Using quantum fluctuations to generate random numbers faster

Phys.org  April 5, 2023 A popular approach to generating quantum random numbers is to use the quantum vacuum state. While convenient, this approach has been generally limited in speed compared to other schemes. Through custom codesign of optoelectronic integrated circuits and side-information reduction by digital filtering, an international team of researchers (Belgium, Denmark, Italy) experimentally demonstrated an ultrafast generation rate of 100 Gbit/s, setting a record for vacuum-based quantum random number generation by one order of magnitude. Their experimental demonstrations were well supported by an upgraded device-dependent framework that was secured against both classical and quantum side information and that […]

A ‘beyond-quantum’ equivalence principle for superposition and entanglement

Phys.org  May 2, 2022 An international team of researchers (France, Germany, Spain) has discovered a new connection between superposition and entanglement that does not assume that quantum theory is correct. They proved that given any two general probabilistic theories (GPTs) the following are equivalent: (i) each theory is nonclassical, (ii) each theory satisfies a strong notion of incompatibility equivalent to the existence of “superpositions” and (iii) the two theories can be entangled, in the sense that their composite exhibits either entangled states or entangled measurements. Intuitively, in the post-quantum GPT setting, a superposition is a set of two binary ensembles […]

How the United States Is Developing Post-Quantum Cryptography

IEEE Spectrum  September 6, 2019 NIST is overseeing the second phase of its Post-Quantum Cryptography Standardization Process to narrow down the best candidates for quantum-resistant algorithms that can replace modern cryptography. At the Second PQC Standardization Conference 26 candidate algorithms were selected. The algorithms fall into two general categories – the first category includes key-establishment algorithms that enable two parties that have never met to agree on a shared secret, the second category involves algorithms for digital signatures that ensure the authenticity of data. Both categories require new algorithms based upon mathematical problems which even quantum computers couldn’t crack. NIST […]

Five emerging cyber-threats to worry about in 2019

MIT Technology Review  January 4, 2019 According to experts in the field we going to see more mega-breaches and ransomware attacks in 2019. Besides planning to deal with established risks, like threats to web-connected consumer devices and critical infrastructure, cyber-defenders should be paying attention to new threats, too. Here are some that should be on watch lists: Exploiting AI-generated fake video and audio, Poisoning AI defenses, hacking smart contracts, Breaking encryption using quantum computers, Attacking from the computing cloud. A recent report by NAS from a group of US quantum experts urges organizations to start adopting new and forthcoming kinds of […]

Energy-efficient encryption for the internet of things

MIT News  February 12, 2018 Researchers at MIT have built a general-purpose elliptic-curve chip, hardwired to perform public-key encryption, that consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster. They will present their paper at the upcoming International Solid-State Circuits Conference… read more.