Page 799«..1020..798799800801..810820..»

End-to-End Encryption: How It Works, Uses, And Drawbacks | SPARROWS NEWS – Sparrows News

End-to-end encryption (E2EE) is a security measure used in digital communication to ensure that only the sender and intended recipient of a message can decrypt and read its contents, making it extremely difficult for third parties, including hackers, service providers, or government authorities, to intercept or access the information. Heres how it works:

E2EE is essential for safeguarding sensitive information and ensuring that only the intended parties can read the content of their communication. Here are some use cases for end-to-end encryption (E2EE) across various applications and industries:

These are just a few examples of how end-to-end encryption plays a crucial role in safeguarding sensitive data and maintaining privacy in various contexts. End-to-end encryption (E2EE) is a powerful privacy and security feature, but it does come with some drawbacks:

While E2EE is a valuable tool for protecting privacy and security, users should be aware of these drawbacks and make informed decisions about when and how to use it.

Dont miss the latest story follow us on WhatsApp Channel, Google News, YouTube, and Twitter for the fastest updates!

Here is the original post:
End-to-End Encryption: How It Works, Uses, And Drawbacks | SPARROWS NEWS - Sparrows News

Read More..

Limitations on the Strategic Use of Ransomware in Armed Conflicts … – Lieber Institute West Point

Editors Note: This post is derived from an article-length work published in the U.S. Naval War Colleges International Law Studies journal.

Attempts to influence public support for armed conflicts through strategic targeting of civilians and civilian objects during armed conflicts have had a mixed record of success, at best. Belligerents on both sides of the Second World War targeted civilian objects to reduce civilian support for the war. While dropping atomic bombs on Hiroshima and Nagasaki certainly ended the war in the Pacific, Axis and Allied powers overall efforts to reduce civilian morale through strategic bombing were limited. More recently, the Russian military has targeted Ukrainian civilian infrastructure in a similar vein, including attacks on schools and hospitals. Investigators have catalogued other war crimes against civilian targets to erode the resolve of the Ukrainian people and press Russian territorial and political demands.

Although devastating to civilians in these conflict zones, such strategic targeting often has the opposite effect, hardening rather than weakening civilian resolve. It should perhaps be unsurprising that seeing their village or neighborhood destroyed and their countrypeople killed has produced visceral anger and a willingness to fight in civilian victims. Why not fight when so much has already been lost? Additionally, any lack of clarity as to the illegality of the intentional violent targeting of civilians and civilian objects has been long resolved. The precise reasons for international support for Ukraine are difficult to discern, but surely much support stems from public sympathy for Ukraines losses to Russian atrocities against civilians.

Despite the historical failings of violent strategic targeting campaigns against civilians, non-violent targeting of civilians remains a mainstay of military strategy. Psychological operations (PsyOps) or Military Information Support Operations (MISO) are but one enduring form. Unlike violent operations, strategic targeting of civilians with non-violent information campaigns implicates fewer, though still some, international legal restrictions. As States explore avenues to achieve strategic effects against civilian populations during armed conflict, one underexplored means is the use of ransomware.

Ransomware Methodology

Ransomware is a type of malicious software designed to deny access to an information system or its resident data until a ransom is paid. The data is held for ransom through encryption, theoretically allowing complete restoration of access once the demand, typically money in the form of cryptocurrency, is delivered. By many measures, ransomware has proven to be the most successful method of cyber-criminal activity, with targets as diverse as hospitals, corporations, and local governments. The University of California San Francisco (UCSF), for example, paid $1.14 million after a ransomware gang, thought to be Netwalker, encrypted servers used by the UCSF School of Medicine. The payouts associated with ransomware operations have risen continually over the last half-decade.

Ransomware operations have been most effective when targeting servers that support critical public functions, increasing public pressure for immediate payouts. Critical infrastructure has not been immune from such operations, as seen with the Colonial Pipeline incident in 2021. Beyond criminal organizations, States, such as Russia and North Korea, have already used ransomware operations for various purposes. Ransomware has proven to be a remarkably resilient form of coercive behavior. States have struggled to find policy solutions to deter ransomware operations, as operators continue to add new twists to their methods, from deleting backup systems simultaneously to encrypting the primary data set. The potential of tapping into such public pressure raises the specter of ransomware use in armed conflicts by States. I addressed this issue in my article, examining the potential strategic use of ransomware as a method of warfare from a legal perspective.

Ransomware in Armed Conflict

Before offering a legal analysis of ransomware, it is worth discussing why and how States might use this capability in armed conflicts. Ransomware can be distinguished from other types of cyber operations in that it is coercive rather than exploitative. On the one hand, most cyber operations seek to exploit an adversarys information systems to gain an operational or intelligence advantage. Relevant examples are the loss of functionality of a command and control system and gaining a better understanding of an enemys weapon systems. Ransomware, on the other hand, seeks to force an adversary to take action it otherwise would not.

This post does not address the use of ransomware against military targets, although there may be interesting implications on questions of proportionality against dual-use objects worth addressing. Rather, this post focuses on the use of ransomware against purely civilian targets in armed conflicts for strategic purposes. Whereas violent operations against civilians and civilian objects have had the dual drawbacks of being unproductive and illegal, ransomware operations may be able to achieve the desired effects without violating the laws of war as a non-violent method of warfare.

For example, suppose an adversary is targeting civilian objects with violent means. Reciprocating with violent operations to induce the bad actor to cease the practice would be fraught with legal and moral issues. Additionally, such operations may be far more likely to lead to escalation than to eliminate the illegal activity. However, acting against similar targets of the adversary with non-violent ransomware operations, with the ransom demand being a cessation of the adversarys illegal activity, would be a much more acceptable practice with less likelihood of escalation.

