Tech and Computer

Tech and Computer news

 

 

Sun10132013

Last update06:42:42 PM GMT

Back Computer Science Encryption

Encryption

Secure communication technology can conquer lack of trust

  • PDF
Jan. 2, 2013 — Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting the strange properties of the quantum world could be the answer to dealing with such distrust: researchers at the Centre for Quantum Technologies (CQT) at the National University of Singapore have used the quantum properties of light to perform the world's first demonstration of a 'secure bit commitment' technology.

The work is described in Nature Communications.

Secure bit commitment is equivalent to making a sealed bid in an auction. One party, usually known as Alice, 'commits' some...

Data storage: Electrically enhanced recall

  • PDF
Dec. 10, 2012 — Operating tiny magnetic memories under electrical fields reduces power demand and could enable storage and retrieval of data at much higher speeds than conventional devices

Random-access memory (RAM) is a fast electronic device used in computers to temporarily store data. Traditional RAM is based on the flow of electrical current for data processing. To make RAM faster, more energy efficient and capable of storing more information in a smaller volume, hardware...

Single sign-on for Internet use had major vulnerabilites: Many now fixed

  • PDF
TechAndComputer (Aug. 15, 2012) — Online shopping, cloud computing, online CRM systems: Each day many IT systems require the user to identify himself/herself. Single Sign-On (SSO) systems were introduced to circumvent this problem, and to establish structured Identity Management (IDM) systems in industry: Here the user only has to identify once, all subsequent authentications are done automatically. However, SSO systems based on the industry standard SAML have huge vulnerabilities: Roughly...

Quantum cryptography theory has a demonstrated security defect

  • PDF
TechAndComputer (Aug. 7, 2012) — Researchers at Tamagawa University announced August 10 that they had demonstrated the incompleteness and limit of the security theory in quantum key distribution. The present theory cannot guarantee unconditional security. Details will be given at the SPIE conference on Quantum Communication and Quantum Imaging on August 15, 2012. Share This: See Also: Computers & MathHackingEncryptionInformation TechnologyQuantum...

Major step taken towards 'unbreakable' message exchange

  • PDF
TechAndComputer (Aug. 3, 2012) — Single particles of light, also known as photons, have been produced and implemented into a quantum key distribution (QKD) link, paving the way for unbreakable communication networks. Share This: See Also: Matter & EnergyOpticsPhysicsQuantum PhysicsComputers & MathHackingEncryptionSpintronics ResearchReference Photoelectric effectNanowireWave-particle dualityElectromagnetic radiation

The results of the...