Search on the phrase “quantum computing,” and you’ll find a furious debate. On the one hand, you’ll read breathless articles predicting groundbreaking advances in artificial intelligence, genomics, economics, and pretty much every field under the sun. On the other, you’ll find the naysayers: It’s all hype. Large-scale quantum computers are still decades away — if they’re possible at all. Even if they arrive, they won’t be much faster than standard computers except for a tiny subset of problems.

There’s one area, however, where you’ll find all sides agree: Quantum computing will break most of the encryption schemes on which we rely today. If you’re responsible for your organization’s IT or security systems, and that sentence made the hair on the back of your neck stand up, good. To get ready for a post-quantum world, you should be thinking about the problem now.

Continue reading “Start Preparing Now for the Post-Quantum Future” »

Dec 17, 2018

Mathematicians Seal Back Door to Breaking RSA Encryption

Posted by in categories: encryption, mathematics, security

Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work.

Read more

Page 36 of 58First3334353637383940Last