Another potential example is a widespread ransomware campaign against important social or economic targets to induce the adversary to negotiate an end to the conflict. Such a campaign could potentially be achieved without any permanent damage to civilian infrastructure. Potentially, the lack of visible physical damage and the associated death or injury to civilians typically accompanying such operations might also reduce the fight response of the civilian population. Whereas the damage from a strategic bombing campaign cannot be immediately undone, encrypted data can immediately be decrypted. Perhaps most importantly, such a campaign could be conducted within the limits placed on States by the laws of war. With such potential uses in mind, the remainder of this post examines the legal factors most likely to affect strategic ransomware uses against civilian targets.

Legal Implications

Scholars and States alike continue to debate whether there are any limitations on the use of cyber operations that lack physically violent effects while affecting the functionality of information systems. Fundamental law of war questions such as the definition of attack and qualification of data as an object remain unresolved, hindering the development of clear legal guidelines. Additionally, examples of States targeting civilian objects through cyberspace in armed conflicts to achieve military advantage are limited, slowing the establishment of useful guidelines of State practice and opinio juris. However, the lack of significant case studies should not preclude exploring the different methods States might use in offensive cyber operations against civilian targets, including identifying potential legal limitations.

While legal analysis of ransomware operations mirrors the general protections of civilian data in armed conflicts, the specifics of ransomware operations raise essential analytical differences. The first distinguishing characteristic of ransomware operations is the length of time that system functionality may be affected. For those States that have adopted a functionality-related test to determine when an attack occurs in cyberspace, the time required to restore functionality is a key factor. For example, there is relatively little support for the view that a denial of service operation causing brief system outages is an attack. The DoD Law of War Manual mentions cyber operations that cause a brief disruption of communications as an example of an operation that would fail to qualify as an attack ( 16.5.2). Conversely, the delivery of malware that completely corrupts an operating system, resulting in permanent loss of functionality, is much more likely to qualify as an attack.

While it is tempting to view ransomware operations as equivalent to other offensive cyber operations that employ destructive malware, there are key differences that must be addressed. First, ransomware is different because the time element is likely to differ in every instance. If the conditions of the ransom are met immediately, then the loss of functionality might end immediately. Equally possible is that the encryption is never released, effectively resulting in a permanent loss of functionality or a rebuilding of the affected database.

The second significant difference is that a properly conducted ransomware operation does not corrupt, damage, or destroy data. Instead, the operator preserves the data, albeit in an encrypted, inaccessible state. If the data is permanently corrupted as opposed to simply encrypted, its use as a coercive tool would be nullified as the incentive to comply is removed. This limitation removes ransomware variants, such as NotPetya, that lack the ability to decrypt the data from consideration in this conversation. Additionally, sophisticated State actors can take a targeted approach as to which dataset they encrypt. Certain types of operational data, such as an operating system or applications, could be left functional, while content datasets, such as a client information database, could be encrypted. Such an operation might leave the system technically functional, with all data intact, while still inflicting significant inconvenience on the user.

Using cyber capabilities to lock civilian users out of even content-level datasets raises the question whether such operations can be viewed as a seizure of property, which is prohibited in some circumstances under the law of war. For instance, the First Geneva Conventions Article 50 prohibits the extensive destruction and appropriation of property, not justified by military necessity and carried out unlawfully and wantonly. Here, we return to the issue of objects and property. Data is not physical and tangible, and its acceptance as an object has mixed support from States. Furthermore, when data is considered under the law as property, it is generally viewed as intellectual property. This is true under both domestic and international legal systems. Unlike personal property, intellectual property has no general protection under the laws of war. Thus, attempting to view ransomware as an illegal seizure of property under the laws of war also falls short, barring a significant change in the legal understanding of non-tangible digital data.

At this point, asking if there are any protections for civilian data from ransomware operations in armed conflicts is tempting. However, the failure of ransomware to qualify as either an attack or an illegal wartime seizure of property does not mean its use in armed conflicts is unlimited. The laws of war provide additional protections beyond general targeting law to numerous categories of potential targets. In my article, I review the categories that primarily apply to potential ransomware operations, such as medical data, civil defense organizations, and objects indispensable to the civilian populace (among others). While it is beyond the scope of this post to examine each of those categories individually, it is worthwhile to explore these special protections as a general matter.

Special Protections

Special protections frequently differ from the general targeting rules because they are not limited to situations of attack. The language often used to differentiate these protections is to respect and protect. For example, Article 19 of the First Geneva Convention states that units of the Medical Service may in no circumstances be attacked, but shall at all times be respected and protected by the Parties to the conflict. States widely interpret the inclusion of the respect and protect phrase as prohibiting interference with discharging their proper functions, such as is found in the DoD Law of War Manual (see e.g. 7.8.2). In other words, States operations must not affect their functionality.

Categories of special protections that might apply to ransomware operations include the aforementioned medical data, the rising issue of digital cultural property, religious data associated with the spiritual care of the armed forces, civil defense organizations, and objects indispensable to the civilian populace, among others. While not all of these special protections use the respect and protect language, they all contain protections beyond those of civilian objects. Protections in Additional Protocol I Article 54(2) for objects indispensable to the civilian populace, for example, prohibit an operation to render useless such objects for the purpose of denying their value to the civilian populace of an adverse party, whatever the motive.

By moving beyond the pure language of attacks, some of these protections bypass the previously identified limitations on applying the laws of war to cyber operations, including ransomware. The encryption of hospital data used in any manner to provide patient care would undoubtedly fail to respect and protect medical units. It should be noted that each special protection is unique and must be analyzed individually to determine its applicability in the case of ransomware operations. However, they provide essential protection to many forms of civilian data.

