. Military Space News .
CYBER WARS
WSU mathematician breaks down how to defend against quantum computing attacks
by Staff Writers
Pullman WA (SPX) Mar 01, 2017


In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

The encryption codes that safeguard internet data today won't be secure forever. Future quantum computers may have the processing power and algorithms to crack them. Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality. He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers.

The paper clarifies misunderstandings about the complex field of public key cryptography and provides a common basis of understanding for the technical experts who will eventually be tasked with designing new internet security systems for the quantum computing age.

"Designing security systems to protect data involves experts from many different fields who all work with numbers differently," Hamlin said. "You are going to have pure and applied mathematicians, computer programmers and engineers all involved in the process at some point. For it to work in real life, all of these people need to have a common language to communicate so that they can make important decisions about how to safeguard online transactions and personal communications in the future."

Preparing for the future
Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of time faster than silicon-based computers. A hacker armed with a next generation quantum computer could in theory decrypt any internet communication that was sent today, Hamlin said.

In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

In his paper, Hamlin breaks down how the generalized knapsack code works in terms that computer scientists, engineers and other experts outside the field of pure mathematics can understand. He explains that by disguising data with number strings more complex than the 0s and 1s conventional computers use to operate, the generalized knapsack offers a viable security method for defending against quantum computing hacks.

"The Generalized Knapsack Code expands upon the binary representations today's computers use to operate by using a variety of representations other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including those using basis reduction, one of the decoding methods used to break the original knapsack code."

Hamlin said his hope is that his paper, Number in Mathematical Cryptography, clears up misunderstandings he has run into professionally so that the generalized knapsack code can be developed for future use.

"Quantum computing will change how we handle data and we, as a society, are going to have to make some important decisions about how to prepare for it," Hamlin said. "A code like this can be implemented on conventional hardware and yet it would also be secure from a hacker with a quantum computer. I think it is time for us to consider this code very seriously for adapting commerce and perhaps communication in light of the possibility of quantum computing."

Research paper

CYBER WARS
A computer's LED light can smuggle out data from the hard drive
Beersheba, Israel (UPI) Feb 22, 2017
As experiments showed, a computer's LED light could be used to smuggle out data from the hard drive to a remote receiver with cameras or light sensors, like a drone. Just because a computer isn't connected to a wireless network, doesn't mean it's immune to invasion. As researchers at the Ben-Gurion University of the Negev proved, if a computer can be directly infected with malware via U ... read more

Related Links
Washington State University
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment on this article using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Jenoptik contracted for Patriot missile components

Protesters sue to stop US missile system in S. Korea

Raytheon developing new tool for war game assessment

U.S. Army awards $3 billion in missile defense contracts

CYBER WARS
Iran tests missiles in naval exercises

Russia's Next Gen S-500 Prototype Launch Date Announced

U.K., France to upgrade long-range Storm Shadow missiles

Turkey finalizing S-400 missile deal with Russia

CYBER WARS
Leonardo rotary drone demonstrator program enters phase 2

Chinese drone Wing-Loong II conducts maiden flight

GA-ASI forms team to supply Reaper drones to Australia

U.S. Air Force to retire MQ-1 Predator drone in 2018

CYBER WARS
General Dynamics gets enterprise communications contract

Space aggressors jam AF, allies' systems

Harris intros new wideband manpack radio system

Russia showcases jam-proof communications system

CYBER WARS
Russia to start testing TIGR unmanned armored car in 2017

Atlas Elektronik contracted for ARCIMS vehicles

U.S. Marines place $150M order for Target Sight Systems

Orbital ATK reports new orders for Bushmaster guns

CYBER WARS
BAE Systems eyes defence spending by Trump

UAE signs over $5 bln in deals at arms fair

Pentagon chief says military running smoothly amid turbulent transition

SIPRI: Arms imports rise in Asia, Middle East

CYBER WARS
Wary US and China pledge respect at first Trump-era meet

Erdogan says paper to pay 'price' over controversial report

Russia and UK hold high-level military talks in Moscow

Russia wants to form new Collective Security Bloc that replaces NATO

CYBER WARS
Scientists create a nano-trampoline to probe quantum behavior

Scientists decipher the nanoscale architecture of a beetle's shell

Switched-on DNA spark nano-electronic applications

Liquid metal nano printing set to revolutionize electronics









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.