Computer Science: Encryption
Published

New method to systematically find optimal quantum operation sequences for quantum computers developed      (via sciencedaily.com) 

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.

Computer Science: Encryption
Published

From bits to p-bits: One step closer to probabilistic computing      (via sciencedaily.com) 

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.

Computer Science: Encryption Mathematics: Puzzles
Published

A key role for quantum entanglement      (via sciencedaily.com) 

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.

Computer Science: Encryption Mathematics: Puzzles
Published

'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz      (via sciencedaily.com) 

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

Computer Science: Encryption
Published

Secure communication with light particles      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.

Computer Science: Encryption
Published

Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information      (via sciencedaily.com) 

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.

Computer Science: Encryption
Published

Self-propelled, endlessly programmable artificial cilia      (via sciencedaily.com) 

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical devices, and even dynamic information encryption.

Computer Science: Encryption Mathematics: Puzzles
Published

Scientific advance leads to a new tool in the fight against hackers      (via sciencedaily.com) 

A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person's geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.

Computer Science: Encryption
Published

New technique offers faster security for non-volatile memory tech      (via sciencedaily.com) 

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies.

Computer Science: Encryption
Published

Technology has the potential to change the patient-provider relationship      (via sciencedaily.com) 

As personal health records (AKA patient portals) allowing patients to see test results, medications and other health information gain in popularity, scientists studied cancer patients' and doctors' differing perceptions of this tool. Patients cited potential for personal health records to deepen their relationship with their healthcare provider and to allow them to be more understood. Physicians were interested in having more clinical information sharing to facilitate better patient care.

Computer Science: Encryption Mathematics: Puzzles
Published

Single-photon source paves the way for practical quantum encryption      (via sciencedaily.com) 

Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based on quantum key distribution (QKD).

Computer Science: Encryption
Published

Tiny, cheap solution for quantum-secure encryption      (via sciencedaily.com) 

Engineers propose a new kind of encryption to protect data in the age of quantum computers.

Computer Science: Encryption
Published

Qubits: Developing long-distance quantum telecommunications networks      (via sciencedaily.com) 

Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now opening up new fields of research in cryptography (the art of coding messages) with the aim of developing ultra-secure telecommunications networks. There is one obstacle, however: after a few hundred kilometers within an optical fiber, the photons that carry the qubits or 'quantum bits' (the information) disappear. They therefore need 'repeaters', a kind of 'relay', which are partly based on a quantum memory. By managing to store a qubit in a crystal (a 'memory') for 20 milliseconds, a team has now taken a major step towards the development of long-distance quantum telecommunications networks.

Computer Science: Encryption
Published

Tiny magnets could hold the secret to new quantum computers      (via sciencedaily.com) 

Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.

Computer Science: Encryption Mathematics: Puzzles
Published

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era      (via sciencedaily.com) 

Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.