War-Sustaining Objects

Finally, no discussion of intentional operations against civilian targets is complete without a discussion of the thorny issue of war-sustaining objects. These have been described as objects that indirectly but effectively support the enemys overall war effort (AMW Manual, Rule 24). Such targets might include data sets of high social or economic value, exactly the data sets that would be most effective for strategic ransomware operations. The United States has repeatedly taken the position that the targeting of such objects can meet the definition of a military objective (see DoD Law of War Manual 7.8.2 and The Commanders Handbook on the Law of Naval Operations 5.3.1). It should be noted that this view is not widely held by scholars and other States. Nevertheless, should the law develop to include ransomware operations as attacks against objects, many of the targets most useful as strategic targets may be considered valid as war-sustaining objects.

Conclusion

Despite the special protections, there are many categories of civilian data unprotected from ransomware operations in armed conflicts. The intentional targeting of many of these data sets through ransomware does, however, strike one as unnecessarily cruel and unethical. A potential example would be a ransomware operation targeting the pension system of elderly, retired civilians. Unfortunately, in my opinion, States have not made the necessary changes in international law to protect such targets from strategic ransomware operations in armed conflicts. As such, an intense effort should be undertaken to develop normative limitations, such as those suggested by Professor Michael Schmitt, to protect the most vulnerable civilians. In time, such normative restrictions may ripen into customary law and provide more definitive protection. However, current State practice and opinio juris relating to cyber operations are insufficient to find a definitive prohibition on ransomware operations against most civilian targets during armed conflicts.

***

Jeff Biller is an Associate Professor of Cyber Law and Policy with CyberWorx, a department of the Office of Research at the United States Air Force Academy (USAFA).

Photo credit: Unsplash

Read the original:
Limitations on the Strategic Use of Ransomware in Armed Conflicts ... - Lieber Institute West Point

Read More..

Ransomware Crisis, Recession Fears Leave CISOs in Tough Spot – Dark Reading

Gartner projects worldwide IT spending will increase 5.5% this year, reaching $4.6 trillion, and forecasts information security and risk management products and services spending will grow 11.3%, topping $188.3 billion. However, with many chief economists believing a recession is on the horizon, executives and business leaders are being forced to make difficult cost reductions. One investment that may be facing cutbacks: cybersecurity.

Though cybersecurity programs tend to be fairly resilient in the face of economic uncertainty, chief information security officers (CISOs) and security leaders are still facing tough mandates and directives from other leadership to tighten spending, demonstrate value for investments, and double down on increasing efficiencies.

In a Hanover Research survey of over 650 financial decision makers, 47% of the responding organizations indicated economic disruption and recession as top business risks for 2023. Meanwhile, cybersecurity vulnerabilities fall by the wayside, with 11% ranking it as a top concern. This risk disparity comes at an exceptionally troubling time, as the world also grapples with rising geopolitical tensions and a ransomware epidemic.

Ransomware has exploded into one of the most damaging forms of malware and rapidly growing cybersecurity threats of our time. Verizon's "2023 Data Breach Investigations Report" (DBIR) reveals ransomware now accounts for one out of every four breaches, with 95% of incidents that experienced a loss costing $1 million to $2.25 million.

Unlike other types of malware, ransomware can destroy an organization in minutes, causing a ripple effect throughout society and the global economy.

With cybercriminals capitalizing on crises for exploitation, any compromise of an organization's security posture or a potential ransomware attack amid recession fears could leave them vulnerable to greater risks and in a dire financial position or, worse, out of business.

According to research from F5 Labs, malware was responsible for roughly 6% of US breaches in 2019, and by 2020 ransomware alone was a factor in 30%. By 2021, that number surged to almost 70% according to Verizon's 2022 DBIR.

Comparitech reveals publicly reported ransomware attacks dipped in 2022, but the amount of individuals' data exposed grew to nearly 115 million from 49.8 million in 2021, and ransom demand in the business sector rose to $13.2 million from $8.4 million in 2021.

Ransomware cybercrime is claiming victims left and right in 2023, from the US Marshals Service to Dole and Dish Network. In response, the White House has classified ransomware as a threat to national security, public safety, and economic prosperity. And despite government entities like the FBI, CISA, and OFAC enacting actions to counter ransomware, these steps alone aren't enough to end the evolving ransomware threat landscape.

With a new ransomware target being attacked every 14 seconds, organizations must prioritize ransomware prevention. With its developing sophistication, mitigating ransomware is increasingly more challenging. There's no silver bullet to eradicate attacks, and having to operate in a tight market adds a layer of complexity.

CISOs and security leaders must focus on the best return on investment while building out a multilayered approach for improving their overall IT security. One strategy to accomplish this is managing attack vectors using encrypted channels with preventive technologies that can stop adversaries before they have a chance to compromise networks or while they are executing their multistep campaigns.

Attackers not only employ malicious encryption to ransom a victim's files, they also leverage commonly adopted encryption standards to further their own ends.

Today, nearly 90% of all Internet traffic is encrypted with SSL/TLS, making it easy for cybercriminals to take advantage of cryptography and use it to mask ransomware to evade detection while using popular and successful breach tactics like phishing.

Ransomware gangs also take advantage of legitimate websites encrypted with SSL/TLS to look secure, but have been infected with drive-by downloads. And cybercriminals leech onto browser vulnerabilities that can lead to infection when the entry point is encrypted, allowing encrypted threats embedded with malicious payloads to go unnoticed.

Gaining visibility into encrypted traffic is a key aspect of managing encrypted threats, yet organizations should level up their defense to decrypt and inspect incoming and outgoing encrypted traffic, which is commonly called SSL Inspection or Break and Inspect (BNI), and automate traffic orchestration for enhanced efficacy and control.

Amid ongoing pressure to drive efficiencies with strained resources, it's critical for businesses to optimize their security investments. Decrypting, inspecting, and re-encrypting traffic remains an exclusive feature within a small subset of security devices. With the flood of SSL/TLS traffic, many of those devices can't handle traffic at large scale.

Consequently, security stacks can take a serious hit and be riddled with points of failure that can lead to greater chances of infected traffic bypassing decryption, as well as oversubscribed services that can increase total cost of ownership.

