Menu

Blog

Archive for the ‘encryption’ category: Page 3

Jan 8, 2024

Overcoming ‘Noise’ Challenges: A Leap Forward in Quantum Computing

Posted by in categories: computing, encryption, finance, quantum physics

Over the past twenty years, many companies, including Google, Microsoft, and IBM, have invested in quantum computing development. Investors have contributed over $5 billion to this cause. The aim is to use quantum physics properties to process information in ways that traditional computers cannot. Quantum computing could impact various fields, including drug discovery, cryptography, finance, and supply-chain logistics. However, the excitement around this technology has led to a mix of claims, making it hard to gauge the actual progress.

The main challenge in developing quantum computers is managing the ‘noise’ that can interfere with these sensitive systems. Quantum systems can be disrupted by disturbances like stray photons from heat, random signals from nearby electronics, or physical vibrations. This noise can cause errors or stop a quantum computation. Regardless of the processor size or the technology’s potential uses, a quantum computer will not surpass a classical computer unless the noise is controlled.

For a while, researchers thought they might have to tolerate some noise in their quantum systems, at least temporarily. They looked for applications that could still work effectively with this constraint. However, recent theoretical and experimental advances suggest that the noise issue might soon be resolved. A mix of hardware and software strategies is showing potential for reducing and correcting quantum errors. Earl Campbell, vice president of quantum science at Riverlane, a UK-based quantum computing company, believes there is growing evidence to be hopeful about quantum computing’s future.

Jan 6, 2024

Fear is not an argument for rejecting artificial intelligence

Posted by in categories: biotech/medical, economics, encryption, genetics, quantum physics, robotics/AI

Scientific knowledge can progress rapidly, yet its social, economic, and political impacts often unfold at a painstakingly slow pace. The medicine of the 21st century draws upon genetic and embryological breakthroughs of the 19th century. Our current technology is firmly grounded in quantum physics, which was formulated a century ago. And the topic of the day, artificial intelligence (AI), traces its origins to the secret weapons research during World War II.

‌In 1935, the brilliant British mathematician, Alan Turing, envisioned a conceptual computer. His genius would later lead him to crack the Enigma code used by German submarines for secret communications during the war. Turing’s contributions extended beyond cryptography, as he introduced fundamental concepts of AI, including the training of artificial neural networks. Benedict Cumberbatch portrayed Turing in the 2014 film The Imitation Game, which earned a screenplay Oscar that year. All this historical context brings us to the heart of the current AI revolution.

‌AI uses neural networks, also known as artificial neural networks, which are comprised of multiple layers of artificial neurons. Each neuron receives numerous inputs from the lower layer and produces a single output to the upper layer, similar to the dendrites and axon of natural neurons. As information progresses through each layer, it gradually becomes more abstract, resembling the process that occurs in the visual cortex of our brains.

Jan 3, 2024

Nearly 11 million SSH servers vulnerable to new Terrapin attacks

Posted by in categories: encryption, internet

Almost 11 million internet-exposed SSH servers are vulnerable to the Terrapin attack that threatens the integrity of some SSH connections.

The Terrapin attack targets the SSH protocol, affecting both clients and servers, and was developed by academic researchers from Ruhr University Bochum in Germany.

It manipulates sequence numbers during the handshake process to compromise the integrity of the SSH channel, particularly when specific encryption modes like ChaCha20-Poly1305 or CBC with Encrypt-then-MAC are used.

Jan 2, 2024

Quantum Key Distribution for Secure Optical Communication

Posted by in categories: encryption, quantum physics, security

In the modern digital age, where data flows freely and sensitive information is constantly in transit, secure communication has become essential. Traditional encryption methods, while effective, are not immune to the evolving threat landscape. This is where quantum key distribution (QKD) emerges as a revolutionary solution, offering unmatched security for transmitting sensitive data.

Image Credit: asharkyu/Shutterstock.com

The idea of quantum key distribution (QKD) dates back to Stephen Wiesner’s concept of quantum conjugate coding at Columbia University in the 1970s. Charles H. Bennett later built on this idea, introducing the first QKD protocol, BB84, in the 1980s, using nonorthogonal states. Since then, it has matured into one of the most established quantum technologies, commercially available for over 15 years.

Jan 2, 2024

China, Russia claim to have tested hack-proof quantum communication link

Posted by in categories: cybercrime/malcode, encryption, quantum physics

The secure quantum communication covered a distance of about 4,000 kilometers using China’s quantum satellite Mozi.


