• Quantum Drone Offers Unrivaled Security

    Harnessing the laws of nature – namely quantum physics – a cutting-edge teleportation technology is taking cybersecurity to new, “unhackable” heights using miniscule particles of light or “beams.”

  • Tiny, Cheap Solution for Quantum-Secure Encryption

    A new kind of encryption could secure data in the age of quantum computers, ensuring medical records are destroyed after being read by a doctor, or to enforce time limits on software licenses. They can secure voting records or validate NFTs or just make sure no one is reading your email. Microchips with tiny clocks may hold key to future of computing security.

  • Protecting Picture Passwords Using Adjustable Distortion

    Researchers developed a new system for graphical authentication online using key images with adjustable levels of distortion to thwart over-the-shoulder and screen-capture snooping, which may make online sites more secure.

  • Researchers Show They Can Steal Data During Homomorphic Encryption

    Homomorphic encryption is considered a next generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it is being encrypted.

  • Simple and Efficient Method of Quantum Encryption

    Quantum computers will revolutionize our computing lives. But these computers will be able to crack most of the encryption codes currently used to protect our data, leaving our bank and security information vulnerable to attacks

  • Preventing Abuse in Encrypted Communication

    Mitigating abuses of encrypted social media communication on outlets such as WhatsApp and Signal, while ensuring user privacy, is a massive challenge on several fronts, including technological, legal, and social.

  • A Backdoor in Mobile Phone Encryption from the 1990s Still Exists

    Researchers have discovered a security gap in modern mobile phones which is very unlikely to have been created by accident. In fact, it should have been removed back in 2013.The researchers say that the properties that render the cipher so insecure can’t have happened by accident.

  • Cryptographic Vulnerabilities on Popular Messaging Platform, Telegram

    Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses in the protocol that ranged from technically trivial and easy to exploit, to more advanced.

  • Encrypting Photos on the Cloud to Keep Them Private

    The limited amount of data that smartphones hold, and the way in which they are vulnerable to accidental loss and damage, lead many users to store their images online via cloud photo services. However, these online photo collections are not just valuable to their owners, but to attackers seeking to unearth a gold mine of personal data.

  • Complex Passwords Aren't Always Best

    Research shows increasingly complex website password restrictions often leave users frustrated and lead to poor password security. “Our results confirm that the tougher the constraints of creating the passwords the safer users feel with their information,” said one expert. “However, the results show that a large number of restrictions can frustrate users.”

  • An Uncrackable Combination of Invisible Ink and Artificial Intelligence

    Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data with normal ink and a carbon nanoparticle-based invisible ink, requiring both UV light and a computer that has been taught the code to reveal the correct messages.

  • Accelerating Use of Fully Homomorphic Encryption

    Protecting and preserving personally identifiable information (PII), intellectual property, intelligence insights, and other forms of sensitive information has never been more critical. A steady cadence of data breaches and attacks are reported seemingly daily. As the use of cloud computing and virtual networks becomes increasingly pervasive for storing, processing, and moving information, concerns around data vulnerability, access, and privacy are similarly on the rise. Four research teams take on development of novel hardware accelerator to enable new levels of data and privacy protection.

  • Randomness Theory could Be Key to Internet Security

    Is there an unbreakable code? The question has been central to cryptography for thousands of years, and lies at the heart of efforts to secure private information on the internet. In a new paper, researchers identified a problem that holds the key to whether all encryption can be broken – as well as a surprising connection to a mathematical concept that aims to define and measure randomness.

  • Blueprint for Quantum Internet Unveiled

    Around the world, consensus is building that a system to communicate using quantum mechanics represents one of the most important technological frontiers of the twenty-first century. Scientists now believe that the construction of a prototype will be within reach over the next decade.

  • Post-Quantum Cryptography Program Enters “Selection Round”

    The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. NIST has winnowed the 69 submissions it initially received down to a final group of 15, and the chosen algorithms will become part of first standard devised to counter quantum decryption threat.