Combining robust decryption and orchestration of encrypted traffic with threat-prevention technology that can stop attacks before they happen and go beyond blocking and alerting indicators of compromise (IOCs) is crucial to staying ahead of attackers amid the ransomware crisis and potential global recession.

Excerpt from:
Ransomware Crisis, Recession Fears Leave CISOs in Tough Spot - Dark Reading

Read More..

Simplify DoD Compliance with End-to-End Encrypted Email and File … – ThomasNet News

Welcome to Thomas Insights every day, we publish the latest news and analysis to keep our readers up to date on whats happening in industry. Sign up here to get the days top stories delivered straight to your inbox.

This article is sponsored byPreVeil, a provider of end-to-end encrypted email and file sharing systems designed to protect critical information and simplify CMMC, NIST 800-171, and ITAR compliance.

Achieving complete cybersecurity is a never-ending pursuit, especially as the number of cyberattacks continues to rise. Thats why the National Security Agency (NSA) recommends a Zero Trust framework, which assumes that a breach is inevitable or has already occurred. Additionally, the Department of Defense (DoD) is increasing its compliance requirements for contractors, making it more important than ever to implement robust and effective security measures. To remain competitive and demonstrate the ability to protect critical information, manufacturers, especially in the defense sector, have to show compliance with stringent cybersecurity standards, such as ITAR, CMMC, and NIST 800-171.

To assist,PreVeiloffers end-to-end encrypted email and file sharing systems designed to protect Controlled Unclassified Information (CUI) while also simplifying compliance. In addition to the product itself, PreVeil provides a complete compliance package, including documentation, templates, definitions, training videos, and more to educate customers and simplify their compliance process.

We strive to simplify security and compliance for manufacturers with an emphasis on ease of use and assisting our customers throughout their security and compliance journey, says Sanjeev Verma, chairman and co-founder of PreVeil. Our solutions are geared towards reducing the cost burden that often comes with achieving compliance, which is of paramount importance to our manufacturing customers.

Through the use of Zero Trust security, PreVeil ensures that information is only encrypted and decrypted on a users device, making it useless to attackers if hacked. PreVeils cybersecurity solutions are trusted by more than 800 defense manufacturers, financial institutions, law firms, consumer-focused businesses, and more.

Sanjeev Verma (SV):PreVeil is a company that builds end-to-end encrypted email and file sharing systems. These products are generally used by manufacturing companies, particularly defense contractors, as well as law firms, and financial institutions. What distinguishes us is that we offer arguably some of the best cybersecurity in the world. Defense contractors, law firms, and financial firms use us because we sit at the cusp of not only providing best-in-class cybersecurity solutions but also simplifying their compliance mandates.

As the world is moving forward, theres a greater demand for cybersecurity as well as compliance. For these regulated segments such as manufacturing, particularly for defense, we sit at the intersection of providing simple solutions that can reduce the cost and complexity of both cybersecurity and compliance for these companies.

SV:We are seeing increasing compliance requirements imposed on companies. In the defense segment, companies are required to protect critical information, which should be self-evident, but they are increasing regulations to protect whats called Controlled Unclassified Information (CUI). This includes contract information, defense designs, and so forth, that manufacturers have in their possession.

Specific compliance regimes that drive the adoption of our products include NIST 800-171, which is part of federal defense contracts; CMMC, which is an upcoming regulation that requires manufacturers to prove they are adequately protecting information; and ITAR, which involves defense companies and others sending information overseas.

With an increased emphasis on compliance, customers often come to us to get a clearer understanding of what the compliance regulations ask of them. CMMC, NIST 800-171, and ITAR can be very complex for a manufacturer to understand, so we assist customers in simplifying those complex regulations and providing them with an understanding of what is required of them. Then, we explain how PreVeils encrypted email and file-sharing systems can be used to provide the security and compliance these regulations require, while also simplifying and reducing the cost of their security and compliance journey.

SV:We simplify compliance with an uncompromising focus on cybersecurity. One way that we differentiate ourselves is that we dont cut corners to make you compliant. We come in and provide you with the best cybersecurity available anywhere in the world and yet simplify your compliance because our products are very easy to use. We provide an entire solution not only do we provide the product itself but also the full compliance package. We help our customers adopt our products as well as provide the documentation needed to ultimately get compliance.

We also have a series of help articles and videos that we call PreVeil University. Once you have the product and the documentation, you can then go to PreVeil University to get any of your questions answered regarding compliance and security.

At the end of the day, we are true to our mission of protecting critical information. We remain laser-focused on a security-first approach to compliance while bearing in mind, simplify, simplify, simplify.

SV:The entire federal government is now requiring NIST 800-171 compliance as the framework by which suppliers to the government, particularly the Defense Department, need to demonstrate security. NIST 800-171 is a series of 110 controls that need to be implemented in order to show that you are adequately protecting information in your systems, whether it be on phones, computers, or elsewhere.

A defense contractor used our system, and a United States Defense Department audit authority audited that customer for NIST 800-171 compliance. Our customer achieved a perfect 110 out of 110 controls. They used PreVeil in conjunction with other policies and procedures, and the combined result was the highest level of score for their system.

This not only proves that they were successfully protecting defense information, but it also provides a competitive advantage. Now, when prime contractors are looking for a supplier, this customer will be able to demonstrate their perfect compliance score.

SV:Compliance is a primary trend, but the other large trend is cybersecurity itself, particularly a concept referred to by the US government as Zero Trust. A lot of systems are protected by whats called perimeter defense. This means that security systems such as firewalls and others have been put in place to prevent attackers from accessing the information. What modern cybersecurity has recognized is that no matter how good the perimeter is, attackers will still get through because they are very sophisticated.

PreVeil was founded out of research at MIT using this principle of Zero Trust, which means we assume that everybody, including PreVeil, will be attacked. Systems that employ Zero Trust cybersecurity protect your information even when an attacker is able to access it.

