-
Shadow figment technology foils cyberattacks
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive — but imaginary — world. The technology is aimed at…
-
Early endeavors on the path to reliable quantum machine learning
The future quantum computers should be capable of super-fast and reliable computation. Today, this is still a major challenge. Now, computer scientists conduct an early exploration for reliable quantum machine learning. Intelligent machine learning methods can recognise patterns or objects and automatically pick them out of data sets. For example, they could pick out those…
-
Graphene key for novel hardware security
As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, researchers have…
-
Algorithms improve how we protect our data
Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security. «Random numbers are essential for generating cryptographic information,» explains DGIST computer scientist Yongjune Kim, who co-authored the study with Cyril…
-
Materials advances are key to development of quantum hardware
A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors call for new approaches from broad areas of science and engineering. The study, published in the journal Science by an international team, surveyed the state of research on…
-
Computer scientists discover new vulnerability affecting computers globally
A team o computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced. Researchers named the vulnerability Spectre because the flaw was built into modern computer processors…
-
Real-world study shows the potential of gait authentication to enhance smartphone security
A study showed that — within an appropriate framework — gait recognition could be a viable technique for protecting individuals and their data from potential crime. A study led by the University of Plymouth asked smartphone users to go about their daily activities while motion sensors within their mobile devices captured data about their stride…
-
Entanglement unlocks scaling for quantum machine learning
The field of machine learning on quantum computers got a boost from new research removing a potential roadblock to the practical implementation of quantum neural networks. «Our work proves that both big data and big entanglement are valuable in quantum machine learning. Even better, entanglement leads to scalability, which solves the roadblock of exponentially increasing…
-
The power of chaos: A robust and low-cost cryptosystem for the post-quantum era
Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers. While for most of us cryptographic systems are things that just run «under the hood,» they are an essential element in the world of digital communications. However, the upcoming rise of quantum computers could shake the field of cryptography to its…
-
How big does your quantum computer need to be?
Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take. In AVS Quantum Science, from…