Squeezed quantum communication: Flashes of light in quantum states transmitted through atmosphere

It could be difficult for the NSA to hack encrypted messages in the future -- at least if a technology being investigated by scientists at the Max Planck Institute for the Science of Light in Erlangen and the University Erlangen-Nrnberg is successful: quantum cryptography. The physicists are now laying the foundation to make this technique, which can already be used for the generation of secret keys, available for a wider range of applications. They are the first scientists to send a pulse of bright light in a particularly sensitive quantum state through 1.6 kilometres of air from the Max Planck Institute to a University building. This quantum state, which they call squeezed, was maintained, which is something many physicists thought to be impossible.

Using flashes of bright light for quantum communication through the atmosphere would have several advantages compared to the technique usually used today: it allows the photon packets to be transmitted in sunlight, something that is challenging with individual photons. Moreover, the receivers required for this are already presently in use for optical telecommunication via fibre optics and also via satellite.

Eavesdropping on a message protected by quantum cryptography cannot be done without being noticed. This is because quantum physics prevents a spy from reading a key which is encoded by specific quantum states without influencing these states. This can be exploited in a clever procedure for exchanging the key with which the data is encrypted, so that an unwelcome listener is not only detected, but is also prevented from accessing the information.

The quantum-protected communication is a fragile thing, however, and easily disturbed. All the more remarkable is the work of the Erlangen-based scientists working with Gerd Leuchs, Director at the Max Planck Institute for the Science of Light and professor at the University Erlangen-Nrnberg: "We have now succeeded in transmitting a flash of light, namely a pulse which contains many photons, through the atmosphere in a particularly sensitive quantum state," says Christian Peuntinger, who played an important role in the project. He and his colleagues sent a photon packet in a straight line from the roof of the Max Planck Institute in Nuremberg to the building of the University Erlangen-Nrnberg some 1.6 kilometres away. "This even works in broad daylight," says Christian Peuntinger.

The Sun disturbs quantum communication with individual photons

Quantum communication and quantum cryptography have hitherto relied mainly on individual photons being the information carriers. Physicists have already carried out many experiments in which they have sent them through the air as well. The individual photons are only easy to detect in the dark, however, because they are masked by stray light, which abounds on a sunny day -- just as an individual voice can hardly be heard in a noisy pub, especially if the conversation is to take place from one end of the room to the other. But just how useful is data traffic which has to stop when the Sun is shining?

If intense flashes of light transport the information, on the other hand, the communication is also possible in bright sunlight, as the special receivers used for this are not sensitive to stray light, unlike detectors for individual photons. This is not the only advantage that the receivers for the bright pulses offer, however. They are also much faster than the detectors for individual photons and thus allow higher transmission rates. And what makes them very attractive for the researchers in Erlangen: the devices needed are already widespread in optical communication via fibre-optic cable and even orbit Earth on board telecommunication satellites.

Until now, individual photons did seem to have one advantage over flashes of bright light, however. Individual photons can also be lost as they travel through the atmosphere; but if they reach their destination, they arrive in one piece and are unchanged. The attenuation in the atmosphere reduces only the data rate.

Communication with particularly sensitive, squeezed states

Quantum communication which uses flashes of many photons is thus not without its own difficulties: the flashes are suitable for quantum communication only if they exist in sensitive states. These are easily destroyed if a flash of light passes air turbulence and is deformed or weakened. "This is the reason why quantum physicists have not yet even tried to send such signals through the atmosphere," says Christoph Marquardt, Leader of the Quantum Information Processing Group at the Erlangen-based Max Planck Institute. His team has now proved that these pulses are indeed ideal for quantum communication through the air: "We have even used pulses in squeezed quantum states which are particularly sensitive."

View post:
Squeezed quantum communication: Flashes of light in quantum states transmitted through atmosphere

Cryptocurrency Round-Up: Apple Pay Boosts Bitcoin, Nakamoto Negotiates With Hacker

Cryptocurrency markets have been boosted by news that Apple is introducing its own mobile payments system.IBTimes UK

Bitcoin and other major cryptocurrencies have seen an upturn in their fortunes over the last 24 hours, with the top-ten mineable coins all seeing positive movement in the markets.

Of the big players, bitcoin, litecoin, dogecoin, peercoin, and darkcoin all increased in price by between 2% and 9%.

This could be, at least in part, down to Apple's announcement yesterday that it is introducing a new mobile payments toolthat could greater facilitate digital currency transactions in the future.

Bitcoin boosted by Apple Pay

Alongside new phonesand a smartwatch, Apple also announced yesterday that it was moving into the mobile-payments market with the launch of Apple Pay.

"One-touch checkout, no card number entry, no need to type addresses, no card information shared with merchant," Tim Cook announced at the Cupertino event.

Apple Pay will be used on the iPhone 6 and 6 PlusApple

Apple Pay uses near-field communication (NFC) technology to enable smooth financial transactions. Although bitcoin and other cryptocurrencies were not explicitly mentioned, Apple did recently lift its ban on bitcoin apps.

