Making quantum encryption practical

One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD), in which the counterintuitive behavior of quantum particles guarantees that no one can eavesdrop on ...

New NIST document offers guidance in cryptographic key generation

(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent of a password. A ...

Headset EEG hacking gives new meaning to PINheads

(Phys.org) -- Researchers at the Usenix Security conference earlier this month demonstrated a way to get into your brain and learn facts that you don’t want to reveal. Using a commercial off-the-shelf brain-computer ...

S. Korea tightens monitoring of social media

South Korea has tightened monitoring of popular social networking sites to curb illicit content including an upsurge in North Korean propaganda, officials said Thursday.

US bill seeks to improve cyber information-sharing

A bill intended to increase sharing of information about cybersecurity threats between government and the private sector was introduced in the US House of Representatives on Wednesday.

White House cybersecurity plan falls short, IU expert says

The Obama Administration outlined what it called sweeping cybersecurity legislation Thursday (May 12), but the proposed new law still provides few incentives, and even fewer legal requirements, for the private sector to provide ...

Unclear what happens to personal info with Clear

(AP) -- More than a quarter million people are wondering what will happen to their fingerprints, Social Security numbers, home addresses and other personal information now that a company that sped them through airport security ...

Quantum communication through synergy

(PhysOrg.com) -- When most people think of quantum communication, they think in terms of private communication channels - the ability to send messages without a third-party deciphering them. Indeed, quantum cryptography represents ...

page 8 from 8