Protecting light communication with random objects

Researchers from the Complex Photonic Systems (COPS) group used two layers of random materials to encrypt and decrypt a message sent via light communication. With that, they hid the sender and receiver simultaneously, and ...

New record set for cryptographic challenge

An international team of computer scientists has set a new record for integer factorization, one of the most important computational problems underlying the security of nearly all public-key cryptography currently used today.

Quantum cryptography goes maintream

(Phys.org)—Researchers from Toshiba and the Department of Engineering have perfected a technique that offers a less expensive way to ensure the security of high-speed fibre-optic cables, protecting communication networks ...

Flaw found in securing online transactions

Researchers on Wednesday revealed a flaw in the way data is scrambled to protect the privacy of online banking, shopping and other kinds of sensitive exchanges.

The solution to a 200-year-old encryption

(PhysOrg.com) -- The mathematician who deciphered the final, encrypted page of a letter sent to President Thomas Jefferson in 1801 will visit the University of Oregon to tell how he did it.

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

New NIST document offers guidance in cryptographic key generation

(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent of a password. A ...

page 1 from 2