We achieve this through end-to-end encryption. This means that emails and files remain encrypted at all times the only person who can decrypt it is the recipient. Even if the attacker gets to the servers where this information is stored, all they will get is gibberish because the information remains encrypted, and there are no keys available on those servers to decrypt them. End-to-end encryption represents one of the key frameworks by which Zero Trust is accomplished.

For more information about their end-to-end email and file sharing encryption systems, contact PreVeil today orbook a demo.

See the original post here:
Simplify DoD Compliance with End-to-End Encrypted Email and File ... - ThomasNet News

Read More..

Quantum link can connect UK and Ireland – Optics.org

05Oct2023

York University team demonstrates that an ultra-secure connection should be possible on 224km sub-sea cable.

A research team led by York University - home to the UKs quantum communications hub - has demonstrated that ultra-secure quantum encryption protocols should work over a 224-kilometer commercial-grade submarine cable linking the UK and Ireland.

In a pilot project conducted in July, York professor Marco Lucamarini and colleagues tested key elements of continuous-variable quantum key distribution (CV-QKD) over a low-loss fiber deployed by the network operator euNetworks.

Known as Rockabill, the fiber-optic link runs between Portrane in Ireland and Southport in the UK and is said to offer remarkably low average attenuation, with no need for amplification or any repeaters.

Until now, no quantum link has ever been established between the two countries, nor on a span stretching this length on a subsea fiber-optic cable, stated the team in a release announcing the results.

Sensitive detectors crucialWhile quantum encryption has been possible for many years it has typically been limited to relatively short distances or specialty fiber links. This is because it relies on the physical properties of individual photons, and the chances of photon loss due to attenuation or scattering increase dramatically over longer distances.

One way around this is to use trusted nodes at stages in the fiber-optic link, but the euNetworks sub-sea link does not feature any such nodes.

The research team said that the experiments conducted on-site resulted in the successful transportation of both single and entangled photons, as well as in the successful measurement of optical phase - the key physical attribute used to secure twin-field and CV-QKD protocols.

Results from the project, which is funded via the UK National Quantum Technologies Programme, were also presented earlier this week in Amsterdam, during the NATO Symposium on Quantum Technology for Defence and Security.

The research team says that the success of the initial tests was largely due to some highly sensitive detectors deployed at the Southport terminal of the optical link, which are able to reduce environmental noise levels.

CV-QKD also has an advantage over traditional QKD links, with the latter requiring expensive low-temperature single-photon avalanche detectors (SPAD) to operate.

Real-world scenarioLucamarini said of the results so far: This is a truly exciting step forward in realising the full potential of quantum communications and for the future of securing private data in an environment that is shaping the so-called quantum internet.

This project also advances the real-world integration of quantum communication technology into existing global telecommunications and network infrastructure - taking it out of the lab into a real-world scenario.

euNetworks CEO Paula Cogan added: Rockabill, and [our] Super Highway network [that] it is part of, provide the ideal platform for new and progressive technologies that will enhance and innovate future network infrastructure.

The project partners say that further experiments will need to be carried out using the same cable line before services integrating CV-QKD encryption can be offered for protecting live data.

Quantum techniques like CV-QKD are under investigation for applications securing critical data against the potential threat of future quantum computers expected to be capable of cracking conventional computational encryption techniques.

They are of particular interest to governments, pharmaceutical and life science organisations, and the financial services sector.

See the original post:
Quantum link can connect UK and Ireland - Optics.org

Read More..

New kind of quantum computer made using high-resolution microscope – Nature.com

Physicists have performed the first quantum calculations to be carried out using individual atoms sitting on a surface.

The technique, described on 5 October in Science1, controls titanium atoms by beaming microwave signals from the tip of a scanning tunnelling microscope (STM). It is unlikely to compete any time soon with the leading approaches to quantum computing, including those adopted by Google and IBM, as well as by many start-up companies. But the tactic could be used to study quantum properties in a variety of other chemical elements or even molecules, say the researchers who developed it.

At some level, everything in nature is quantum and can, in principle, perform quantum computations. The hard part is to isolate quantum states called qubits the quantum equivalent of the memory bits in a classical computer from environmental disturbances, and to control them finely enough for such calculations to be achieved.

Andreas Heinrich at the Institute for Basic Science in Seoul and his collaborators worked with natures original qubit the spin of the electron. Electrons act like tiny compass needles, and measuring the direction of their spin can yield only two possible values, up or down, which correspond to the 0 and 1 of a classical bit. But before it is measured, electron spin can exist in a continuum of possible intermediate states, called superpositions. This is the key to performing quantum computations.

Three titanium atoms are arranged inside a scanning tunnelling microscope (STM), close enough to sense each other's quantum spins. Iron atoms stuck to the tip of the STM (top) 'talk' with one of the qubits (blue), using it to read and write information on the other two (red) and to get them to perform a rudimentary quantum computation.Credit: Center for Quantum Nanoscience

The researchers started by scattering titanium atoms on a perfectly flat surface made of magnesium oxide. They then mapped the atoms positions using the STM, which has atomic resolution. They used the tip of the STM probe to move the titanium atoms around, arranging three of them into a triangle.

Using microwave signals emitted from the STM tip, the researchers were able to control the spin of a single electron in one of the titanium atoms. By tuning the frequencies of the microwaves appropriately, they could also make its spin interact with the spins in the other two titanium atoms, similarly to how multiple compass needles can influence each other through their magnetic fields. By doing this, the team was able to set up a simple two-qubit quantum operation, and also to read out its results. The operation took just nanoseconds faster than is possible with most other types of qubit.

Heinrich says that it will be fairly straightforward to extend the technique to perhaps 100 qubits, possibly by manipulating spins in a combination of individual atoms and molecules. It might be difficult to push it much beyond that, however and the leading qubit technologies are already being scaled up to hundreds of qubits. We are more on the basic-science side, Heinrich says, although he adds that multiple STM quantum computers could one day be linked to form a bigger one.

