Menu

Blog

Archive for the ‘encryption’ category

Nov 30, 2024

An unexpected delay in a standard quantum optical process generates pairs of photons

Posted by in categories: encryption, energy, quantum physics

Since it was first demonstrated in the 1960s, spontaneous parametric down-conversion (SPDC) has been at the center of many quantum optics experiments that test the fundamental laws of physics in quantum mechanics, and in applications like quantum simulation, quantum cryptography, and quantum metrology.

SPDC is the spontaneous splitting of a photon into two after it passes through a nonlinear object like certain crystals. The process is nonlinear and instantaneous, and the two output photons (called the signal photon and idler photon) satisfy conservation of energy and momentum compared to the input photon (the pump photon). SPDC is often used with a specially designed crystal to create pairs of entangled photons.

A research team from Canada has discovered that there is a delay between the detection of the two output photons, one that depends on the intensity of the incoming light that impacts the crystal. They call this a “gain-induced group delay.”

Nov 23, 2024

Quantum Computing and state-sponsored Cyber Warfare: How quantum will transform Nation-State Cyber Attacks

Posted by in categories: cybercrime/malcode, encryption, information science, mathematics, military, quantum physics

The rise of quantum computing is more than a technological advancement; it marks a profound shift in the world of cybersecurity, especially when considering the actions of state-sponsored cyber actors. Quantum technology has the power to upend the very foundations of digital security, promising to dismantle current encryption standards, enhance offensive capabilities, and recalibrate the balance of cyber power globally. As leading nations like China, Russia, and others intensify their investments in quantum research, the potential repercussions for cybersecurity and international relations are becoming alarmingly clear.

Imagine a world where encrypted communications, long thought to be secure, could be broken in mere seconds. Today, encryption standards such as RSA or ECC rely on complex mathematical problems that would take traditional computers thousands of years to solve. Quantum computing, however, changes this equation. Using quantum algorithms like Shor’s, a sufficiently powerful quantum computer could factorize these massive numbers, effectively rendering these encryption methods obsolete.

This capability could give state actors the ability to decrypt communications, access sensitive governmental data, and breach secure systems in real time, transforming cyber espionage. Instead of months spent infiltrating networks and monitoring data flow, quantum computing could provide immediate access to critical information, bypassing traditional defenses entirely.

Nov 14, 2024

Post-Quantum API Security: Preparing Your APIs for Q-Day

Posted by in categories: computing, encryption, information science, quantum physics, security

In our increasingly interconnected digital world, the foundations of secure communication and data privacy are built upon cryptographic algorithms that have stood the test of time.


Discover how quantum computing threatens current API security and learn strategies to prepare your APIs for Q-Day by adopting post-quantum cryptography solutions.

Nov 13, 2024

Embracing The Future Of Cryptography And Identity Management

Posted by in categories: encryption, quantum physics

Looking ahead to 2025, it’s time for organizations to put the right tools and processes in place to prepare for post-quantum cryptography.

Nov 9, 2024

Dude, Where’s My Quantum Computer? Is the Field Stuck in Limbo?

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, internet, quantum physics

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about recent discoveries about quantum computers.
Links:
https://journals.aps.org/prapplied/abstract/10.1103/PhysRevApplied.22.034003
http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf.
https://arxiv.org/pdf/2307.03236
https://www.science.org/doi/10.1126/sciadv.adn8907
https://qiskit.github.io/qiskit-aer/stubs/qiskit_aer.QasmSimulator.html.
https://arxiv.org/abs/2302.00936
Previous videos:
https://youtu.be/Jl7RLrA69pg.

https://youtu.be/dPqNZ4aya8s.
#quantum #quantumcomputing #quantumcomputer.

Continue reading “Dude, Where’s My Quantum Computer? Is the Field Stuck in Limbo?” »

Nov 9, 2024

New tool bypasses Google Chrome’s new cookie encryption system

Posted by in categories: cybercrime/malcode, encryption

A researcher has released a tool to bypass Google’s new App-Bound encryption cookie-theft defenses and extract saved credentials from the Chrome web browser.

The tool, named ‘Chrome-App-Bound-Encryption-Decryption,’ was released by cybersecurity researcher Alexander Hagenah after he noticed that others were already figuring out similar bypasses.

Although the tool achieves what multiple infostealer operations have already added to their malware, its public availability raises the risk for Chrome users who continue to store sensitive data in their browsers.

Oct 27, 2024

NIST Advances 14 Candidates in Post-Quantum Cryptography Digital Signatures Process

Posted by in categories: encryption, information science, quantum physics

PRESS RELEASE — After over a year of evaluation, NIST has selected 14 candidates for the second round of the Additional Digital Signatures for the NIST PQC Standardization Process. The advancing digital signature algorithms are:

NIST Internal Report (IR) 8528 describes the evaluation criteria and selection process. Questions may be directed to [email protected]. NIST thanks all of the candidate submission teams for their efforts in this standardization process as well as the cryptographic community at large, which helped analyze the signature schemes.

Moving forward, the second-round candidates have the option of submitting updated specifications and implementations (i.e., “tweaks”). NIST will provide more details to the submission teams in a separate message. This second phase of evaluation and review is estimated to last 12–18 months.

Oct 19, 2024

In a global first, quantum computers crack RSA and AES data encryption

Posted by in categories: computing, encryption, information science, quantum physics

A team of Chinese researchers, led by Wang Chao from Shanghai University, has demonstrated that D-Wave’s quantum annealing computers can crack encryption methods that safeguard sensitive global data.

This breakthrough, published in the Chinese Journal of Computers, emphasizes that quantum machines are closer than expected to threatening widely used cryptographic systems, including RSA and Advanced Encryption Standard (AES).

The research team’s experiments focused on leveraging D-Wave’s quantum technology to solve cryptographic problems. In their paper, titled “Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage,” the researchers explained how quantum annealing could transform cryptographic attacks into combinatorial optimization problems, making them more manageable for quantum systems.

Oct 14, 2024

Understanding Qubits: The Heartbeat of Quantum Computing

Posted by in categories: biotech/medical, computing, encryption, quantum physics

Discover how qubits, the building blocks of quantum computing, are revolutionizing fields like medicine and cryptography. Learn why they’re the future.

Oct 13, 2024

Inside @ibm’s Quantum System Two, The World’s First Modular Utility Scale Quantum Computer

Posted by in categories: business, encryption, mathematics, quantum physics, robotics/AI

#ibm #heron #quantumcomputer #quantumphysics #softwareengineering #developers #programming #artificialintelligence #ai #neuralnetworks #machinelearning #explorepage #financialmarkets #cryptography #business #productdevelopment #researchanddevelopment #computerscience #qubit #engineering #technology #startups #science #mathematics #innovation #invention

Page 1 of 5912345678Last