Advertisement

Cryptography

Science

Triple entanglement feat adds new twist to quantum cryptography

In the world of quantum mechanics, entanglement is a weird realm where particles that were once joined exhibit mirror-opposite reactions when separated, even when they are vast distances apart. Now researchers from the University of Vienna and the Universitat Autonoma de Barcelona have added a new twist to this phenomenon, by entangling three photons and adding a 3-D corkscrew motion to effectively allow multiple recipients to simultaneously receive information securely encoded in the one transmission.Read More

Computers

Super-secure quantum-based data encryption for everyone

With a new device set to make unbreakable, quantum-based cryptographic security available for everyone for the very first time, ordinary people will be able to use cryptographic systems that – until recently – only existed as experiments in the most advanced physics laboratories. Developed at the Los Alamos National Laboratory (LANL) the device incorporates the quantum mechanics of random photon polarization to generate random numbers and create cryptographic keys.Read More

Good Thinking Feature

Pros and cons of a mature Bitcoin economy

Bitcoin, the digital cryptocurrency designed to enable anonymous peer-to-peer financial exchanges without the involvement of third parties, is having serious teething problems. However, most such problems are associated with bitcoin storage or conversion, and should settle down as the currency is more widely accepted. Assuming this happens, let's look at the strengths and weaknesses of a mature Bitcoin currency in a modern economy. Read More
Computers Feature

The 7 Chrome extensions of moderately effective people

It's the world's most used web browser, but how many users are using extensions to get the most out of Google Chrome? (Probably very many. That's just the sort of annoying question journalists like to ask by way of an introduction.) Here are some of my favorites, not geared towards any particular profession, which I think could prove useful to my fellow generalist web users out there in the world. There are no gimmicks; no bossy extensions telling you what or what not to do; merely usefulness, hopefully.Read More

Computers

Undetectable hardware Trojans could compromise cryptography

Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme.Read More

    Advertisement
    Advertisement
    Advertisement
    Advertisement

    See the stories that matter in your inbox every morning

    Advertisement