Originally posted here:
New kind of quantum computer made using high-resolution microscope - Nature.com

Read More..

Quantum Computing: What It Is And Why It Matters – Foreign Policy

Even as the U.S. government tries to hold back Chinas semiconductor industry and steal a march on its artificial intelligence capabilities, it is also preparing a much bigger, and more important, battlefield: quantum computing.

Even as the U.S. government tries to hold back Chinas semiconductor industry and steal a march on its artificial intelligence capabilities, it is also preparing a much bigger, and more important, battlefield: quantum computing.

Mentions of the technology have been tucked into a recent executive order curbing outbound investment into China, guardrails around funding for the CHIPS and Science Act, and a pair of presidential directives last year aimed at securing Americas own quantum capabilities.

For everything from encryption to combat communications, winning the quantum war means winning the bigger war. And this battle has just begun.

For the U.S. and our allies, not getting it first has profound implications, said Rick Switzer, director of strategy and policy at the State Departments Office of the Special Envoy for Technology, at the Quantum World Congress in Virginia last week.

The computers we use today operate on a binary system composed of units known as bits, which can hold a value of 0 or 1. They have a switch, like a light, on or off. Quantum computers are different.

Imagine if Schrdingers cat were a programmeror rather, the program. Quantum computing is neither one thing nor the other. Regular computers work on an assembly-line basisbrisk, in many casesbut still Henry Ford style. Quantum computers would allow controlled anarchy into the shop: Instead of an assembly line, youd have an exponential assembly cloud.

Quantum computers are basically strings of qubits, quantum bits, said Olivia Lanes, the global lead for quantum advocacy at IBM. When you string these together and you entangle them so basically all of the qubits can talk to one another, the computational power of that processor grows exponentially, as opposed to linearly like it would for our classical computer.

Quantum computers can perform complex functions simultaneously and could potentially solve problems that are out of reach of even the most advanced supercomputers of today. Drug discovery, advanced manufacturing, climate change modeling, and other applications could all be supercharged by quantum-enabled computing. Quantum computing will do to traditional computing what Einstein did to Newton. Even if it goes into weird places.

Eventually, it would help to solve for something that you wouldnt expect, said Kristin Gilkes, who leads the global quantum computing lab at the consulting firm EY and whose team is working on quantum applications for DNA sequencing. Today, 2 plus 2 is 4. In a quantum environment, its going to have the probability of being pink.

Not quite. Perhaps unsurprisingly, quantum computers are incredibly complex machines that are difficult to bend to ones will. Quantum processors consist of chips that are similar in size to those used in laptops and smartphones, but they need to operate at incredibly low temperaturesclose to absolute zero, or minus 460 degrees Fahrenheitto work. That is generally achieved by pumping supercooled fluids such as helium into the chamber that houses the chip.

Any changes to those conditions introduce errors in the computation, and scaling quantum systems up to a size that is useful is both challenging and befuddling, much like the worlds biggest pop star dating a tight end.

The whole field is struggling with trying to maintain these quantum features on a scale that is sufficiently large that would enable us to build truly powerful large-scale quantum computers, said Daniel Lidar, professor of electrical & computer engineering and director of the Center for Quantum Information Science & Technology at the University of Southern California.

Some applications are already emerging. IBM is working with Boeing to design new types of airplane wings using quantum computers, and other companies such as PsiQuantum are working with Mercedes-Benz to improve the design of lithium ion batteries for electric vehicles. We will never be able to simulate the chemistry thats going on inside those batteries with any conventional computer that we could ever build, said PsiQuantums co-founder and CEO, Jeremy OBrien. So now we have an understanding of how to deploy quantum computing for that task.

But those applications are still largely theoretical, establishing algorithms that can eventually run on a powerful enough quantum computer when, and if, it exists. Todays quantum computers arent quite there yetIBMs most powerful device is 433 qubits, and the company has set out a roadmap to achieve 100,000 qubits in the coming years. But that may still be many orders of magnitude short. OBrien and PsiQuantum, along with many others in the field, contend that quantum computers need at least a million qubits to have genuine commercial applications.

Its a little bit like if the goal is the top of the Empire State Building and youve got a 10-meter ladder, then by all means, build a 100-meter ladder. But if the goal is the moon, you can build a 1-kilometer ladder, [but] youre never going to get there, OBrien said.

A larger number of qubits isnt the only thing that determines a quantum computers efficacy. Other factors such as fidelityor how well those qubits work togetheralso matter significantly. Quantum advantage, an industry term that refers to quantum computers being able to solve problems that are out of reach of existing supercomputers, is considered to still be a ways away.

Like any major technological shift, quantum computing comes with both promises and pitfalls. Quantum sensing, which can measure changes in electrical and magnetic fields, has major implications for military technologies such as autonomous weapons, stealth, and radar.

Quantum computing could also help supercharge other critical technologies such as artificial intelligence that governments around the world are trying to rein in. When you combine big data science with the power of quantum computing, you can speed up many applications related to artificial intelligence and machine learning, said Yong Chen, director of the Quantum Science and Engineering Institute at Purdue University.

One of its most significant and potentially troubling implications, however, is its potential to completely upend global cybersecurity. A powerful enough quantum computer is capable of surpassing most forms of existing internet encryption methods, prompting governments around the world to start laying the foundation for establishing post-quantum encryption methods for sensitive data.

Assuming you have an ideal quantum computer, you can break the current encryption in a matter of hours versus basically billions of years on ordinary computers, Lidar said. That could take a few years or as much as a decade, but its very much a race against time, and countries such as China are pouring billions of dollars into enhancing their own quantum capabilities.

I think the fear factor is meaningful in that basically all of the encryption that we use todayour banks, our internet communications, our email, control of tanks, aircraft, whateverin all of these systems, there is encryption that would be vulnerable to a large quantum computer, said Peter Shadbolt, PsiQuantums co-founder and chief science officer.

Read more from the original source:
Quantum Computing: What It Is And Why It Matters - Foreign Policy

Read More..

Fujitsu, RIKEN open Japan’s first superconducting quantum ‘puter to eggheads – The Register

Development of Japan's first superconducting quantum computer is complete, Fujitsu and the country's scientific research institute RIKEN announced this week.

Superconducting quantum computers are among the most common today, and are employed by the likes of Google, IBM, and Rigetti. The design uses superconducting circuits operating at near absolute-zero temperatures to generate qubits.

The Japanese system, now deployed at the RIKEN RQC-Fujitsu Collaboration Center, features 64 superconducting qubits on an integrated chip.

The outfit claims the system is capable of 264 quantum superposition and entanglement states, which it asserts allows the computer to conduct calculations on a scale too challenging for classical computers. That said, the system will run alongside classical computers running quantum simulations to keep it in check.

"Quantum simulators, which can digitally imitate quantum computation, provide a bridge toward the development of practical fault-tolerant quantum computing (FTQC)," Fujitsu explained, noting a fault-tolerant system capable of generating reliable results is likely a decade or more out.

Quantum computers are finicky devices that need a good deal of error correction to be useful; that fault tolerance, allowing the computer to operate in a meaningful way, is a necessity, rather than a luxury, and it's still years away.

For now, pairing the quantum computer up with an HPC cluster that simulates 40 qubits should help scientists evaluate the systems ability to reliably generate accurate results.

The problem, Fujitsu explained, is that noisy intermediate-scale quantum (NISQ) computers suffer from computational errors due to noise in the surrounding environment. Quantum simulations aren't prone to these same errors because the qubits arent real and are therefore immune to noise disruptions. The downside of quantum simulation is it's rather slow compared to the real thing. And also not the real thing.

Which is not to say that sims and this system arent useful. RIKEN and Fujitsu claim the hybrid system has already proven more accurate when applying quantum algorithms to chemical calculations. These calculations are a classic HPC workload and, as we've previously reported, a prime candidate for quantum acceleration in the near term.

An experiment involving this hybrid setup calculated the ground state energy of a molecule containing 12 hydrogen atoms. Using a combination of quantum algorithms, density matrix embedding theory a method of breaking up large molecules into smaller fragments and an AI model to help mitigate the effects of noise, Fujitsu and RIKEN say they were able to perform these energy calculations with higher accuracy than when using classical algorithms alone.

With the system now deployed, Fujitsu and RIKEN are now opening it up to outside companies and institutions including Fujifilm, Tokyo Electron, Mizuho-DL Financial Technology Co., and Mitsubishi Chemical to conduct joint research.

Fujitsu and RIKEN are already developing technologies necessary to scale the system up to 1,000 qubits, thanks to a vertical wiring scheme that Fujitsu explained on Thursday.

More:
Fujitsu, RIKEN open Japan's first superconducting quantum 'puter to eggheads - The Register

Read More..

Checking in on the quantum hype – POLITICO – POLITICO

A quantum computing chip made by IonQ, a startup based in Maryland. | Walker Steere / IonQ

The hype around quantum computing has grown exponentially forgive the math pun as of late, even as good old ones-and-zeroes-based artificial intelligence has had its world-changing moment in the sun.

The power, promise, and quandary of quantum computing are all contained in the difference between a quantum computer and a standard one. Whereas even the most powerful supercomputer does its work through a binary system of ones and zeroes, a quantum computer programs the subatomic state. In that state, mere particles are a platform for computation, allowing for an almost infinitely more powerful, speedy, and sophisticated series of calculations.

The quantum computers that might follow from that innovation, some say, can do practically anything: Theyll solve climate change, and make modern cryptography obsolete. They might revolutionize drug discovery, or make gene editing as easy as a simple cardiogram. They could even allow you to witness the age of dinosaurs or the crucifixion of Jesus Christ as they really happened. (Okay, that last one was from a cable miniseries, but you get the point.)

Recent years have seen companies including Google and a university in China claim to have reached quantum supremacy, or the demonstration of capabilities far beyond that of a classical computer; this years second annual Quantum World Congress claimed to bring a quantum-ready future into focus. But what does that even mean? How close are we to living in a world where everything from cybersecurity to medicine is utterly transformed by that revolution in how computers work at a subatomic level?

The people who need to raise huge amounts of venture capital or government funding have this enormous interest in making it appear like this is all going to happen next year, says Scott Aaronson, the director of the Quantum Information Center at the University of Texas at Austin. I spend a lot of my time both arguing against people who claim that quantum computing is going to revolutionize everything next year, and also against the people who say that its impossible.

You dont have to get bogged down in the details of physics or mathematics to see why quantum computing could be a boon, or danger, to society. As early as 1994, the physicist Peter Shor showed that quantum computers could theoretically break almost any code known to man, eventually leading the National Institute of Standards and Technology to hold a worldwide contest to develop quantum-proof new systems. Aaronson says quantum technology could someday simulate complicated scientific problems, leading to breakthroughs in battery and chemical technology. And, of course, quantum computers could help solve long-standing questions in particle physics, the very field that makes them possible.

Before quantum computers do all that, however, they have to do something a little more prosaic: Actually beat their classical counterparts at anything useful at all.

A huge amount of the recent investment in quantum computing has been driven by what we could we could generously call aspirational quantum algorithms, Aaronson said. Conceivably, they would exponentially outperform a classical computer. Will they actually do that? Well, you know, who has any idea. But no one can prove that they wont.

Getting quantum computers to that point depends in part on the way the systems are built and maintained the conditions under which they maintain programmability are so fragile that IBMs quantum computers, for example, need to be held at a temperature a hundredth of a degree above absolute zero, although methods for dealing with quantum decoherence vary.

