Intensive course: Quantum computing, logic and cognition

I have just submitted application for registration for Sixth International Summer School in Cognitive Sciences and Semantics. To be more specific, for the intensive course: Quantum computing, logic and cognition.

This school takes place at University of Latvia in Riga from 27 July to 29 July. And tuition fee is 100 Euro which will cover meals and coffee breaks.

For more information: http://www.lu.lv/isscss/

Removing RSA keys by acoustic cryptanalysis

i_know_youre_listening

 

Image from: xkcd

The famous cryptographer Adi Shamir and his colleagues published a scientific paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Many computers emit high frequency sound during operation, because of the vibrations in some electronic components (capacitors) caused due to microscopic variations in the voltage of the CPU during different workload on it. In theory, these sound vibrations can be analyzed in order to obtain information about the running application software, including cryptographic calculations. In 2004 year, Shamir and his colleagues have shown that different RSA keys cause different sound patterns, but back then it could not be understood how to extract individual bits keys. The main problem was that the sound equipment was unable to record sound with a high sampling frequency: 20 Khz only for conventional microphones and a few hundred kilohertz for ultrasonic microphones. This is many orders of magnitude low than several GHz, which is operated in modern computers.

Now they have demonstrated it with a software that extracts the full 4096-bit keys with GnuPG computers of various models after an hour of listening, if the computer all the time performs decryption. Conducted successful demonstration of such an attack using a smartphone, which lay 30 cm from the computer.

audio2

When using the directional microphone can attack from a distance of up to 4 metres.

Img3

If miniature hidden microphones are used, the maximum distance is about 1 meter. All equipment on the photos, in addition to microphones, can be hidden under a desk or in another discrete location.

At large scale, it seriously pose a threat and perhaps having organizational severs in fully shielded rooms would prevent it.

Photos from the paper.

The TrueCrypt Audit

Given the recent news about NSA’s ability to foil encryption soft wares, cryptographer Matthew Green and Kenneth White has started an initiative to examine the Truecrypt disk encryption tool.

Why does it matter?

Since NSA has been snooping in our data without us knowing, decryption of SSL connections and tampering with established standards to make them vulnerable, there needs to be an audit to verify that encryption softwares are truly as secure as they should be. For this very purpose there needs to be an extensive audit of softwares like Truecrypt which is used by many people, including me to a certain extent, for storing sensitive information.

How would the ‘audit’ work?

  • First step would be to resolve license status on the current (v. 7.1a) TrueCrypt source code (license v. 3.0 ) copyright & distribution, in order to create a verified, independent version control history repository (signed source and binary)
  • Perform and document repeatable, deterministic builds of TC 7.1a from source code for current major operating systems: Windows 7, Mac Mac OS X (Lion 10.7 and Mountain Lion 10.8), Ubuntu 12.04 LTS and 13.04, RedHat 6.4, CentOS 6.4, Debian 7.1, Fedora 19
  • Conduct a public cryptanalysis and security audit of version 7.1a

I wholly support this cause and hope everyone would help ensure we have trustworthy encryption available.

Contribute

To contribute you can check the FundFill site, or IndieGoGo site. [Note: Both sites accept Credit cards; Fundfill accepts Bitcoins and IndieGoGo accepts Paypal and eChecks]

Contributions are not limited to monetary only but if you’re an information security professional/expert/hobbyist then you can help identify bugs in the software.

Official Site

Support the effort to audit TrueCrypt

Exact quantum query algorithms

For the paper “Exact quantum query complexity of EXACT and THRESHOLD” by Andris Ambainis, Jānis Iraids & Juris Smotrovs; Maris Ozols, on his blog has posted an excellent analysis of this paper.

Mamuta memuāri

Andris Ambainis, Jānis Iraids, and Juris Smotrovs recently have obtained some interesting quantum query algorithms [AIS13]. In this blog post I will explain my understanding of their result.

