Space Industry and Business News  
CYBER WARS
WSU mathematician breaks down how to defend against quantum computing attacks
by Staff Writers
Pullman WA (SPX) Mar 01, 2017


In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

The encryption codes that safeguard internet data today won't be secure forever. Future quantum computers may have the processing power and algorithms to crack them. Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality. He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers.

The paper clarifies misunderstandings about the complex field of public key cryptography and provides a common basis of understanding for the technical experts who will eventually be tasked with designing new internet security systems for the quantum computing age.

"Designing security systems to protect data involves experts from many different fields who all work with numbers differently," Hamlin said. "You are going to have pure and applied mathematicians, computer programmers and engineers all involved in the process at some point. For it to work in real life, all of these people need to have a common language to communicate so that they can make important decisions about how to safeguard online transactions and personal communications in the future."

Preparing for the future
Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of time faster than silicon-based computers. A hacker armed with a next generation quantum computer could in theory decrypt any internet communication that was sent today, Hamlin said.

In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

In his paper, Hamlin breaks down how the generalized knapsack code works in terms that computer scientists, engineers and other experts outside the field of pure mathematics can understand. He explains that by disguising data with number strings more complex than the 0s and 1s conventional computers use to operate, the generalized knapsack offers a viable security method for defending against quantum computing hacks.

"The Generalized Knapsack Code expands upon the binary representations today's computers use to operate by using a variety of representations other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including those using basis reduction, one of the decoding methods used to break the original knapsack code."

Hamlin said his hope is that his paper, Number in Mathematical Cryptography, clears up misunderstandings he has run into professionally so that the generalized knapsack code can be developed for future use.

"Quantum computing will change how we handle data and we, as a society, are going to have to make some important decisions about how to prepare for it," Hamlin said. "A code like this can be implemented on conventional hardware and yet it would also be secure from a hacker with a quantum computer. I think it is time for us to consider this code very seriously for adapting commerce and perhaps communication in light of the possibility of quantum computing."

Research paper

CYBER WARS
A computer's LED light can smuggle out data from the hard drive
Beersheba, Israel (UPI) Feb 22, 2017
As experiments showed, a computer's LED light could be used to smuggle out data from the hard drive to a remote receiver with cameras or light sensors, like a drone. Just because a computer isn't connected to a wireless network, doesn't mean it's immune to invasion. As researchers at the Ben-Gurion University of the Negev proved, if a computer can be directly infected with malware via U ... read more

Related Links
Washington State University
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment on this article using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Raytheon gets contract for Silent Knight radar systems

Kelvin Hughes to provide SharpEye radars for U.K. OPVs

Terma partner wins Indian radar contract

Two radar eyes are better than one

CYBER WARS
General Dynamics gets enterprise communications contract

Space aggressors jam AF, allies' systems

Harris intros new wideband manpack radio system

Russia showcases jam-proof communications system

CYBER WARS
CYBER WARS
Police in China's restive Xinjiang to track cars by GPS

GLONASS station in India to expedite 'space centric' warfare command

Australia and Lockheed field 2nd-Gen sat-based augmentation system

UK may lose access to EU Galileo GPS system after Brexit

CYBER WARS
Charles Woodburn to take over as BAE Systems CEO

Madrid invites Airbus CEO to debrief on military plane woes

U.S. Navy orders 12 new fighter aircraft from Boeing

NASA wind tunnel tests Lockheed Martin X-Plane concept

CYBER WARS
Artificial synapse for neural networks

Combining the ultra-fast with the ultra-small

Particles from outer space are wreaking low-grade havoc on personal electronics

A new spin on electronics

CYBER WARS
MDA to Acquire DigitalGlobe

Sentinel-2B satellite ready for launch from Kourou

'Quartz' crystals at the Earth's core power its magnetic field

NASA to launch sequel to successful Lightning Study Mission

CYBER WARS
Study finds high levels of toxic chemicals in house cats

Ex-yoga missionary unleashes rage on Philippine miners

Vietnam to punish officials over mass fish deaths

Tiny plastic particles from clothing, tyres clogging oceans: report









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.