Physicist Wesley Campbell leads a group at the University of California Los Angeles researching trapped-ion quantum systems, where the delicate environment required to sustain those systems is created by confining those ions to a vacuum. He said that despite the extent to which this research is already a boon to physics, he expects it to be a long time before it has any real practical application.

Companies used to do R&D, and basically now they just do D, Campbell said. All of quantum computing right now is still R.

Luckily for quantum mavens, governments across the world are eager to give them a leg up in that department. Here in the U.S., the National Quantum Initiative Act was signed into law in 2018, authorizing more than $1 billion for quantum-related research and standing up new quantum-focused offices across various federal agencies. That act expired on Sept. 30 but is widely expected to be re-authorized this Congress, and last years CHIPS and Science Act authorized its own slate of pro-quantum funding.

Europe isnt lagging on this front either, authorizing its own 1 billion research project to stake a claim in the quantum race. The nascent state of quantum computing research means that theres plenty up for grabs for any nation with the brainpower and cash to invest in it.

A courtroom sketch from Sam Bankman-Fried's fraud trial. | AP

Sam Bankman-Fried is on trial in Manhattan, but hes a problem on the Hill.

A team of POLITICO reporters wrote this morning about the headaches SBFs trial is causing for a now-poorly-timed effort to pass landmark crypto legislation. Bills currently working their way through the House of Representatives would establish a regulatory framework largely seen as favorable to the crypto industry, checking the influence of the Securities and Exchange Commission (which has been aggressive in regulating crypto) and promoting the use and development of stablecoins pegged to the U.S. dollar.

But, the elephant in the room Bankman-Fried is not helping. If youre not familiar with the crypto industry and this is the first time youre thinking about it your impression is certainly not a positive one, said Kristin Smith, CEO of the leading industry group the Blockchain Association. He was a terrible ambassador for our industry.

Thats created a political opening for crypto-skeptical Democrats including Sen. Elizabeth Warren (D-Mass.), who is co-sponsoring a bill that would crack down on crypto-assisted money laundering. Warren told POLITICO Sam Bankman-Frieds trial will remind everyone in Congress about the risks that an unregulated crypto industry poses for all of our constituents, for our economy and for international stability.

The U.S. doesnt have a monopoly on the culture war debates shaking up tech and science.

POLITICOs Vincent Manancourt reported today on a speech from U.K. Science and Tech Secretary Michelle Donelan, who urged vigilance against creeping wokeism in scientific research echoing criticism from the right on this side of the pond that social justice ideology threatens human progress.

Fundamentally, I believe adults should have more choice over what they see, not the state and not tech executives thousands of miles away because we are the party of free speech, and we should stay that way, Donelan said, touting her alterations to the U.K.s Online Safety Bill that made it harder for tech companies to remove content described as legal but harmful.

Stay in touch with the whole team: Ben Schreckinger ([emailprotected]); Derek Robertson ([emailprotected]); Mohar Chatterjee ([emailprotected]); Steve Heuser ([emailprotected]); Nate Robson ([emailprotected]) and Daniella Cheslow ([emailprotected]).

If youve had this newsletter forwarded to you, you can sign up and read our mission statement at the links provided.

Excerpt from:
Checking in on the quantum hype - POLITICO - POLITICO

Read More..

Vanderbilt University’s Quantum Potential unveiled: Meet the minds … – Vanderbilt University News

Vanderbilt University is unveiling its marquee video series on research and innovation, Quantum Potential, which provides a glimpse into the remarkable research initiatives underway at the university and medical center.

Hosted by Radiolab founder and Vanderbilt faculty member Jad Abumrad, Quantum Potential is a collection ofwildbutprecise portraits of the scholars, scientists and students at Vanderbilt who are finding new ways to understand the worldand through understanding, change it. Quantum Potential is a behind-the-scenes peek at who they are, how they think and, ultimately, how they come to reveal something that improves the human experience.

Quantum Potentials first season features civil and environmental engineers paving the way for smoother traffic; a biomedical engineer merging her faith and science to develop diagnostic tools; a chemist revealing myriad uses for sugars in breast milk, from naval ship paint to chemotherapy; a team of historians and computer scientists salvaging historical records with AI; and the immunologists responsible for developing a COVID-19 vaccine in a record-setting 78 days.

The next world that were all going to live in, that we want to live inpeople here at Vanderbilt are already imagining it, Abumrad said.

Vanderbilt University is hosting a premiere event for the series that will also be livestreamed. It will be on Wednesday, Oct. 11, at 6 p.m. CT at the Belcourt Theatre. This event will bring together researchers, Chancellor Daniel Diermeier, Provost C. Cybele Raver and Abumrad for a screening of two short films, behind-the-scenes discussions and an immersive performance by Ji Hye Jung, associate professor of percussion at Blair School of Music.

Attendance is open to the Vanderbilt community and the general public; registration is required.

It is essential that we share stories of the positive impact of academic research on society, which are often unknown by the broader public, said Steve Ertel, vice chancellor for communications and marketing at Vanderbilt. Quantum Potential aims to shine a bright light on the extraordinary people who work tirelessly every day at Americas leading research universities to make the world better.

The university is committed to groundbreaking discovery and innovation with real-world impact. In fiscal year 2023, Vanderbilt and Vanderbilt University Medical Center researchers, including faculty, students and staff, have secured:

Abumrad, who joined Vanderbilt in April 2022 as Distinguished Research Professor of Cinema and Media Arts and of Communication of Science and Technology in the College of Arts and Science, brings a wealth of experience to the university. He is the creator of the critically acclaimed podcasts Radiolab and Dolly Partons America, both of which have received Peabody awards for their exploration of profound philosophical and humanistic questions. In 2011, Abumrad was honored as a MacArthur Fellow.

Here is the original post:
Vanderbilt University's Quantum Potential unveiled: Meet the minds ... - Vanderbilt University News

Read More..