Quantcast
Channel: Encryption News -- ScienceDaily
Browsing latest articles
Browse All 65 View Live
↧

Tiny, cheap solution for quantum-secure encryption

Engineers propose a new kind of encryption to protect data in the age of quantum computers.

View Article


Single-photon source paves the way for practical quantum encryption

Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly...

View Article

Technology has the potential to change the patient-provider relationship

As personal health records (AKA patient portals) allowing patients to see test results, medications and other health information gain in popularity, scientists studied cancer patients' and doctors'...

View Article

New technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new...

View Article

Scientific advance leads to a new tool in the fight against hackers

A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows...

View Article


Self-propelled, endlessly programmable artificial cilia

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of...

View Article

Emulating impossible 'unipolar' laser pulses paves the way for processing...

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.

View Article

Secure communication with light particles

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum...

View Article


Radio waves for the detection of hardware tampering

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

View Article


'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption...

View Article

Quantum cryptography: Hacking is futile

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more...

View Article

A key role for quantum entanglement

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated...

View Article

Thinking like a cyber-attacker to protect user data

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can...

View Article


From bits to p-bits: One step closer to probabilistic computing

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could...

View Article

New method to systematically find optimal quantum operation sequences for...

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies...

View Article


New AI model can help prevent damaging and costly data breaches

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.

View Article

Microlaser chip adds new dimensions to quantum communication

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional...

View Article


Researchers propose methods for automatic detection of doxing

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge --...

View Article

Quantum physicists make major nanoscopic advance

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as...

View Article

Chromo-encryption method encodes secrets with color

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode...

View Article

New breakthrough enables perfectly secure digital communications

Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one piece of...

View Article


How secure are voice authentication systems really?

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.

View Article


Evaluating cybersecurity methods

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by...

View Article

Stressed for a bit? Then don't click it, cybersecurity experts advise

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.

View Article

Solving rare disease mysteries ... and protecting privacy

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential...

View Article


Why computer security advice is more confusing than it should be

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines...

View Article

Smart devices: Putting a premium on peace of mind

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S....

View Article

A new weapon in the war on robocall scams

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being...

View Article

How randomized data can improve our security

With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices.

View Article



Better cybersecurity with new material

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that...

View Article

New study unveils stretchable high-resolution user-interactive synesthesia...

A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.

View Article

Accelerating AI tasks while preserving data security

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This...

View Article

Keep it secret: Cloud data storage security approach taps quantum physics

Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage...

View Article


A new design for quantum computers

Creating a quantum computer powerful enough to tackle problems we cannot solve with current computers remains a big challenge for quantum physicists. A well-functioning quantum simulator -- a specific...

View Article

Satellites for quantum communications

Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this...

View Article

Where quantum computers can score

The traveling salesman problem is considered a prime example of a combinatorial optimization problem. Now a team has shown that a certain class of such problems can actually be solved better and much...

View Article


100 kilometers of quantum-encrypted transfer

Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable --...

View Article


Protecting art and passwords with biochemistry

A new molecular test method helps to prove the authenticity of works of art. The new method could also help to make passwords secure against quantum computers.

View Article

Breakthrough promises secure quantum computing at home

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises...

View Article

Clear guidelines needed for synthetic data to ensure transparency,...

Clear guidelines should be established for the generation and processing of synthetic data to ensure transparency, accountability and fairness, a new study says.

View Article

This tiny chip can safeguard user data while enabling efficient computing on...

A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks -- side-channel attacks and...

View Article


Computer scientists unveil novel attacks on cybersecurity

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors...

View Article

VR may pose privacy risks for kids: A new study finds parents aren't as...

New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR...

View Article


Mechanical computer relies on kirigami cubes, not electronics

Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of rigid, interconnected polymer cubes to store, retrieve and erase data without relying on electronic...

View Article

Mass layoffs and data breaches could be connected

A research team has been exploring how mass layoffs and data breaches could be connected. Their theory: since layoffs create conditions where disgruntled employees face added stress or job insecurity,...

View Article


Optical fibers fit for the age of quantum computing

A new generation of specialty optical fibers has been developed by physicists to cope with the challenges of data transfer expected to arise in the future age of quantum computing.

View Article

Physicists develop new method to combine conventional internet with the...

Researchers send entangled photons and laser pulses of the same color over a single optical fiber for the first time.

View Article

Toward a code-breaking quantum computer

Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography.

View Article

Preventing counterfeiting by adding dye to liquid crystals to create...

A research group has developed an innovative approach to creating anti-counterfeiting labels for high-value goods. Their findings enhance the security of the currently used cholesteric liquid crystals...

View Article


New security protocol shields data from attackers during cloud-based computation

Researchers developed a technique guaranteeing that data remain secure during multiparty, cloud-based computation. This method, which leverages the quantum properties of light, could enable...

View Article

Browsing latest articles
Browse All 65 View Live