• EncryptionPreventing Abuse in Encrypted Communication

    By Tom Fleischman

    Mitigating abuses of encrypted social media communication on outlets such as WhatsApp and Signal, while ensuring user privacy, is a massive challenge on several fronts, including technological, legal, and social.

  • EncryptionA Backdoor in Mobile Phone Encryption from the 1990s Still Exists

    Researchers have discovered a security gap in modern mobile phones which is very unlikely to have been created by accident. In fact, it should have been removed back in 2013.The researchers say that the properties that render the cipher so insecure can’t have happened by accident.

  • EncryptionCryptographic Vulnerabilities on Popular Messaging Platform, Telegram

    Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses in the protocol that ranged from technically trivial and easy to exploit, to more advanced.

  • Photo encryptionEncrypting Photos on the Cloud to Keep Them Private

    The limited amount of data that smartphones hold, and the way in which they are vulnerable to accidental loss and damage, lead many users to store their images online via cloud photo services. However, these online photo collections are not just valuable to their owners, but to attackers seeking to unearth a gold mine of personal data.

  • CybersecurityComplex Passwords Aren't Always Best

    Research shows increasingly complex website password restrictions often leave users frustrated and lead to poor password security. “Our results confirm that the tougher the constraints of creating the passwords the safer users feel with their information,” said one expert. “However, the results show that a large number of restrictions can frustrate users.”

  • EncryptionAn Uncrackable Combination of Invisible Ink and Artificial Intelligence

    Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data with normal ink and a carbon nanoparticle-based invisible ink, requiring both UV light and a computer that has been taught the code to reveal the correct messages.

  • EncryptionAccelerating Use of Fully Homomorphic Encryption

    Protecting and preserving personally identifiable information (PII), intellectual property, intelligence insights, and other forms of sensitive information has never been more critical. A steady cadence of data breaches and attacks are reported seemingly daily. As the use of cloud computing and virtual networks becomes increasingly pervasive for storing, processing, and moving information, concerns around data vulnerability, access, and privacy are similarly on the rise. Four research teams take on development of novel hardware accelerator to enable new levels of data and privacy protection.

  • CybersecurityRandomness Theory could Be Key to Internet Security

    Is there an unbreakable code? The question has been central to cryptography for thousands of years, and lies at the heart of efforts to secure private information on the internet. In a new paper, researchers identified a problem that holds the key to whether all encryption can be broken – as well as a surprising connection to a mathematical concept that aims to define and measure randomness.

  • Quantum cryptographyBlueprint for Quantum Internet Unveiled

    Around the world, consensus is building that a system to communicate using quantum mechanics represents one of the most important technological frontiers of the twenty-first century. Scientists now believe that the construction of a prototype will be within reach over the next decade.

  • Quantum encryptionPost-Quantum Cryptography Program Enters “Selection Round”

    The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. NIST has winnowed the 69 submissions it initially received down to a final group of 15, and the chosen algorithms will become part of first standard devised to counter quantum decryption threat.

  • Encryption“Threshold Cryptography” Bolsters Protection of Sensitive Data

    A new publication by NIST cryptography experts proposes the direction the technical agency will take to develop a more secure approach to encryption. This approach, called threshold cryptography, could overcome some of the limitations of conventional methods for protecting sensitive transactions and data.

  • Quantum encryptionChina’s Quantum Satellite Enables First Totally Secure Long-Range Messages

    By Harun Šiljak

    In the middle of the night, invisible to anyone but special telescopes in two Chinese observatories, satellite Micius sends particles of light to Earth to establish the world’s most secure communication link. Micius is the world’s first quantum communications satellite and has, for several years, been at the forefront of quantum encryption. Scientists have now reported using this technology to reach a major milestone: long-range secure communication you could trust even without trusting the satellite it runs through.

  • EncryptionBeyond Encryption: Protecting Privacy While Keeping Survey Results Accurate

    Consumer data is continuously being collected by various organizations, including local governments, marketing agencies and social media companies. These organizations assure anonymity and confidentiality when collecting this data, however, existing data privacy laws don’t guarantee that data breaches won’t occur. Data privacy laws require encryption and, in some cases, transforming the original data to “protected data” before it’s released to external parties, but experts say this is inadequate.

  • CybersecurityToward an Unhackable Quantum Internet

    By Leah Burrows

    A quantum internet could be used to send un-hackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss. Researchers have found a way to correct for signal loss.

  • CybersecurityQuantum Computers Will Break the Internet, but Only If We Let Them

    By Marissa Norris

    Tomorrow’s quantum computers are expected to be millions of times faster than the device you’re using right now. Whenever these powerful computers take hold, it will be like going from a Ford Model T to the Starship Enterprise. Hackers may soon be able to expose all digital communications by using advanced quantum computers. A new form of cryptography would stop them, but it needs to be put into place now.