-
QUANTUM COMPUTING & ENCRYPTIONDecrypting Tomorrow’s Threats: Critical Infrastructure Needs Post-Quantum Protection Today
Some argue we still have time, since quantum computing capable of breaking today’s encryption is a decade or more away. But breakthrough capabilities, especially in domains tied to strategic advantage, rarely follow predictable timelines. The time to act on the quantum computing threat was yesterday. The next best time is now.
-
-
QUANTUM COMPUTING & ENCRYPTIONQuantum Computing - How it Changes Encryption as We Know It
All of the current encryption standards were created without the consideration of quantum computing and its capabilities. Classical computing would take thousands of years, or more, to crack encryption standards such as RSA or ECC. Quantum computing has the potential to break RSA and ECC encryption within hours or even minutes. AES encryption remains the most secure standard currently in use, but quantum computers will crack it in a fraction of the time that classical computers can.
-
-
CYBERSECURITYExperts Explain Signal, Cybersecurity, and How a Journalist Was Sent High-Level Military Intelligence
“The practice of not using SCIFs (Secure Compartmented Information Facilities) for the planning and implementation of conflict with a foreign state is an egregious breach of national security protocols,” said Virginia Tech’s cybersecurity expert Aron Brantly. “That the principals group was using this as a means of communications is a profound violation of US classification laws and standards and constitutes a grave threat to U.S. national security.”
-
-
ENCRYPTIONEncryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
-
-
ENCRYPTIONA Win for Encryption: France Rejects Backdoor Mandate
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.
-
-
ENCRYPTIONCornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting
In response to the U.K. demands for a backdoor, Apple has stopped offering users in the U.K. Advanced Data Protection, an optional feature in iCloud that turns on end-to-end encryption for files, backups, and more.
-
-
CYBERSECURITYSalt Typhoon Hack Shows There's No Security Backdoor That's Only for The "Good Guys"
If U.S. policymakers care about China and other foreign countries engaging in espionage on U.S. citizens, it’s time to speak up in favor of encryption by default. If these policymakers don’t want to see bad actors take advantage of their constituents, domestic companies, or security agencies, again—they should speak up for encryption by default.
-
-
CYBERSECURITYNew Technique to Improve Password Security
Internet passwords and security updates often appear at inopportune times and are thus ignored. Researchers to devise a new, simple, and effective approach that could significantly improve cybersecurity behavior.
-
-
ENCRYPTIONToward a Code-Breaking Quantum Computer
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography.
-
-
ENCRYPTIONFighting European Threats to Encryption: 2023 Year in Review
Private communication is a fundamental human right. In the online world, the best tool we have to defend this right is end-to-end encryption. Yet throughout 2023, politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures.
-
-
ENCRYPTIONQuantum-Safe Cryptography
Cryptography researchers have created an algorithm that can help strengthen online transactions that use end-to-end encryption against powerful attacks from quantum computers.
-
-
ENCRYPTIONNew Quantum Device Generates Single Photons and Encodes Information
Innovative approach is a step toward using single photons in quantum communication and information processing. Further coupling of the photon stream into waveguides — microscopic conduits of light — would provide the photonic circuits that allow the propagation of photons in one direction. Such circuits would be the fundamental building blocks of an ultra-secure quantum internet.
-
-
ENCRYPTIONNew Message Encryption Scheme Inspired by the Sudoku Puzzle
Researchers discuss a novel advance in data security in which the Japanese puzzle known as Sudoku promises a cryptographic system for text information that works even in situations where computational power is limited.
-
-
ENCRYPTIONThe U.K. Government Is Very Close to Eroding Encryption Worldwide
The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption. If it passes, the Online Safety Bill will be a huge step backwards for global privacy, and democracy itself.
-
-
ENCRYPTIONQuantum Technology for Mobile Phone Encryption Nears
In a few years, protection of communication with quantum encryption may become a permanent fixture in mobile phones and thus protect communication from hacking. The technology has already been demonstrated in large data transfers in the financial sector.
-