. 24/7 Space News .
CYBER WARS
WSU mathematician breaks down how to defend against quantum computing attacks
by Staff Writers
Pullman WA (SPX) Mar 01, 2017


In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

The encryption codes that safeguard internet data today won't be secure forever. Future quantum computers may have the processing power and algorithms to crack them. Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality. He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers.

The paper clarifies misunderstandings about the complex field of public key cryptography and provides a common basis of understanding for the technical experts who will eventually be tasked with designing new internet security systems for the quantum computing age.

"Designing security systems to protect data involves experts from many different fields who all work with numbers differently," Hamlin said. "You are going to have pure and applied mathematicians, computer programmers and engineers all involved in the process at some point. For it to work in real life, all of these people need to have a common language to communicate so that they can make important decisions about how to safeguard online transactions and personal communications in the future."

Preparing for the future
Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of time faster than silicon-based computers. A hacker armed with a next generation quantum computer could in theory decrypt any internet communication that was sent today, Hamlin said.

In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

In his paper, Hamlin breaks down how the generalized knapsack code works in terms that computer scientists, engineers and other experts outside the field of pure mathematics can understand. He explains that by disguising data with number strings more complex than the 0s and 1s conventional computers use to operate, the generalized knapsack offers a viable security method for defending against quantum computing hacks.

"The Generalized Knapsack Code expands upon the binary representations today's computers use to operate by using a variety of representations other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including those using basis reduction, one of the decoding methods used to break the original knapsack code."

Hamlin said his hope is that his paper, Number in Mathematical Cryptography, clears up misunderstandings he has run into professionally so that the generalized knapsack code can be developed for future use.

"Quantum computing will change how we handle data and we, as a society, are going to have to make some important decisions about how to prepare for it," Hamlin said. "A code like this can be implemented on conventional hardware and yet it would also be secure from a hacker with a quantum computer. I think it is time for us to consider this code very seriously for adapting commerce and perhaps communication in light of the possibility of quantum computing."

Research paper

CYBER WARS
A computer's LED light can smuggle out data from the hard drive
Beersheba, Israel (UPI) Feb 22, 2017
As experiments showed, a computer's LED light could be used to smuggle out data from the hard drive to a remote receiver with cameras or light sensors, like a drone. Just because a computer isn't connected to a wireless network, doesn't mean it's immune to invasion. As researchers at the Ben-Gurion University of the Negev proved, if a computer can be directly infected with malware via U ... read more

Related Links
Washington State University
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment on this article using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Russian cargo ship docks with space station

Russia to carry out tourist flights around Moon by 2022

NASA selects proposals for first-ever Space Technology Research Institutes

NASA saves energy and water with new modular supercomputing facility

CYBER WARS
Spacex To Send Privately Crewed Dragon Spacecraft Beyond The Moon Next Year

Sounding Rocket Flies in Alaska to Study Auroras

SpaceX cargo ship arrives at space station

SpaceX cargo ship aborts rendezvous with space station

CYBER WARS
NASA mulls putting astronauts on deep space test flight

Opportunity leaving crater rim for the Plains of Meridiani

Scientists say Mars valley was flooded with water not long ago

Researchers pinpoint watery past on Mars

CYBER WARS
China to launch first high-throughput communications satellite in April

Chinese cargo spacecraft set for liftoff in April

China looks to Mars, Jupiter exploration

China's first cargo spacecraft to leave factory

CYBER WARS
Kacific places order with Boeing for a high throughput satellite

ESA affirms Open Access policy for images, videos and data

Iridium Announces Target Date for Second Launch of Iridium NEXT

Italy, Russia working closely on Mars exploration, Earth monitoring satellites

CYBER WARS
Raytheon gets contract for Silent Knight radar systems

Kelvin Hughes to provide SharpEye radars for U.K. OPVs

Terma partner wins Indian radar contract

Two radar eyes are better than one

CYBER WARS
Does Pluto Have The Ingredients For Life?

Ancient microbes push limits of what life can survive on Earth, and off

Prediction: More gas-giants will be found orbiting Sun-like stars

From Rocks, Evidence of a 'Chaotic Solar System'

CYBER WARS
Juno to remain in current orbit at Jupiter

Europa Flyby Mission Moves into Design Phase

NASA receives science report on Europa lander concept

New Horizons Refines Course for Next Flyby









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.