Prominent members of the bitcoin community have speculated that despite Apple Pay's reliance on traditional financial infrastructure, bitcoin payments could well be integrated in the future.

Continued here:
Cryptocurrency Round-Up: Apple Pay Boosts Bitcoin, Nakamoto Negotiates With Hacker

Naked Celebrities, Edward Snowden, Comcast/Warner Merger, Natural Gas Fracking [Scrapple TV News] – Video


Naked Celebrities, Edward Snowden, Comcast/Warner Merger, Natural Gas Fracking [Scrapple TV News]
From high atop the Scrapple News tower in Downtown Philadelphia, I #39;m AP Ticker and this is is a term paper I wrote last minute two inch margins and size sixteen font. We begin with the...

By: Scrapple TV

Read more:
Naked Celebrities, Edward Snowden, Comcast/Warner Merger, Natural Gas Fracking [Scrapple TV News] - Video

Feds fire firm that checked backgrounds of Snowden, Alexis

The federal governments largest background check company was fired by the Office of Personnel Management on Tuesday after a spate of bad news, including a Justice Department lawsuit, a cyberattack and congressional scrutiny over its vetting of Edward Snowden.

The Virginia-based USIS said OPM notified the company that the agency was declining to exercise its remaining options on a contract for background investigations fieldwork and support services.

We are deeply disappointed with OPMs decision, particularly given the excellent work our 3,000 employees have delivered on these contracts, the company said in a statement late Tuesday.

While we disagree with the decision and are reviewing it, we intend to fulfill our obligations to ensure an orderly transition.

The company also said it continued to provide high quality service to other government agencies.

OPM announced its decision a day after USIS issued a lengthy and detailed public defense in the face of increasing calls for the government to cut ties with the company.

Lawmakers from both parties have raised questions about the timing of a border security contract this year worth up to $190 million awarded to USIS professional services division, which the company says is separate from its background investigations arm.

The contract was awarded months after the Justice Department filed a civil lawsuit accusing USIS of collecting millions of dollars in bonuses while falsely certifying that hundreds of thousands of unfinished background investigations had been completed.

The company has sought to distance itself from those accusations, saying nobody currently with the company has ties to any of the accusations outlined in the governments lawsuit.

Under federal contracting law, past scandals dont necessarily mean future contracts are in jeopardy. Contractors need to show only that they are presently responsible.

See more here:
Feds fire firm that checked backgrounds of Snowden, Alexis

US Says Now Less Interested in Deal with Snowden – Reports

MOSCOW, July 28 (RIA Novosti) One year after disclosures on the global surveillance, Washington is less interested in reaching a deal with former National Security Agency contractor Edward Snowden, political journalism organization Politico reported Monday.

"As time goes on, the utility for us of having that conversation becomes less It's been over a year since he had access to our networks and our information so the need for us to understand that greater level of detail is lesser and lesser," Politico cited NSA Deputy Director Rick Ledgett as saying.

Ledgett was one of the first US officials to publically discuss the possibility of amnesty or leniency for Snowden if he did not publish the remaining secret documents that he possessed. According to the NSA, a year ago Snowden had about 1.5 million unpublished documents.

Ledgett, who was recently promoted after handling the NSA's response to the Snowden revelations, thinks that over time Snowdens lawyers might have a weaker bargaining position.

"So, as time goes on, his information becomes less useful," Ledgett said.

Nevertheless, Ledgett acknowledged that the impact of Snowden's leaks on the spy agency's ability to gather information was serious.

In June 2013, Snowden leaked information about the extensive electronic surveillance programs conducted by the US government around the globe, including eavesdropping on US citizens and foreign leaders. The revelations strained relationships between Washington and their European partners.

The United States charged Snowden with espionage and revoked his passport. Snowden is now settled in Russia, which granted him asylum status for a year. As the term ended in July 2014, Snowden applied for an extension of his stay.

Back at home, Snowden is accused of theft, unauthorized communication of national defense information and willful communication of classified documents to an unauthorized person. Each of the three charges carries a maximum possible prison term of 10 years.

Read this article:
US Says Now Less Interested in Deal with Snowden – Reports

Encryption failures fixed in popular PGP email security tool Enigmail

Developers of the popular Enigmail email security extension for Thunderbird have fixed several issues that could have exposed messages users believed to be encrypted.

Enigmail provides a graphical user interface in the Mozilla Thunderbird and SeaMonkey programs that allows users to digitally sign and encrypt email messages using the OpenPGP standard.

The Enigmail Project released version 1.7.2 of the extension on Aug. 29 and briefly noted that the release fixes several important bugs. The changelog did not contain additional details about the impact of the fixed issues, but included a link to the projects external bug tracker.

In addition to several non-security issues, the bug tracker lists a number of addressed bugs that could have serious security implications for users of the older Enigmail 1.7 version. One of them causes emails to be sent in unencrypted form when only BCC (blind carbon copy) recipients are specified.

Another issue causes drafts to be saved in plain text when writing a new email even when the email is marked for encryption automatically. If the IMAP protocol is used, the unencrypted drafts can be synchronized with the email server, exposing potentially sensitive information.

This behavior only happens when the system selects an email for encryption automatically based on an existing per-recipient rule or when the recipients public key exists in the local key store. If the email is manually marked to be encrypted (e.g. by clicking the yellow key symbol on the bottom-right) the drafts are correctly encrypted before being sent to the IMAP server, the bug entry notes.

Another bug can cause an incorrect encryption or signing status message to be displayed when composing a reply. This especially happens if the compose window is not opened for the first time, another entry on the bug tracker notes.

A fourth issue that has been addressed can cause an upgrade from Enigmail 1.6 to 1.7 to break encryption. Email messages wont be encrypted if the per recipient setting is disabled under Key Selection, despite other key selection mechanisms like by email and manual if missing being enabled.

When confirmation dialog is enabled you can even see that Enigmail wants to send an email unsigned/unencrypted despite having selected forced encryption, the corresponding bug entry says. Otherwise it is silently sent unencrypted.

An Enigmail user who reported one of the encryption failures in version 1.7 on the projects support forum described the situation as the biggest imaginable catastrophe.

See original here:
Encryption failures fixed in popular PGP email security tool Enigmail

Out in the Open: A Free Platform for Building Gear on the Internet of Things

The trouble with the Internet of Things is that the things dont really talk to each other.

New devices like the Nest thermostat, the Dropcam camera, and various wearables do a pretty good job of talking to the internet, letting you easily monitor and use them through online dashboards. But such tools would be so much more useful if they also traded information on their own. Its nice if you car tires let you know when theyre low via a web dashboard. But its even nicer if they can tell an air compressor exactly how much air they need and whose bank account to bill for it.

Thats the kind of digital utopia sought by the creators of Zetta, a new open source project that provides common tools for building internet-connected devices that can talk to each other, including everything from home automation contraptions to flying drones. Driven by a company called Apigee, the project made its official debut this morning.

Other projects and services seek much the same utopia. The average consumer can use a service called IFTTT to link devices like the Nest thermostat and the Philips Hue lighting system. More accomplished techies setup more complex interactions through Octoblu, formerly known as SkyNet, an open source system for controlling hardware over the internet. And behind the scenes, companies like Nest, now owned by Google, are now offering APIs, or application programming interfaces, for their devices that let the worlds developers create new ways of interacting with them. With Zetta, Apigee wants to help bring these kinds of APIs to far more devices.

Apigee has long been in the business of web APIs, which are basically ways for software developers to make one application talk with another. APIs are how companies plug their apps into services like Twitter, and increasingly, theyre how data scientists pull information from government websites for analysis. Apigee helps companies create and maintain APIs, and though it typically does this for more traditional online services, and it now wants to expand into the Internet of Things.

Basically, with Zetta, its offering tools that lets anyone build devices that can interact with the larger Internet of Things through APIs. This includes a set of specifications for creating APIsspecifications it is committing to the API Commons, a collection of designs that can be freely reused without license fees. But the company is also offering open source software that can run on devices, helping to handle much of the work that goes into an API.

According Apigee vice president Brian Mulloy, the strength of the platform is that its well suited juggle many different types of communicationsomething that can help link disparate devices. What our platform is really smart about is cross-mediating between different protocols, he says.

The Zetta software will run on cheap, low-end hardware such as the Raspberry Pi and the Beaglebone, passing messages from the hardware either directly to other devices or with servers hosted in the cloud or even your living room. Apigee will try to make money from the project by offering to host online services that plug into this software, but the software and its source code will be available for anyone to use for free.

The project is still in the early stages, but Tim Ryan, one of the creators of Internet of Things hardware platform called Tessel believes it can push this market forward. Building your own devices and APIs can be tricky, and theres no standard way of doing it, he says. Zetta could make that easier.

Follow this link:
Out in the Open: A Free Platform for Building Gear on the Internet of Things

A Lossless Tagged Visual Cryptography Scheme | IEEE | IEEE projects 2014 – Video


A Lossless Tagged Visual Cryptography Scheme | IEEE | IEEE projects 2014
As one of the most efficient multi-secret visual cryptography (MVC) schemes, the tagged visual cryptography (TVC) is capable of hiding tag images into random...

By: Renown Technologies

Read the rest here:
A Lossless Tagged Visual Cryptography Scheme | IEEE | IEEE projects 2014 - Video

Property Analysis of XOR-Based Visual Cryptography | IEEE | IEEE projects 2014 – Video


Property Analysis of XOR-Based Visual Cryptography | IEEE | IEEE projects 2014
A (k,n) visual cryptographic scheme (VCS) encodes a secret image into n shadow images (printed on transparencies) distributed among n participants. When any ...

By: Renown Technologies

Visit link:
Property Analysis of XOR-Based Visual Cryptography | IEEE | IEEE projects 2014 - Video