Menu

Blog

Archive for the ‘encryption’ category: Page 3

Jul 3, 2024

Scientists achieve first intercity quantum key distribution with deterministic single-photon source

Posted by in categories: cybercrime/malcode, encryption, information science, mathematics, quantum physics

Conventional encryption methods rely on complex mathematical algorithms and the limits of current computing power. However, with the rise of quantum computers, these methods are becoming increasingly vulnerable, necessitating quantum key distribution (QKD).

QKD is a technology that leverages the unique properties of quantum physics to secure data transmission. This method has been continuously optimized over the years, but establishing large networks has been challenging due to the limitations of existing quantum light sources.

In a new article published in Light: Science & Applications, a team of scientists in Germany have achieved the first intercity QKD experiment with a deterministic single-photon source, revolutionizing how we protect our confidential information from cyber threats.

Jul 3, 2024

New open-source software for quantum cryptography is greater than the sum of its parts

Posted by in categories: computing, encryption, quantum physics

Accurate models of real-world scenarios are important for bringing theoretical and experimental research together in meaningful ways. Creating these realistic computer models, however, is a very large undertaking. Significant amounts of data, code, and expertise across a wide range of intricate areas are needed to create useful and comprehensive software.

Dr. Norbert Lütkenhaus, executive director of the Institute for Quantum Computing (IQC) and a professor in the University of Waterloo’s Department of Physics and Astronomy, alongside his research group, have spent the last several years developing accurate software models for research in quantum key distribution (QKD).

QKD is a process for cryptography that harnesses fundamental principles of quantum mechanics to exchange secret keys, which can then be used to ensure secure communication.

Jun 27, 2024

Metamaterial Marvel: Kirigami Cubes Unlock the Future of Mechanical Computing

Posted by in categories: computing, encryption

Researchers have developed a novel mechanical computer inspired by kirigami, utilizing interconnected polymer cubes for data storage without electronics.

This system allows for multiple stable states, enhancing binary computing to potentially include additional data states. The design, leveraging the principles of kirigami, enables complex data storage and computation structures with practical applications in mechanical encryption and haptic systems.

Mechanical Computing Innovation

Jun 2, 2024

“Metaholograms” — Scientists Have Developed a New, Better Type of Hologram

Posted by in categories: augmented reality, computing, encryption, holograms, virtual reality

New “metaholograms” could transform AR/VR technologies by enabling crosstalk-free, high-fidelity image projection with vastly increased information capacity.

Researchers have developed a new type of holograms, known as “metaholograms,” capable of projecting multiple high-fidelity images free of crosstalk. This innovation opens doors to advanced applications in virtual and augmented reality (AR/VR) displays, data storage, and image encryption.

Metaholograms offer several advantages over traditional holograms, including broader operational bandwidth, higher imaging resolution, wider viewing angle, and more compact size. However, a major challenge for metaholograms has been their limited information capacity which only allows them to project a few independent images. Existing methods typically can provide a small number of display channels and often suffer from inter-channel crosstalk during image projections.

May 30, 2024

‘Metaholograms’: Researchers develop a new type of hologram

Posted by in categories: augmented reality, encryption, holograms, security, virtual reality

This innovation has the potential to significantly improve AR/VR displays by enabling the projection of more complex and realistic scenes. It also holds promise for applications in image encryption, where the information is encoded into multiple holographic channels for enhanced security.

The research is a significant step forward in developing high-performance metaholograms with a vastly increased information capacity. This study paves the way for exciting new possibilities in various fields, from advanced displays to information encryption and .

May 23, 2024

New Windows AI feature records everything you’ve done on your PC

Posted by in categories: encryption, robotics/AI

“Recall uses Copilot+ PC advanced processing capabilities to take images of your active screen every few seconds,” Microsoft says on its website. “The snapshots are encrypted and saved on your PC’s hard drive. You can use Recall to locate the content you have viewed on your PC using search or on a timeline bar that allows you to scroll through your snapshots.”

By performing a Recall action, users can access a snapshot from a specific time period, providing context for the event or moment they are searching for. It also allows users to search through teleconference meetings they’ve participated in and videos watched using an AI-powered feature that transcribes and translates speech.

At first glance, the Recall feature seems like it may set the stage for potential gross violations of user privacy. Despite reassurances from Microsoft, that impression persists for second and third glances as well. For example, someone with access to your Windows account could potentially use Recall to see everything you’ve been doing recently on your PC, which might extend beyond the embarrassing implications of pornography viewing and actually threaten the lives of journalists or perceived enemies of the state.

May 16, 2024

Why China, the U.S., and Big Tech Are Racing to Harness Quantum Computing and AI

Posted by in categories: economics, encryption, military, quantum physics, robotics/AI

Micius is considered quantum’s “Sputnik” moment, prompting American policymakers to funnel hundreds of millions of dollars into quantum information science via the National Quantum Initiative. Bills such as the Innovation and Competition Act of 2021 have provided $1.5 billion for communications research, including quantum technology. The Biden Administration’s proposed 2024 budget includes $25 billion for “emerging technologies” including AI and quantum. Ultimately, quantum’s awesome computing power will soon render all existing cryptography obsolete, presenting a security migraine for governments and corporations everywhere.

Quantum’s potential to turbocharge AI also applies to the simmering technology competition between the world’s superpowers. In 2021, the U.S. Commerce Department added eight Chinese quantum computing organizations to its Entity List, claiming they “support the military modernization of the People’s Liberation Army” and adopt American technologies to develop “counter-stealth and counter-submarine applications, and the ability to break encryption.”

These restrictions dovetail with a raft of measures targeting China’s AI ambitions, including last year blocking Nvida from selling AI chips to Chinese firms. The question is whether competition between the world’s top two economies stymies overall progress on AI and quantum—or pushes each nation to accelerate these technologies. The answer could have far-reaching consequences.

Apr 29, 2024

We’re Looking at Brainwave Technology All Wrong

Posted by in categories: biological, encryption, robotics/AI

Here’s my new Opinion article for Newsweek on brainwave technology and AI. Check it out!


Historically, our greatest strength is our biological form, tested and evolved over millions of years. Instead of spending resources searching for ways to connect technology directly to our minds, we could find ways to use technology to protect our biological thoughts and proclivity. That might mean faraday cages around our brains that no super intelligent AIs signals could crack—as well as encryption where our code perpetually changes randomly.

Another way to protect against AI is for humans to become like bugs—a concept recently explored in the Netflix series 3 Body Problem. Companies are already working on trying to scan the brain—down to its atoms—in real time. Eventually, the hope is we’ll be able to upload our consciousnesses into computers. There’s open debate whether an upload is the real you. But for purposes of protecting ourselves against AI, another important question is how many uploads of you would there be? If AI was inundated with trillions upon trillions of uploaded human minds, it’s possible, like bugs, AI would never win a battle to get rid all of us, even if it wanted to. There would simply be too many of us in the cloud, even if there was just one of us in the flesh.

Continue reading “We’re Looking at Brainwave Technology All Wrong” »

Apr 28, 2024

Google Chrome’s new post-quantum cryptography may break TLS connections

Posted by in categories: encryption, information science, quantum physics

Some Google Chrome users report having issues connecting to websites, servers, and firewalls after Chrome 124 was released last week with the new quantum-resistant X25519Kyber768 encapsulation mechanism enabled by default.

Google started testing the post-quantum secure TLS key encapsulation mechanism in August and has now enabled it in the latest Chrome version for all users.

The new version utilizes the Kyber768 quantum-resistant key agreement algorithm for TLS 1.3 and QUIC connections to protect Chrome TLS traffic against quantum cryptanalysis.

Apr 26, 2024

Almost every Chinese keyboard app has a security flaw that reveals what users type

Posted by in categories: encryption, security

An encryption loophole in these apps leaves nearly a billion people vulnerable to eavesdropping.

Page 3 of 5812345678Last