Menu

Blog

Archive for the ‘encryption’ category: Page 16

Jan 5, 2023

Quantum Breakthrough: Light Source Produces Two Entangled Light Beams

Posted by in categories: computing, encryption, neuroscience, quantum physics

One potential application: Enhancing the sensitivity of atomic magnetometers used to measure the alpha waves emitted by the human brain.

Scientists are increasingly seeking to discover more about quantum entanglement, which occurs when two or more systems are created or interact in such a manner that the quantum states of some cannot be described independently of the quantum states of the others. The systems are correlated, even when they are separated by a large distance. Interest in studying this kind of phenomenon is due to the significant potential for applications in encryption, communications, and quantum computing.

Performing computation using quantum-mechanical phenomena such as superposition and entanglement.

Jan 3, 2023

Researchers develop a light source that produces two entangled light beams

Posted by in categories: computing, encryption, quantum physics

Scientists are increasingly studying quantum entanglement, which occurs when two or more systems are created or interact in such a manner that the quantum states of some cannot be described independently of the quantum states of the others. The systems are correlated, even when they are separated by a large distance. The significant potential for applications in encryption, communications and quantum computing spurs research. The difficulty is that when the systems interact with their surroundings, they almost immediately become disentangled.

In the latest study by the Laboratory for Coherent Manipulation of Atoms and Light (LMCAL) at the University of São Paulo’s Physics Institute (IF-USP) in Brazil, the researchers succeeded in developing a light source that produced two entangled light beams. Their work is published in Physical Review Letters.

“This light source was an optical parametric oscillator, or OPO, which is typically made up of a non-linear optical response crystal between two mirrors forming an optical cavity. When a bright green beam shines on the apparatus, the crystal-mirror dynamics produces two light beams with ,” said physicist Hans Marin Florez, last author of the article.

Dec 30, 2022

Experts Warn of “Quantum Apocalypse”

Posted by in categories: computing, encryption, quantum physics

Experts are warning that quantum computers could eventually overpower conventional encryption methods, a potentially dangerous fate for humanity that they’re evocatively dubbing the “quantum apocalypse,” the BBC reports.

Cracking today’s toughest encryption would take virtually forever today — but with the advent of quantum computers, they’re warning, the process could be cut down to mere seconds.

And that kind of number-crunching power could have disastrous consequences if it were to land in the wrong hands.

Dec 25, 2022

The Biggest Discoveries in Computer Science in 2022

Posted by in categories: computing, encryption, internet, mathematics, quantum physics, science, security

As computer scientists tackle a greater range of problems, their work has grown increasingly interdisciplinary. This year, many of the most significant computer science results also involved other scientists and mathematicians. Perhaps the most practical involved the cryptographic questions underlying the security of the internet, which tend to be complicated mathematical problems. One such problem — the product of two elliptic curves and their relation to an abelian surface — ended up bringing down a promising new cryptography scheme that was thought to be strong enough to withstand an attack from a quantum computer. And a different set of mathematical relationships, in the form of one-way functions, will tell cryptographers if truly secure codes are even possible.

Computer science, and quantum computing in particular, also heavily overlaps with physics. In one of the biggest developments in theoretical computer science this year, researchers posted a proof of the NLTS conjecture, which (among other things) states that a ghostly connection between particles known as quantum entanglement is not as delicate as physicists once imagined. This has implications not just for our understanding of the physical world, but also for the myriad cryptographic possibilities that entanglement makes possible.

Dec 3, 2022

Google is testing end-to-end encryption for group chats in the Messages app

Posted by in category: encryption

Google said today it is testing end-to-end encryption for RCS-based group chats on its Messages app — RCS stands for Rich Communication Services. The company noted that in the coming weeks it will be rolling out this feature to select users that are part of the app’s open beta program.

This comes after a bunch of Redditors noticed that Google was testing end-to-end encryption for group chats in October. The company’s latest announcement makes it official.

The search giant first started testing end-to-end encryption for individual RCS chats in 2020. In June, it rolled out the feature to all users of its Messages app.

Nov 24, 2022

Decades-old math theorem cracks US government encryption algorithm

Posted by in categories: computing, encryption, government, information science, mathematics, quantum physics, security

The information security landscape is rapidly changing in response to quantum computing technology, which is capable of cracking modern encryption techniques in minutes, but a promising US government encryption algorithm for the post-quantum world was just cracked in less than an hour thanks to a decades-old math theorem.

In July 2022, the US National Institute of Standards and Technology (NIST) chose a set of encryption algorithms that it hoped would stand up to the encryption-cracking power of quantum computers and tasked researchers with probing them for vulnerabilities, offering a $50,000 prize for anyone who was able to break the encryption.

Nov 22, 2022

Cybersecurity 101: How to choose and use an encrypted messaging app

Posted by in categories: cybercrime/malcode, encryption, mobile phones

Secure communications provider Wickr has announced that it will shutter its free encrypted messaging app, Wickr Me, next year.


Text messaging has been around since the dawn of cellular technology, and sparked its own unique language. But it’s time to put sending regular SMS messages out to pasture.

If you have an iPhone, you’re already on your way. iPhones (as well as iPads and Macs) use iMessage to send messages between Apple devices. It’s a data-based messaging system reliant on 3G, 4G, and Wi-Fi, rather than SMS messaging, which uses an old, outdated but universal 2G cellular network. iMessage has grown in popularity, but has left Android devices and other computers out in the dark.

Continue reading “Cybersecurity 101: How to choose and use an encrypted messaging app” »

Nov 21, 2022

Amazon-owned Wickr is shutting down its free encrypted messaging app

Posted by in category: encryption

Secure communications provider Wickr has announced that it will shutter its free encrypted messaging app, Wickr Me, next year.

Wickr was founded in 2011 and became one of the first mainstream end-to-end encrypted messaging apps, until it was acquired by Amazon’s cloud services giant Amazon Web Services in 2021.

In a post published Friday, Amazon said that Wickr Me will shut down for good on December 31, 2023. Amazon says the app will stop accepting new user registrations on December 31, 2022 before it’s discontinued completely the following year.

Nov 20, 2022

Quantum effects in memristive devices

Posted by in categories: encryption, nanotechnology, quantum physics, robotics/AI

At the nanoscale, the laws of classical physics suddenly become inadequate to explain the behavior of matter. It is precisely at this juncture that quantum theory comes into play, effectively describing the physical phenomena characteristic of the atomic and subatomic world. Thanks to the different behavior of matter on these length and energy scales, it is possible to develop new materials, devices and technologies based on quantum effects, which could yield a real quantum revolution that promises to innovate areas such as cryptography, telecommunications and computation.

The physics of very small objects, already at the basis of many technologies that we use today, is intrinsically linked to the world of nanotechnologies, the branch of applied science dealing with the control of matter at the nanometer scale (a nanometer is one billionth of a meter). This control of matter at the is at the basis of the development of new electronic devices.

Among these, are considered promising devices for the realization of new computational architectures emulating functions of our brain, allowing the creation of increasingly efficient computation systems suitable for the development of the entire artificial intelligence sector, as recently shown by Istituto Nazionale di Ricerca Metrologica (INRiM) researchers in collaboration with several international universities and research institutes.

Nov 16, 2022

Smart home hubs leave users vulnerable to hackers

Posted by in categories: encryption, robotics/AI, security

Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.

Smart technology claims to make our lives easier. You can turn on your lights, lock your front door remotely and even adjust your thermostat with the click of a button.

But new research from the University of Georgia suggests that convenience potentially comes at a cost—your personal security.

Page 16 of 59First1314151617181920Last