Archive for the ‘encryption’ category: Page 7

Oct 22, 2019

Without encryption we will lose all privacy. This is our new battleground

Posted by in categories: computing, encryption, government, security, surveillance

And yet, in the midst of the greatest computer security crisis in history, the US government, along with the governments of the UK and Australia, is attempting to undermine the only method that currently exists for reliably protecting the world’s information: encryption. Should they succeed in their quest to undermine encryption, our public infrastructure and private lives will be rendered permanently unsafe.

The US, UK and Australia are taking on Facebook in a bid to undermine the only method that protects our personal information.

• Edward Snowden is a US surveillance whistleblower.

Continue reading “Without encryption we will lose all privacy. This is our new battleground” »

Oct 14, 2019

3D integrated metasurfaces stacking up for impressive holography

Posted by in categories: computing, encryption, engineering, holograms, nanotechnology, physics, security, transportation

Physicists and materials scientists have developed a compact optical device containing vertically stacked metasurfaces that can generate microscopic text and full-color holograms for encrypted data storage and color displays. Yueqiang Hu and a research team in Advanced Design and Manufacturing for Vehicle Body in the College of Mechanical and Vehicle Engineering in China implemented a 3D integrated metasurface device to facilitate miniaturization of the optical device. Using metasurfaces with ultrathin and compact characteristics, the research team designed optical elements by engineering the wavefront of light at the subwavelength scale. The metasurfaces possessed great potential to integrate multiple functions into the miniaturized optoelectronic systems. The work is now published on Light: Science & Applications.

Since existing research on multiplexing in the 2-D plane remains to fully incorporate capabilities of metasurfaces for multi-tasking, in the present work, the team demonstrated a 3D integrated metasurface device. For this, they stacked a hologram metasurface on a monolithic Fabry-Pérot (FP) cavity-based color filter microarray to achieve simultaneous cross-talk, polarization-independent and highly efficient full-color holography and microprint functions. The dual function of the device outlined a new scheme for data recording, security, encryption and information processing applications. The work on 3D integration can be extended to establish flat multi-tasking optical systems that include a variety of functional metasurface layers.

Metasurfaces open a new direction in optoelectronics, allowing researchers to design optical elements by shaping the wavefront of electromagnetic waves relative to size, shape and arrangement of structures at the subwavelength. Physicists have engineered a variety of metasurface-based devices including lenses, polarization converters, holograms and orbital angular momentum generators (OAM). They have demonstrated the performance of metasurface-based devices to even surpass conventional refractive elements to construct compact optical devices with multiple functions. Such devices are, however, withheld by shortcomings due to a reduced efficiency of plasmonic nanostructures, polarization requirements, large crosstalk and complexity of the readout for multiwavelength and broadband optical devices. Research teams can therefore stack 3D metasurface-based devices with different functions in the vertical direction to combine the advantages of each device.

Oct 11, 2019

Quantum Teleportation on the Nanoscale Using a Chemical Reaction

Posted by in categories: chemistry, computing, encryption, nanotechnology, quantum physics

A team of Northwestern University researchers is the first to document the role chemistry will play in next generation computing and communication. By applying their expertise to the field of Quantum Information Science (QIS), they discovered how to move quantum information on the nanoscale through quantum teleportation—an emerging topic within the field of QIS. Their findings were published in the journal, Nature Chemistry, on September 23, 2019, and have untold potential to influence future research and application.

Quantum teleportation allows for the transfer of quantum information from one location to another, in addition to a more secure delivery of that information through significantly improved encryption.

The QIS field of research has long been the domain of physicists, and only in the past decade has drawn the attention and involvement of chemists who have applied their expertise to exploit the quantum nature of molecules for QIS applications.

Oct 11, 2019

Researchers discover material that could someday power quantum computer

Posted by in categories: computing, encryption, quantum physics

Quantum computers with the ability to perform complex calculations, encrypt data more securely and more quickly predict the spread of viruses, may be within closer reach thanks to a new discovery by Johns Hopkins researchers.

“We’ve found that a certain contains special properties that could be the for technology of the future,” says Yufan Li, a postdoctoral fellow in the Department of Physics & Astronomy at The Johns Hopkins University and the paper’s first author.

The findings will be published October 11 in Science.

Sep 22, 2019

Mike Adams: Google Close To Cracking All Cryptocurrency With 256 Bit Encryption, Including Bitcoin…US Military Secrets Also Breakable

Posted by in categories: bitcoin, cryptocurrencies, encryption, military

Other companies are even closer than Google, and it’s about more than just cracking cryptocurrency. Mike has the details in this breaking report…

Sep 16, 2019

Was SHA-256 cracked? Don’t buy into retraction!

Posted by in categories: bitcoin, cryptocurrencies, encryption, government, hacking, internet, mathematics, military, privacy, security, software

SHA-256 is a one way hashing algorithm. Cracking it would have tectonic implications for consumers, business and all aspects of government including the military.

It’s not the purpose of this post to explain encryption, AES or SHA-256, but here is a brief description of SHA-256. Normally, I place reference links in-line or at the end of a post. But let’s get this out of the way up front:

One day after Treadwell Stanton DuPont claimed that a secret project cracked SHA-256 more than one year ago, they back-tracked. Rescinding the original claim, they announced that an equipment flaw caused them to incorrectly conclude that they had algorithmically cracked SHA-256.

All sectors can still sleep quietly tonight,” said CEO Mike Wallace. “Preliminary results in this cryptanalytic research led us to believe we were successful, but this flaw finally proved otherwise.

Continue reading “Was SHA-256 cracked? Don’t buy into retraction!” »

Sep 13, 2019

Hacking at Quantum Speed with Shor’s Algorithm

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics


Classical computers struggle to crack modern encryption. But quantum computers using Shor’s Algorithm make short work of RSA cryptography. Find out how.

Sep 12, 2019

The World’s First Photo of Quantum Entanglement Could Disprove Einstein’s Theory

Posted by in categories: computing, encryption, quantum physics

Einstein dubbed the idea of quantum entanglement as “spooky action at a distance.” Now for the first time ever, scientists have taken a picture of it.
» Subscribe to Seeker!
» Watch more Elements!

Today we understand quantum entanglement as when a pair of particles that cross paths and interact with each other can become connected and stay that way, even when the particles are spaced very far apart.

Continue reading “The World’s First Photo of Quantum Entanglement Could Disprove Einstein’s Theory” »

Sep 10, 2019

Quantum Physics Protects Data From Cyberattack Over Standard Telecom Networks

Posted by in categories: cybercrime/malcode, encryption, quantum physics

Quantum Xchange uses quantum technology to guard encryption keys.

Sep 7, 2019

Dave Bacon: Google Quantum Computing Beyond Swag

Posted by in categories: computing, encryption, quantum physics

A talk by Dave Bacon during the Industry session of the 14th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2019), Day 3. TQC 2019 was hosted June 3–5, 2019 by the Joint Center for Quantum Information and Computer Science at the University of Maryland (QuICS). More information about TQC can be found at

Page 7 of 33First4567891011Last