Archive for the ‘encryption’ category: Page 48

Aug 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Posted by in categories: computing, encryption, internet, quantum physics

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read more

Aug 3, 2015

Microsoft Works Out How to Upgrade Online Encryption to Protect Against Quantum Computers

Posted by in categories: biotech/medical, computing, encryption, energy

Call it an abundance of caution. A Microsoft research project has upgraded the encryption protocol that secures the Web to resist attacks from quantum computers—machines that are expected to have stupendous power but have never been built.

Governments and computing giants like IBM, Microsoft, and Google are working on quantum computers because tapping subtle effects of quantum physics should let them solve in seconds some problems that a conventional machine couldn’t solve in billions of years (see “Microsoft’s Quantum Mechanics”). That might allow breakthroughs in areas such as medicine or energy. But such machines would also be able to easily break the encryption used to secure information online.

Read more

Jul 7, 2015

Passfaces: Strong authentication for the masses

Posted by in categories: big data, business, computing, encryption, finance, information science, internet

Last year, Google began experimenting with hardware-based schemes for user-authentication, while Apple added two factor authentication to iCloud and Apple ID users. They began sending a verification code to users via a mobile number registered in advance.

Security pundits know that two factor authentication is more secure than simple passwords. As a refresher, “Factors” are typically described like this:

  • Something that you know (a password — or even better, a formula)
  • Something that you have (Secure ID token or code sent to cell phone)
  • Something that you are (a biometric: fingerprint, voice, face, etc.)

The Google project may be just another method of factor #2. In fact, because it is small (easily misplaced or stolen), it simplifies but does not improve on security. I suggest a radical and reliable method of authentication. It’s not new and it’s not my idea…


Continue reading “Passfaces: Strong authentication for the masses” »

Jun 7, 2015

“Brainprints” Could Be Future Security ID — By Christopher Intagliata Scientific American

Posted by in categories: encryption, neuroscience, security

Biometric technology was once the stuff of sci-fi—how many movies show someone having their hand or eye scanned to get entry into a secured facility? But today biometric tech can be found in millions of people’s pockets—as the fingerprint scanner on an iPhone.

Of course, fingerprint scanning isn’t foolproof. Hackers have stolen fingerprints from photos, and used fake prints to fool Apple’s touch ID. Plus, there’s always the brute force method, like the time a gang in Malaysia cut off a guy’s fingertip—with a machete—to interface with the fingerprint-recognition system on the victim’s Mercedes. Read more

Jun 3, 2015

Quantum Entanglement: EPR Paradox

Posted by in categories: encryption, general relativity, physics, quantum physics, science

When I was a freshman at Cornell University some decades ago, I had a memorable teaching assistant for CS100, the entry level computer programming course taken by nearly every student in Engineering or Arts & Sciences. Gilles Brassard, a French Canadian, is now a chaired math professor at Université de Montréal and a preeminent cryptographer. He has also been inducted into the Royal Order of Canada. I am told that this is a bit like being knighted. In fact, this highest of civilian honors was established by Queen Elizabeth.

The author with Gilles Brassard in 2014

The author with Gilles Brassard in 2014

Gilles was a graduate student at Cornell in the mid ’70s. Back then, public key encryption was a radical concept. Named for three MIT professors who described it, RSA is now it is at the heart of every secure Internet transaction. Yet, the new generation of cryptographers refers to RSA as “classical cryptography”. The radicals have moved on to Quantum Cryptography. Gilles and his collaborator, Charles Bennett, are the pioneers and leaders in this burgeoning field. No one else is even pretender to the throne.

In its simplest terms, quantum cryptography achieves a secure communication channel because it relies on a stream of individual particles or “quanta” to convey information. If information is sent without any fat at all—just the minimum physics that can support the entropy—then any eavesdropping or rerouting of a message can be detected by the recipient. Voila! Perfect authentication, fidelity and security. Communication is secure because any attack can be detected.

Continue reading “Quantum Entanglement: EPR Paradox” »

Jun 3, 2015

How the Tech Behind Bitcoin Could Stop the Next Snowden — Klint Finley Wired

Posted by in categories: bitcoin, encryption, government, hacking, information science, privacy, security

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more

May 26, 2015

Could Bitcoin be Dethroned by an Altcoin?

Posted by in categories: bitcoin, cryptocurrencies, disruptive technology, economics, encryption

Cryptocurrency aficionados have been discussing Bitcoin limitations ever since the blockchain buzz hit the street. Geeks toss around ideas for clearing transactions faster, resisting potential attacks, rewarding miners after the last coin is mined, and supporting anonymity (or the opposite—if you lean toward the altcoinsdark side). There are many areas in which Bitcoin could be improved, or made more conducive to one camp or another.

Distinguished Penn State professor, John Carroll, believes that Bitcoin may eventually be marginalized due to its early arrival. He believes that its limitations will eventually be overcome by newer “altcoins”, presumably with improved mechanisms.

So, does progress in any of these areas threaten the reigning champ? It’s unlikely…

Andreas-transparentMore than any other individual, Andreas Antonopoulos is the face of Bitcoin. We discussed this very issue in the outer lobby of the MIT Bitcoin Expo at which he was keynote speaker (March 2015). Then, we discussed it again, when I hosted his presentation at The Bitcoin Event in New York (also in March). He clearly and succinctly explained to me why it is unlikely that an altcoin will replace Bitcoin as the dominant—and eventually surviving—cryptocurrency

Continue reading “Could Bitcoin be Dethroned by an Altcoin?” »

May 22, 2015

Novel Cold Storage Wallet

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption

“Cryptosteel is an indestructible private cold storage system not only for Bitcoin users”

Feb 2, 2015

The Mathematical Wonders behind Bitcoin

Posted by in categories: bitcoin, business, education, encryption, finance, hacking, hardware, information science, innovation, privacy

Vires in Bitcoin
Bitcoin as a cryptocurrency has had its moments of strength and weakness. The technology behind bitcoins, however, is a different story. While skeptics don’t expect a lot from Bitcoin as an alternative currency because of its volatility, they do have high hopes for the technological innovation that powers it, believing that it can be further developed to create something much powerful than Bitcoin itself.

To those who know Bitcoin as a great way of transacting online, but don’t completely understand its dynamics, it’s time to get acquainted with the cryptocurrency’s mathematical wonders that make anonymous, faster, and cheaper transactions of moving funds on the internet possible.

Most of us know that Bitcoin uses the SHA-256 hashing algorithm, but hashing serves a different function and purpose from that of digital signatures. Hashing actually provides proof that a message has not been changed because running the same hash always generates similar result.

Any message, regardless of the size can go into a hash function where the algorithm breaks it down, combines the parts, and “digests” it until it makes a fixed-length outcome called “digest”. However, a good hashing algorithm possesses some critical characteristics, in which the same message always produces the same result, as mentioned above, and it only works in one direction.

Continue reading “The Mathematical Wonders behind Bitcoin” »

Jan 4, 2015

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted by in categories: 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”

Read the article here >

Page 48 of 49First4243444546474849