Cybersecurity & Cryptography
Just Because the Communication is Secure, Doesn’t Mean It Is, Secure.
Just Because the Communication is Secure, Doesn’t Mean It Is, Secure. Theoretically, quantum key distribution’s (QKD) protocol is infallible. What happens if during the QKD
Overcoming Quantum Key Distribution Vulnerabilities
Overcoming Quantum Key Distribution Vulnerabilities Researchers from Tsinghua University have developed a methodology which shows promise in reducing QKD vulnerabilities associated with eavesdropping. Present QKD
Sydney, Australia’s Quantum Academy
Sydney, Australia’s Quantum Academy Australia has put itself in the quantum race spotlight again this week. New South Wales’ government is in support of a
Widespread Data Theft Looming?
Widespread Data Theft Looming? With quantum computing edging closer and closer, the necessity to find alternative encryption systems resistant to quantum computing attacks is needed.
An Aid to Quantum Communication Encryption Spoofing Detection?
An Aid to Quantum Communication Encryption Spoofing Detection? A team of researchers have determined how to tell apart beams of entangled photons. By slowing one
Because Quantum Computing is Coming to Alibaba
Because Quantum Computing is Coming to Alibaba The cloud behemoth run by Alibaba is getting a new service for its customers: quantum computing at 11
Make the System More Lego-like? U.S. Marine Corps Believes So
Make the System More Lego-like? U.S. Marine Corps Believes So At a recent technology summit, discussions focussed on U.S. Cyber Command and the U.S. Marine
Fear the Gap
Fear the Gap The number one threat posed by quantum computing’s day of arrival is the theoretical ability to crack the code on public key
Financial Sector Considerations for Quantum
Financial Sector Considerations for Quantum This piece found at Risk.net puts forth a fairly broad discussion concerning the financial sector’s need for preparation for the