Computer Science: Encryption Physics: Acoustics and Ultrasound
Published

How secure are voice authentication systems really?      (via sciencedaily.com)     Original source 

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.

Computer Science: Artificial Intelligence (AI) Computer Science: Encryption Engineering: Robotics Research
Published

New cyber software can verify how much knowledge AI really knows      (via sciencedaily.com)     Original source 

With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers have created software that is able to verify how much information an AI farmed from an organization's digital database.

Computer Science: Encryption Offbeat: Computers and Math
Published

New breakthrough enables perfectly secure digital communications      (via sciencedaily.com) 

Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one piece of content inside another in a way that cannot be detected. This may have strong implications for information security, besides further applications in data compression and storage.

Computer Science: Encryption Computer Science: General Engineering: Nanotechnology Mathematics: Puzzles Offbeat: Computers and Math Physics: Optics
Published

Chromo-encryption method encodes secrets with color      (via sciencedaily.com) 

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.

Computer Science: Encryption Computer Science: General Computer Science: Quantum Computers Offbeat: Computers and Math Physics: Quantum Computing Physics: Quantum Physics
Published

Quantum physicists make major nanoscopic advance      (via sciencedaily.com)     Original source 

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in turn, opens new doors for companies and others to exploit the technology commercially.

Geoscience: Geomagnetic Storms Geoscience: Severe Weather Offbeat: Earth and Climate
Published

When migrating birds go astray, disturbances in magnetic field may be partly to blame      (via sciencedaily.com) 

Disturbances to Earth's magnetic field can lead birds astray -- a phenomenon scientists call 'vagrancy' -- even in perfect weather, and especially during fall migration. While other factors such as weather likely play bigger roles in causing vagrancy, researchers found a strong correlation between birds that were captured far outside of their expected range and the geomagnetic disturbances that occurred during both fall and spring migrations.

Energy: Alternative Fuels Geoscience: Geology Geoscience: Geomagnetic Storms Geoscience: Severe Weather
Published

New study models the transmission of foreshock waves towards Earth      (via sciencedaily.com) 

As the supersonic solar wind surges towards Earth, its interaction with our planet's magnetic field creates a shock to deflect its flow, and a foreshock filled with electromagnetic waves. How these waves can propagate to the other side of the shock has long remained a mystery.

Computer Science: Encryption
Published

Researchers propose methods for automatic detection of doxing      (via sciencedaily.com) 

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.

Computer Science: Encryption Computer Science: Quantum Computers Mathematics: Puzzles
Published

Microlaser chip adds new dimensions to quantum communication      (via sciencedaily.com) 

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.

Energy: Alternative Fuels Geoscience: Geomagnetic Storms Space: Structures and Features Space: The Solar System
Published

Ultrathin solar cells promise improved satellite performance      (via sciencedaily.com) 

As low Earth orbit becomes more cluttered, it becomes increasingly necessary to use middle Earth orbits, and radiation-tolerant cell designs will be needed. Making photovoltaics thinner should increase their longevity because the charge carriers have less far to go during their shortened lifetimes. Scientists propose a radiation-tolerant photovoltaic cell design that features an ultrathin layer of light-absorbing material. Compared to thicker cells, nearly 3.5 times less cover glass is needed for the ultra-thin cells to deliver the same amount of power after 20 years of operation.

Geoscience: Geomagnetic Storms Space: Structures and Features Space: The Solar System
Published

Where do high-energy particles that endanger satellites, astronauts and airplanes come from?      (via sciencedaily.com) 

Astrophysicists show how and when specific particles form and offers clues to questions that have troubled scientists since the 1940s.

Computer Science: Encryption
Published

New method to systematically find optimal quantum operation sequences for quantum computers developed      (via sciencedaily.com) 

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.

Computer Science: Encryption
Published

From bits to p-bits: One step closer to probabilistic computing      (via sciencedaily.com) 

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.

Computer Science: Encryption Mathematics: Puzzles
Published

A key role for quantum entanglement      (via sciencedaily.com) 

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.

Computer Science: Encryption Mathematics: Puzzles
Published

'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz      (via sciencedaily.com) 

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

Computer Science: Encryption
Published

Secure communication with light particles      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.