Menu

Blog

Archive for the ‘encryption’ category

Nov 21, 2021

The thinnest CD-RW: Atomic-scale data storage possible

Posted by in categories: computing, encryption, nanotechnology

Using a focused laser beam, scientists can manipulate properties of nanomaterials, thus ‘writing’ information onto monolayer materials. By this means, the thinnest light disk at atomic level was demonstrated.

The bottleneck in atomic-scale area may be broken by a simple technique, thanks to recent innovative studies conducted by scientists from Nanjing Normal University (NJNU) and Southeast University (SEU).

Through a simple, efficient and low-cost technique involving the focused laser and ozone treatment, the NJNU and SEU research teams, leading by Prof. Hongwei Liu, Prof. Junpeng Lu and Prof. Zhenhua Ni demonstrated that the photoluminescence (PL) emission of WS2 monolayers can be controlled and modified, and consequently, it works as the thinnest light disk with rewritable data storage and encryption capability.

Nov 20, 2021

Einstein’s theory of special relativity could help create unhackable ATMs

Posted by in category: encryption

Cryptography theorists are completely reimagining the PIN system to try to better protect you.

Nov 17, 2021

Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic

Posted by in category: encryption

Researchers demonstrate a new fingerprinting attack on encrypted traffic using the Tor web browser.

Nov 5, 2021

Deciphering the Philosophers’ Stone: How Scientists Cracked a 400-Year-Old Alchemical Cipher

Posted by in categories: chemistry, encryption

At the conference, Science History Institute postdoctoral researcher Megan Piorko presented a curious manuscript belonging to English alchemists John Dee (1527–1608) and his son Arthur Dee (1579–1651). In the pre-modern world, alchemy was a means to understand nature through ancient secret knowledge and chemical experiment.

Within Dee’s alchemical manuscript was a cipher table, followed by encrypted ciphertext under the heading “Hermeticae Philosophiae medulla”—or Marrow of the Hermetic Philosophy. The table would end up being a valuable tool in decrypting the cipher, but could only be interpreted correctly once the hidden “key” was found.

It was during post-conference drinks in a dimly lit bar that Megan decided to investigate the mysterious alchemical cipher—with the help of her colleague, University of Graz postdoctoral researcher Sarah Lang.

Continue reading “Deciphering the Philosophers’ Stone: How Scientists Cracked a 400-Year-Old Alchemical Cipher” »

Oct 7, 2021

Enabling AI-driven health advances without sacrificing patient privacy

Posted by in categories: biotech/medical, encryption, health, information science, robotics/AI

There’s a lot of excitement at the intersection of artificial intelligence and health care. AI has already been used to improve disease treatment and detection, discover promising new drugs, identify links between genes and diseases, and more.

By analyzing large datasets and finding patterns, virtually any new algorithm has the potential to help patients — AI researchers just need access to the right data to train and test those algorithms. Hospitals, understandably, are hesitant to share sensitive patient information with research teams. When they do share data, it’s difficult to verify that researchers are only using the data they need and deleting it after they’re done.

Secure AI Labs (SAIL) is addressing those problems with a technology that lets AI algorithms run on encrypted datasets that never leave the data owner’s system. Health care organizations can control how their datasets are used, while researchers can protect the confidentiality of their models and search queries. Neither party needs to see the data or the model to collaborate.

Oct 3, 2021

Bioengineers Develop New Class of Giant Magnetoelastic Effect Human-Powered Bioelectronics

Posted by in categories: bioengineering, cybercrime/malcode, encryption

Traditional networks are unable to keep up with the demands of modern computing, such as cutting-edge computation and bandwidth-demanding services like video analytics and cybersecurity. In recent years, there has been a major shift in the focus of network research towards software-defined networks (SDN) and network function virtualization (NFV), two concepts that could overcome the limitations of traditional networking. SDN is an approach to network architecture that allows the network to be controlled using software applications, whereas NFV seeks to move functions like firewalls and encryption to virtual servers. SDN and NFV can help enterprises perform more efficiently and reduce costs. Needless to say, a combination of the two would be far more powerful than either one alone.

Oct 3, 2021

Building a template for the future 6G network

Posted by in categories: augmented reality, cybercrime/malcode, encryption, internet, virtual reality

Traditional networks are unable to keep up with the demands of modern computing, such as cutting-edge computation and bandwidth-demanding services like video analytics and cybersecurity. In recent years, there has been a major shift in the focus of network research towards software-defined networks (SDN) and network function virtualization (NFV), two concepts that could overcome the limitations of traditional networking. SDN is an approach to network architecture that allows the network to be controlled using software applications, whereas NFV seeks to move functions like firewalls and encryption to virtual servers. SDN and NFV can help enterprises perform more efficiently and reduce costs. Needless to say, a combination of the two would be far more powerful than either one alone.

In a recent study published in IEEE Transactions on Cloud Computing, researchers from Korea now propose such a combined SDN/NFV network architecture that seeks to introduce additional computational functions to existing network functions. “We expect our SDN/NFV-based infrastructure to be considered for the future 6G network. Once 6G is commercialized, the resource management technique of the network and computing core can be applied to AR/VR or holographic services,” says Prof. Jeongho Kwak of Daegu Gyeongbuk Institute of Science and Technology (DGIST), Korea, who was an integral part of the study.

The new network architecture aims to create a holistic framework that can fine-tune processing resources that use different (heterogeneous) processors for different tasks and optimize networking. The unified framework will support dynamic service chaining, which allows a single network connection to be used for many connected services like firewalls and intrusion protection; and code offloading, which involves shifting intensive computational tasks to a resource-rich remote server.

Sep 25, 2021

Let’s Encrypt’s root certificate is about to expire, and it might break your devices

Posted by in category: encryption

Older devices and browsers could run into trouble on September 30.

Aug 26, 2021

Toshiba Makes Breakthrough Towards the Quantum Internet

Posted by in categories: biotech/medical, encryption, internet, quantum physics

Long distance quantum communication over 600 km of fiber unlocked!


Toshiba in partnership with the Japanese Tohoku University Hospital have achieved a new milestone on the road towards the quantum internet — the research team encrypted the human genome and sent it over a quantum-secure connection over 600 km of fiber.

Aug 26, 2021

US Air Force prioritizes blockchain security with new Constellation Network contract

Posted by in categories: bitcoin, cybercrime/malcode, encryption, military

A blockchain-based initiative from the United States Air Force will employ Constellation’s Hypergraph Network to provide data security with the Department of Defense’s commercial partners.

In a Thursday announcement, Constellation said it had been working with Kinnami Software Corporation to develop an end-to-end data security solution using blockchain encryption and distributed data management for the United States Transportation Command, Air Mobility Command’s 618th Air Operations Center, and a Civil Reserve Air Fleet partner. According to the platform, its goal is to securely exchange data with commercial partners on missions involving the operations of aircraft and ships under contract to the Department of Defense, or DoD.

The United States Transportation Command, or USTRANSCOM, allows authorities — including those in the 618th — to coordinate missions using available resources from both the military and private sector. Constellation Network’s solution may have the potential to improve the existing cybersecurity and general effectiveness.

Continue reading “US Air Force prioritizes blockchain security with new Constellation Network contract” »

Page 1 of 3812345678Last