• Quantum Cryptography Applications

    The development of quantum computing means that the use of classic cryptography for secure communications is in danger of becoming obsolete. Quantum cryptography, on the other hand, uses the laws of quantum mechanics to ensure total security. One example of this is quantum key distribution, which enables two parties to secure a message via a random secret key.

  • Using Quantum Physics to Secure Wireless Devices

    From access cards and key fobs to Bluetooth speakers, the security of communication between wireless devices is critical to maintaining privacy and preventing theft. Unfortunately, these tools are not foolproof and information on how to hack, clone and bypass these systems is becoming easier to find.

  • New and Secure Encryption: A Fresh Approach

    Cryptography, i.e. the encryption of information, keeps us safe in our daily lives and yet we barely know it’s there. As digitalization progresses, the amount of data that needs to be protected is growing exponentially. This calls for exceptionally robust cryptographic solutions that are both fast and efficient in practice and, at the same time, absolutely secure.

  • Perfectly Secure Digital Communications

    Researchers have achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.

  • NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices

    The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics.

  • Top Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption

    We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.

  • Nobel-Winning Quantum Weirdness Undergirds an Emerging High-Tech Industry, Promising Better Ways of Encrypting Communications and Imaging Your Body

    There are several emerging technologies which rely on the non-intuitive quantum phenomenon of entanglement: Unhackable communications devices, high-precision GPS and high-resolution medical imaging. For the most part, quantum entanglement is still a subject of physics research, but it’s also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.

  • A Retrospective Post-Quantum Policy Problem

    In May 2022, a White House memorandum warned that a quantum computer of sufficient size and sophistication will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. The various steps taken by the administration, and proposed by lawmakers, to deal with the problem are all forward-looking. “However, despite these efforts, policymakers have given little or no attention to what could be called a retrospectivepost-quantum problem,” Herb Lin writes. “Policymakers would be wise to consider the very real possibility that in a PQC[post-quantum computing] world, messages they once believed would be kept secret could in fact be made public.”

  • NSF Grants to Protect Data, User privacy

    Researchers are working on two new cybersecurity projects, recently funded by the National Science Foundation, to ensure trustworthy cloud computing and increase computing privacy for marginalized and vulnerable populations.

  • A Key Role for Quantum Entanglement

    A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists, including ETH physicists, has now demonstrated experimentally, for the first time, an approach to quantum key distribution that uses high-quality quantum entanglement to provide much broader security guarantees than previous schemes.

  • NIST chooses Kyber, Dilithium and SPHINCS+ as Standards for Post-Quantum Cryptography

    NIST has selected CRYSTALS-KYBER, CRYSTALS-Dilithium and SPHINCS+, three security algorithms, as one the new standards for post-quantum cryptography. The underlying technology must ensure that the encryption of sensitive communication will continue to be secure in the coming decades.

  • NIST Announces First Four Quantum-Resistant Cryptographic Algorithms

    NIST has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on every day — such as online banking and email software.

  • Taking Steps Toward a Secure Quantum Internet

    Scientists with at the University of Chicago have, for the first time, connected the city of Chicago and suburban labs with a quantum network—nearly doubling the length of what was already one of the longest in the country.

  • Randomly Moving Electrons Can Improve Cybersecurity

    Researchers have developed a record-breaking true random number generator (TRNG), which can improve data encryption and provide improved security for sensitive digital data such as credit card details, passwords and other personal information.

  • Secure Communication with Light Particles

    Quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Researchers have developed a new, tap-proof communication network.