Quantum-computing researchers have actually managed to build one of their fabled devices (though it had only three qubits), and have worked out the mathematics that would allow a bigger machine to solve hitherto hard problems in cryptography.
On Wednesday, Dan Geer, Alex Hutton and Greg Shannon plan to give a talk at the cybersecurity-focused conference SOURCE in Boston on using prediction markets to gain foresight into future events in cryptography research, cyber threats, and even data security-related regulation.
FORBES: CIA Investors Aim To Build A Pseudo-Gambling Market For Data Security Predictions
One of the most fascinating chapters in wartime cryptography is the story of the Navajo code-talkers.
Before 2009, truly decentralized digital cash was in the same intellectual category as public key cryptography was in before 1976.
Ironically, even while cryptanalysts triumphed over code writers, in the 19th century cryptography reached its romantic apogee.
The story of cryptography as told in The Code Book is packed with quirkily brilliant characters.
New quantum computers have the potential to be millions of times faster than even our most powerful supercomputers today, quantum cryptography will usher in a new era of super-secure transactions and quantum storage will achieve unparalleled density.
Shortly after publishing their findings together with the Laboratory of Cryptography and System Security (CrySys) in Budapest, the Guardian ran with it on its website, citing the reports findings that said miniduke was still active on government computers in countries like Portugal, Ireland and Belgium.
FORBES: Old School Malware Writers Resurface With 'MiniDuke' Cyberattack
Your credit card purchases over the Internet are protected by a brilliant "public key cryptography" system invented by three MIT researchers in 1977.
But Twitter has since worked to beef up its security, in part through adding well-known white-hat hackers to its staff such as cryptography-focused Moxie Marlinspike and former NSA analyst Charlie Miller.
FORBES: Twitter Says Hackers May Have Compromised 250,000 Accounts
And there is a silver lining: modern cryptography exploits the fact that some things (such as factoring large numbers) are difficult in order to provide security.
In The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, due out soon from Doubleday, British author Simon Singh traces the evolution of the centuries-old battle between code writers and code breakers.
应用推荐