Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Quantum Hardening Cryptographic Protocols
This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.
If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00
📺 👉🏼 🇬🇧 https://media.ccc.de/v/DiVOC-19-quantum-en
📺 👉🏼 🇩🇪 https://media.ccc.de/v/DiVOC-19-quantum
#ccc #DiVOC #video #quantum #hardening
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
This talk is an introduction to the field of quantum hardening. The introduction of practical quantum computers will render existing cryptographic protocols unsafe. At what point we need to start worrying and what can be done to remedy this problem is the focus of this talk. The talk begins with an introduction to the design of modern cryptographic protocols in general.
If you would like to skip the crypto introduction and cut to the quantum hardening part, jump to minute 29:00
📺 👉🏼 🇬🇧 https://media.ccc.de/v/DiVOC-19-quantum-en
📺 👉🏼 🇩🇪 https://media.ccc.de/v/DiVOC-19-quantum
#ccc #DiVOC #video #quantum #hardening
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
U.S. hatches plan to build a quantum Internet that might be unhackable
The new network would sit alongside the existing Web, offering a more secure way to send and process information
U.S. officials and scientists unveiled a plan Thursday to pursue what they called one of the most important technological frontiers of the 21st century: building a quantum Internet.
Speaking in Chicago, one of the main hubs of the work, they set goals for forging what they called a second Internet — one that would function alongside the globe’s existing networks, using the laws of quantum mechanics to share information more securely and to connect a new generation of computers and sensors.
Quantum technology seeks to harness the distinct properties of atoms, photons and electrons to build more powerful computers and other tools for processing information. A quantum Internet relies on photons exhibiting a quantum state known as entanglement, which allows them to share information over long distances without having a physical connection.
David Awschalom, a professor at the University of Chicago’s Pritzker School of Molecular Engineering and senior scientist at Argonne National Laboratory, called the Internet project a pillar of the nation’s quantum-research program.
“It’s the birth of a new technology. It’s becoming a global competition. Every major country on earth has launched a quantum program … because it is becoming clearer and clearer there will be big impacts,” he said in an interview.
👀 👉🏼 From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop
https://www.osti.gov/biblio/1638794
👀 👉🏼 https://www.washingtonpost.com/technology/2020/07/23/us-plan-quantum-internet/
#usa #quantum #Internet #unhackable
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The new network would sit alongside the existing Web, offering a more secure way to send and process information
U.S. officials and scientists unveiled a plan Thursday to pursue what they called one of the most important technological frontiers of the 21st century: building a quantum Internet.
Speaking in Chicago, one of the main hubs of the work, they set goals for forging what they called a second Internet — one that would function alongside the globe’s existing networks, using the laws of quantum mechanics to share information more securely and to connect a new generation of computers and sensors.
Quantum technology seeks to harness the distinct properties of atoms, photons and electrons to build more powerful computers and other tools for processing information. A quantum Internet relies on photons exhibiting a quantum state known as entanglement, which allows them to share information over long distances without having a physical connection.
David Awschalom, a professor at the University of Chicago’s Pritzker School of Molecular Engineering and senior scientist at Argonne National Laboratory, called the Internet project a pillar of the nation’s quantum-research program.
“It’s the birth of a new technology. It’s becoming a global competition. Every major country on earth has launched a quantum program … because it is becoming clearer and clearer there will be big impacts,” he said in an interview.
👀 👉🏼 From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop
https://www.osti.gov/biblio/1638794
👀 👉🏼 https://www.washingtonpost.com/technology/2020/07/23/us-plan-quantum-internet/
#usa #quantum #Internet #unhackable
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
www.osti.gov
From Long-distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop…
The U.S. Department of Energy's Office of Scientific and Technical Information
Forwarded from BlackBox (Security) Archiv
Welcome to the quantum Internet, with privacy guaranteed by the laws of physics
Quantum computing is gradually moving from the realm of science – and even science fiction – to become a practical technology that is being used in real-life contexts.
Three years ago, Privacy News Online wrote about one aspect – the possibility that quantum computers will be able to unlock all of today’s encryption, including the strongest. But increasingly, a more positive vision of quantum computing is emerging. It is centered around the creation of what is being called the quantum Internet.
That’s just a shorthand way of saying a global network of quantum computers and other devices based on the physics of quantum mechanics, able to exchange information much as ordinary systems do across today’s non-quantum Internet. But the quantum version has one crucial property that makes it of great importance for privacy: it offers a fundamentally secure way of communication in which privacy is guaranteed by the laws of physics.
That’s because the quantum bits – qubits – that move across a quantum network link are subject to the observer effect: any attempt to monitor them as they traverse the network would modify them. As a result, it will be evident when things like encryption keys or data have been compromised en route. There is no way around this – it is an inherent property of quantum mechanical systems – which is why so many companies and governments are exploring how to create quantum networks and the quantum Internet.
👀 👉🏼 https://www.privateinternetaccess.com/blog/welcome-to-the-quantum-internet-with-privacy-guaranteed-by-the-laws-of-physics/
👀 👉🏼 (pdf)
https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf
#quantum #internet #privacy #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Quantum computing is gradually moving from the realm of science – and even science fiction – to become a practical technology that is being used in real-life contexts.
Three years ago, Privacy News Online wrote about one aspect – the possibility that quantum computers will be able to unlock all of today’s encryption, including the strongest. But increasingly, a more positive vision of quantum computing is emerging. It is centered around the creation of what is being called the quantum Internet.
That’s just a shorthand way of saying a global network of quantum computers and other devices based on the physics of quantum mechanics, able to exchange information much as ordinary systems do across today’s non-quantum Internet. But the quantum version has one crucial property that makes it of great importance for privacy: it offers a fundamentally secure way of communication in which privacy is guaranteed by the laws of physics.
That’s because the quantum bits – qubits – that move across a quantum network link are subject to the observer effect: any attempt to monitor them as they traverse the network would modify them. As a result, it will be evident when things like encryption keys or data have been compromised en route. There is no way around this – it is an inherent property of quantum mechanical systems – which is why so many companies and governments are exploring how to create quantum networks and the quantum Internet.
👀 👉🏼 https://www.privateinternetaccess.com/blog/welcome-to-the-quantum-internet-with-privacy-guaranteed-by-the-laws-of-physics/
👀 👉🏼 (pdf)
https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf
#quantum #internet #privacy #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Privacy News Online by Private Internet Access VPN
Welcome to the quantum Internet, with privacy guaranteed by the laws of physics
Quantum computing is gradually moving from the realm of science – and even science fiction – to become a practical technology that is being used in
Media is too big
VIEW IN TELEGRAM
Who pays for all the #quantum crap? Probably you
Forwarded from 0•Bytes•1
Hello, my Sonys and Cheshire Cats! 🐭✨🐈⬛
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet andmyths about killer towers, then 6G will raise the bar📡
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:it doesn't work well in practice, as these waves don't pass through walls very well😓, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats🛡
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats ). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens next🔑If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️🔥
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum