TITLE

MIT's new 5-atom quantum computer could make today's encryption obsolete

AUTHOR(S)
NOYES, KATHERINE
PUB. DATE
April 2016
SOURCE
PCWorld;Apr2016, Vol. 34 Issue 4, p11
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article looks into the five-atom quantum computing system by the Massachusetts Institute of Technology in Cambridge and the University of Innsbruck in Austria. Physics professor Isaac Chuang says the system addresses data encryption and will be costly and is much more an engineering effort. The National Security Agency expressed its interest on the potential of such computing system. Details of how such computing system works, such as cutting back atomic-scale units and the quantum system.
ACCESSION #
114390089

 

Related Articles

  • Privacy Tools: Encrypt What You Can. Angwin, Julia // Pro Publica;5/6/2014, p1 

    The article focuses on techniques that can be used by web users to protect their privacy online and overcome the threats posed by hackers. Topics include recommendation to encrypt the data stored on hard drives and cloud; attempts of the U.S. National Security Agency (NSA) to break encryption;...

  • Microsoft Tightens Security on Outlook.com and OneDrive. Hernandez, Pedro // eWeek;7/ 2/2014, p5 

    The article discusses the security improvement on Outlook.com and OneDrive by multinational software company Microsoft Corp. The lock down to tighten encryption and cloud security reportedly arises amid spying scandal involving the U.S. National Security Agency (NSA) which collected cloud user...

  • NSA Sifted Crash Dump Data in Search of App Vulnerabilities: Report. Lemos, Robert // eWeek;1/2/2014, p13 

    The article reports that according to a report published in the magazine "Der Spiegel" on December 29, 2013, the U.S. National Security Agency is using a tool Dr. Watson, developed by Microsoft Corp., to remotely find vulnerable software within companies and organizations. According to Alex...

  • Adopting Encryption to Protect Confidential data in Public Clouds: A Review of Solutions, Implementation Challenges and Alternatives. Kronqvist, Jyrki; Lehto, Martti // Proceedings of the European Conference on e-Learning;2015, p151 

    A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the National...

  • Lucifer Algorithm.  // Network Dictionary;2007, p295 

    A definition of the term "Lucifer Algorithm" in computer security is presented. The term refers to a block cipher developed by IBM originally based on a 128-bit key. The National Security Agency of the U.S. developed the Data Encryption Standard (DES) algorithm based on the Lucifer with many...

  • Should Banks Worry About the NSA? Crosman, Penny // Americanbanker.com;9/12/2013, p1 

    The article focuses on the issue of the security of online banking data after the U.S. National Security Agency's (NSA) decision to undermine encryption on the Internet as of September 2013. Topics discussed include NSA's encryption standards, role of the decision in breaking into online banking...

  • Software freedom. Killock, Jim // Custom PC;Dec2013, Issue 123, p100 

    The article argues on software freedom in the U.S. The author is critical on digital rights in computer software as the government through the U.S. National Security Agency (NSA) introduces encryption program to hack personal information. It is suggested that software freedom arises from...

  • Image Encryption Scheme Based on Filter Bank and Lifting. Saraireh, Saleh; Al-Sbou, Yazeed; Al-Saraireh, Ja'afer; Alsmadi, Othman // International Journal of Communications, Network & System Scienc;Jan2014, Vol. 7 Issue 1, p43 

    In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the...

  • FORTEZZA.  // Network Dictionary;2007, p200 

    An encyclopedia entry for "FORTEZZA" is presented. It refers to a group of cryptographic technologies developed by the National Security Agency (NSA) for U.S. government use. FORTEZZA was developed to create user-friendly, low-cost security devices for the Defense Message System. The Defense...

  • Is Switzerland becoming a cloud haven in wake of Prism scandal? Venkatraman, Archana // Computer Weekly;8/11/2015, p4 

    The article discusses that Switzerland's privacy laws and data protection regulations have been turning the country into a cloud haven amidst the U.S. National Security Agency's Prism surveillance program. Topics include the factors attributed to the growth in hosting demand, the need of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics