Quantum Entanglement Now On-a-Chip

PORTLAND, Ore. -- Quantum computing promises to revolutionize future computers, enabling pint-sized hardware to outperform room-filing supercomputers, plus offers uncrackable encryption that foils all hackers no matter how skillful they are. The missing piece of the quantum puzzle was called "spooky action at a distance" by Einstein, namely a reliable source of entangled photons who mirror each others' state no matter how far apart on standard CMOS silicon chips.

Now Italian scientists at the Universit degli Studi di Pavia, in cooperation with the University of Glasgow and the University of Toronto, claim to have surmounted this last engineering hurdle.

"The idea is that pumping laser light inside a tiny ring enhances the probability of two photons interacting. We therefore decided that this enhancement could be used, in particular, for the production of entangled photon pairs," professor Daniele Bajoni at the Universit degli Studi di Pavia told EE Times. "In previous works, we discovered that confining light inside a ring resonator greatly enhances the interaction between light and matter, but our new results were realized by design, not by chance."

The most immediate application of quantum entanglement on a chip is uncrackable encryption, since all the chip maker has to do is build the silicon photon ring oscillator and use a popular quantum cryptography algorithm for entanglement which have already been proven in the lab (using bulky expensive equipment instead of a cheap silicon chip).

"The most typical algorithm for quantum cryptography using entanglement is the so-called Eckert protocol. In essence two parties (generally named Alice and Bob) exchange a set of entangled photon pairs, let us say idler photons are sent to Alice and signal photons are sent to Bob. Alice performs certain measurements on her photons, obtaining random results (let us say 1100101). If Bob performs the correct measurements on his photons, because of the entanglement, he will get the same string of random bits as Alice. The two can then use this string of random bits to encrypt signals to be sent on normal channels," Bajoni told us. "If someone eavesdrops the exchange of entangled photons between Alice and Bob, this action will change the properties of the photons, so that Alice and Bob can know if there is an eavesdropper: this makes the communication intrinsically secure."

For the future, the research group plans to add the other silicon photonics parts, using known means, to make a complete on-chip entanglement engine that can be used by others to realize specific encryption applications that have been dreamt of for decades, but which may now be realizable due to the new entangled photon source these researchers have invented.

"The obvious next steps will be to further integrate components on the chip. In our result we use the silicon ring resonator as a source of entangled photon, but then the filtering of the emitted light and the measurement of the entanglement is done via an external experimental set-up. All this external set-up can, ultimately, be integrated on a silicon chip too," Eckert told us. "And in related work, done with different authors in different collaborations, we have shown how to integrate spectral filters alongside the ring resonator. In the future we want to build the necessary interferometers and, if possible, the detectors, in a fully integrated platform. The final goal will be to have two chips, linked by fiber optics, performing key exchange for a complete quantum cryptography solution.

R. Colin Johnson, Advanced Technology Editor, EE Times

Related articles:

Link:
Quantum Entanglement Now On-a-Chip

Encryption Software Market Worth $4.82 Billion by 2019

DALLAS, January 27, 2015 /PRNewswire/ --

According to a new market research report "Encryption Software Market by Applications (Disk Encryption, File/Folder Encryption, Database Encryption, Communication Encryption, Cloud Encryption), by Deployment Type (Cloud, On-Premises) & by Regions (NA, Europe, APAC, MEA, LA) - Global Forecast and Analysis 2014-2019", published by MarketsandMarkets, defines the global Encryption Software Market based on its applications, deployment types, user types, and industry verticals with an in-depth analysis and forecasting of market sizes. The report also identifies the factors driving this market, various restraints, and opportunities impacting it along with the adoption trends.

Browse 72 market data tables and 57 figures spread through 155 pages and in-depth TOC on "Encryption Software Market-Global Forecast and Analysis 2014 - 2019".

http://www.marketsandmarkets.com/Market-Reports/encryption-software-ma ...

Early buyers will receive 10% customization on this report.

The expansive embracement of PCs among organizations across all regions has redefined the work pattern. In addition, the propagation of mobile devices across the world complemented with the ease in access to business content has comprehensively enhanced the employee efficiency. Further, with the escalating Bring Your Own Device (BYOD) trend among companies supplemented with superior internet connectivity has broadly leveraged organizations. This has extensively led to the consumption and generation of vast amount of data that is transferred across these mobile devices such as smartphones, DVDs and USBs, and vice versa. However, this has made this data susceptible to cyber-attacks, commercial espionage, threats, and loss. Thus, to defend their sensitive and critical content, protect the authenticity of the data, and evade breach of privacy, the enterprises and Small and Medium Businesses (SMBs) categorically consider encryption software solutions within their organizations. Since, the prevalent anti-virus and firewalls across companies offer the basic level of security to the content, the need for comprehensive security solution ranging from disks, file/folder, databases, communication to cloud are demanded globally.

There has been a continual technological advancement related to data accessibility technics. With the large scale usage of mobile devices for accessing and transmitting organizational content, companies have been comprehensively leveraged in making timely and informed organizational decisions. In addition, the widespread embracement of cloud, social media and internet has further improved business functioning along with increasing the data being generated and accessed through mobile devices. These pervasive progressions and ease of data accessibility have boosted the profitability and increased the business efficiency. However, this data that resides within the companies and which constantly travels over the business networks through emails and or is stored in cloud becomes vulnerable to tampering, attacked, misuse, and loss. To cohesively protect this sensitive content, the enterprises and SMBs have been primarily considering the implementation of encryption solutions ranging from disks, file/folder, databases, communication to cloud. These encryption solutions provision comprehensive security to business data that is within the organizations, in cloud and which travels beyond the companies through various means including emails, messages, and mobile devices. These solutions safeguard the valuable data of the businesses from commercial espionage, cyber-attacks, fraudulent activities, and privacy breaches. In addition, these encryption solutions also prevent unauthorized access, and provide advanced and customized encryption for superior protection of data.

Further, these encryption solutions are expansively embraced for provisioning of continual security to large organizational content accessed and transmitted across diverse devices regardless of location. These encryption solutions can be customized to address the business needs of the SMBs and enterprises and are easily deployed on the cloud and on-premises. Currently, hosted encryption software is largely being adopted by the users to comprehensively secure their content from threats and perils of loss. Further, the commencement and provision of these prevalent encryption solutions has enabled the encryption software vendors, third-party providers and cloud vendors to offer exclusively customized encryption solutions precisely addressing the needs of the businesses. Thus, encryption plays the crucial role in protecting the data, which forms the most valuable and sensitive assets for the companies, along with securing the privacy of its employees.

The major vendors of the global Encryption Software Market are Microsoft Corporation, Symantec Corporation, Intel Corporation, and Check Point Software Technologies Ltd. The major forces driving this market are the presence of a dynamic business environment, increasing cyber-attacks, growing concern about data loss among the companies, and obligatory need for adhering with standards.

For more Inquiry:http://www.marketsandmarkets.com/Enquiry_Before_Buying.asp?id=22725458 ...

View post:
Encryption Software Market Worth $4.82 Billion by 2019

Encryption Made Easy: Hotspot Shield App Update Offers A VPN For Everyone

Two million over three days. Thats how many people in Turkey downloaded the Hotspot Shield app last year when the beleaguered government tried to silence dissent by blocking Twitter and YouTube. Its a successful foundation that AnchorFree hopes to build on when the privacy-focused software company rolls out updates for the Android and iOS versions of its signature app Tuesday.

Originally launched in 2005, the Hotspot Shield app makes it possible to browse the Web with a virtual private network (VPN), but has also been plagued by an overcrowded interface. Thats something AnchorFree has corrected in the latest version, while also making it possible for users to turn the app on and off without remembering they need to do so.

Levent Sapci, the director of marketing at AnchorFree, said the changes theres one for iOS and another for Android are a major update for the company, and come as technology companies prepare for another one billion people or so to come online, many of whom live under repressive governments and would be in the market for a VPN. Both versions will still encrypt a users network traffic data, hide their IP address from Internet Service Providers, protect users from malicious software and phishing sites, while also providing security on public WiFi networks.

Hotspot Shield also comes with multiple location options, permitting users to reroute their traffic through servers in the U.S., U.K. or Japan. Now, though, the iOS version - - available ad-free for a seven-day free trial before costing $5 per month or $30 per year - - comes with a much cleaner display and improved user friendliness.

Theres one big on/off button within the app, it couldnt be easier, Sapci said. Users previously needed to go to the settings on their iPhone or iPad to their VPN settings. All users have to do now is tap on the virtual location of their choice and hotspot automatically, instantly changes the location.

Along with communicating with the outside world in the event of an Internet blackout, that option also makes it possible for Chinese users to access Facebook, for instance, or for Mexican users to view American Netflix. The Android version, which has been available for weeks, is available for free and supported by advertisements. It also gives users the option to select one of three protection methods, with the ultimate goal of helping Hotspot Shield operate in the background, carrying out its job like an anti-virus program would.

This is a brand new concept that will make it even more simple for users to not interact with Hotspot all the time, Sapci said. We expect our retention rate to grow significantly because in this case were doing the thinking for the user.

That thinking happens with full protection mode (the traditional connection mode in which all traffic runs through Hotspot Shield), the Selected Sites mode and the Smart Choice mode. The Selected Sites option asks users to input an unlimited number of sites to which the connection should be protected, including streaming and app traffic. The Smart Choices mode, while including the Selected Sites mode, also switches itself on automatically when a user logs onto a public WiFi network, tunneling 100% of their traffic through the app.

We see ourselves as the easiest-to-use privacy and security application available, Sapci said. He added that there are currently 20 million active monthly app users, with another 6 million more joining every month.

That would be fantastic for most businesses, but the growing demand for an encryption service reflects an increased international effort to limit access to information. Turkey is just one example. We were ready for it and were still ready to welcome those users to our service, Sapci said, adding that, when it comes to censorship, business is growing for the worse.

Here is the original post:
Encryption Made Easy: Hotspot Shield App Update Offers A VPN For Everyone

Internet companies could be forced to ‘share encryption keys’ to enable EU surveillance

A leaked Council of Ministers discussion paper, published on the Statewatch website (14-page / 57KB PDF) and authored by the EU's counter-terrorism coordinator Gilles de Kerchove, said new EU rules could help with the "lawful interception" of communications.

"Since the Snowden revelations, internet and telecommunications companies have started to use often de-centralised encryption which increasingly makes lawful interception by the relevant national authorities technically difficult or even impossible," de Kerchove said, according to the leaked paper.

"The [European] Commission should be invited to explore rules obliging internet and telecommunications companies operating in the EU to provide under certain conditions as set out in the relevant national laws and in full compliance with fundamental rights access of the relevant national authorities to communications (i.e. share encryption keys)," he said.

The plans were scheduled to be considered by a Council committee that looks into improving operational cooperation on internal security last week and could be considered at a meeting of justice and home affairs ministers from across the EU at a two day meeting in Riga, Latvia, on Thursday and Friday this week.

Earlier this month UK prime minister David Cameron outlined his intention to legislate to ensure law enforcement agencies could obtain lawful access to encrypted communications.

In his paper, de Kerchove also called for the European Commission to "deepen the engagement with the internet companies". He said there needs to be "a stronger joint response" from technology companies, the EU and individual EU countries to better restrict "the circulation of terrorist material online".

De Kerchove said EU countries should set up an equivalent body to the UK's Counter-Terrorism Internet Referral Unit (CTIRU). CTIRU identifies terrorist and extremist content on social media platforms and flags them to operators of those platforms. Since February 2010, internet companies, including social media sites, have "removed 72,000 pieces of terrorist content following referrals from CTIRU because they have agreed that the content represents a breach of their rules", de Kerchove's paper said.

The counter-terrorism coordinator said EU policy makers should also consider whether Europol could play a similar role in "either flagging or facilitating the flagging of content which breaches the platforms own terms and conditions".

There is also a "crucial and urgent need" to establish a new 'passenger name record' legal framework, which would require airlines to share data about passengers who board their flights to and from the EU with law enforcement bodies, de Kerchove said. He added that new EU data retention laws could be drafted by the European Commission soon. In April last year, the Court of Justice of the EU ruled that the now-invalid Data Retention Directive disproportionately infringed on privacy rights.

Read the original here:
Internet companies could be forced to 'share encryption keys' to enable EU surveillance