Scientists in Russia and China have established quantum communication encrypted with the help of secure keys transmitted by China’s quantum satellite, reports SCMP.

Dec 29, 2023

Post-quantum cryptography counters computing like Schrödinger’s Cat

Posted by in categories: business, computing, encryption, government, quantum physics

Businesses and government agencies must scan code for RSA & old protocols, replacing them with post-quantum cryptography to thwart quantum threats to encryption.

Dec 28, 2023

Can a New Law of Physics Explain a Black Hole Paradox?

Posted by in categories: blockchains, cosmology, encryption, quantum physics, robotics/AI

When the theoretical physicist Leonard Susskind encountered a head-scratching paradox about black holes, he turned to an unexpected place: computer science. In nature, most self-contained systems eventually reach thermodynamic equilibrium… but not black holes. The interior volume of a black hole appears to forever expand without limit. But why? Susskind had a suspicion that a concept called computational complexity, which underpins everything from cryptography to quantum computing to the blockchain and AI, might provide an explanation.

He and his colleagues believe that the complexity of quantum entanglement continues to evolve inside a black hole long past the point of what’s called “heat death.” Now Susskind and his collaborator, Adam Brown, have used this insight to propose a new law of physics: the second law of quantum complexity, a quantum analogue of the second law of thermodynamics.

Continue reading “Can a New Law of Physics Explain a Black Hole Paradox?” »

Dec 27, 2023

A logical magic state with fidelity beyond distillation threshold realized on superconducting quantum processor

Posted by in categories: computing, encryption, quantum physics

Quantum computers have the potential to outperform conventional computers on some tasks, including complex optimization problems. However, quantum computers are also vulnerable to noise, which can lead to computational errors.

Engineers have been trying to devise fault-tolerant approaches that could be more resistant to noise and could thus be scaled up more robustly. One common approach to attain fault-tolerance is the preparation of magic states, which introduce so-called non-Clifford gates.

Researchers at University of Science and Technology of China, the Henan Key Laboratory of Quantum Information and Cryptography and the Hefei National Laboratory recently demonstrated the preparation of a logical magic state with fidelity beyond the distillation threshold on a superconducting quantum processor. Their paper, published in Physical Review Letters, outlines a viable and effective strategy to generate high-fidelity logical magic states, an approach to realize fault-tolerant quantum computing.

Dec 24, 2023

Dynamic interactive bitwise meta-holography with ultra-high computational and display frame rates

Posted by in categories: computing, encryption, information science, nanotechnology

Computer-generated holography (CGH) represents a cutting-edge technology that employs computer algorithms to dynamically reconstruct virtual objects. This technology has found extensive applications across diverse fields such as three-dimensional display, optical information storage and processing, entertainment, and encryption.

Despite the broad application spectrum of CGH, contemporary techniques predominantly rely on projection devices like spatial light modulators (SLMs) and digital micromirror devices (DMDs). These devices inherently face limitations in display capabilities, often resulting in narrow field-of-view and multilevel diffraction in projected images.

In recent developments, metasurfaces composed of an array of subwavelength nanostructures have demonstrated exceptional capabilities in modulating electromagnetic waves. By introducing abrupt changes to fundamental wave properties like amplitude and phase through nanostructuring at subwavelength scales, metasurfaces enable modulation effects that are challenging to achieve with traditional devices.

Dec 24, 2023

Chips to Compute With Encrypted Data Are Coming

Posted by in categories: biotech/medical, encryption, finance, health, law, robotics/AI

Regulatory efforts to protect data are making strides globally. Patient data is protected by law in the United States and elsewhere. In Europe the General Data Protection Regulation (GDPR) guards personal data and recently led to a US $1.3 billion fine for Meta. You can even think of Apple’s App Store policies against data sharing as a kind of data-protection regulation.

“These are good constraints. These are constraints society wants,” says Michael Gao, founder and CEO of Fabric Cryptography, one of the startups developing FHE-accelerating chips. But privacy and confidentiality come at a cost: They can make it more difficult to track disease and do medical research, they potentially let some bad guys bank, and they can prevent the use of data needed to improve AI.

“Fully homomorphic encryption is an automated solution to get around legal and regulatory issues while still protecting privacy,” says Kurt Rohloff, CEO of Duality Technologies, in Hoboken, N.J., one of the companies developing FHE accelerator chips. His company’s FHE software is already helping financial firms check for fraud and preserving patient privacy in health care research.

Page 3 of 5512345678Last