Throughout the post I will consider a specific type of quantum query algorithms which I will refer to as MCQ algorithms (the origin of this name will become clear shortly). They have the following two defining features:

  • they are exact (i.e., find answer with certainty)
  • they measure after each query

Quantum effects in an MCQ algorithm can take place only for a very short time — during the query. After the query the state is measured and becomes classical. Thus, answers obtained from two different queries do not interfere quantumly. This is very similar to deterministic classical algorithms that also find answer with certainty and whose state is deterministic after each query.

Basics of quantum query complexity

Our goal is…

View original post 1,265 more words

meQuanics – The Quantum Computing Game

Researchers from National Institute of Informatics(NII) have published a Web applications to advance the study of the quantum computer in the form of a game ‘meQuanics‘; previously called as “Qubit – the game“. It is basically a puzzle game where the puzzles are represented as circuit of the quantum computer. Each puzzle in meQuanics represents a real quantum algorithm. Even users who do not possess any knowledge of quantum mechanics can contribute to optimizing quantum circuits by solving the puzzles in the game. The stages/levels are divided into different circuits including : Shor, Josza, Bell, Muller and more.

The goal in the game is operating a ship that is loaded with quantum computer. If user can reduce the size of the puzzle that shows a quantum circuit, the speed of the ship is improved.

meQuanics is a project initiated in the Quantum Information Science Theory group (QIST) led by Prof. Kae Nemoto at the National Institute of Informatics (NII) in Tokyo, Japan. Dr. Simon Devitt and Prof. Nemoto conceived the idea during their ongoing research into large-scale quantum architecture design.

Currently meQuanics is provided as a Web application called trial version for now, but will be further developed as a fully integrated crowd sourced game for iOS, Android, Windows, MacOS and Linux platforms.

Here are some screenshots :

EDIT: For those who are curious in Quantum Algorithms visit : The quantum zoo

DeepEnd Research – Library of Malware Traffic Patterns + Blog lists

Quoted from here

Traffic analysis has been the primary method of malware identification and thousands of IDS signatures developed are the daily proof. Signatures definitely help but ability to visually recognize malware traffic patterns and see the trends when they change has been always an important skill for anyone tasked with network defense. The number of malware analysis blogs and papers is overwhelming and it is difficult to keep track of malware features if you don’t have access to a well designed and constantly updated malware database. This started as “personal notes” spreadsheet with GET and POST requests for different malware families with information from open sources. We decided others might find it useful too.

VIEW OR DOWNLOAD “MALWARE TRAFFIC PATTERNS” SPREADSHEET

This is truly an exceptional and valuable community tool for researchers. On the same for those interested in these stuffs i.e. for whitehat researchers, here are some useful sites :

malware.lu

DeepEndResearch

Contagiodump

Operational cryptology and virology lab

Modern malware investigations and reviews

XyliBox

Tracking Cybercrime

Malware don’t need Coffee

ARF Project

Malware Reconstructor

All the bloggers take the researching quite seriously, are frequently updated and provide and in-dept analysis. More blogs are listed in above blog.

Dirac’s Lectures

Steve Flammia, on the blog Quantum Pontiff, posted this remarkable and rare 1-hour talks by Paul Dirac in New Zealand :

There are four of his talks currently uploaded online. The first one (the above) is on quantum mechanics; the second one is on quantum electrodynamics; the third is on the Magnetic monopoles; and the fourth one is on large number hypothesis.

Surprisingly or perhaps not, there still is lots of interesting stuff in them especially to hear the finer points from the person who himself was part of the historical events of Physics.

Credits to Richard Smythe for digitizing them.

Fusion of Quantum Mechanics and Shakespeare

What would have happened if Shakespeare had known Quantum Mechanics and the Schrödinger’s cat? Apparently the following :

“To be, or not to be, or maybe both

–that is the question:
Whether ’tis nobler in the mind to calculate
The slings and arrows of outrageous quanta
Or to take arms against a sea of interpretations
And by opposing end them.
To sleep, to wake —
No more, but both –and by a sleep to say we end
The headache, and the thousand natural shocks
That Bohr bequeathed. ‘Tis a consummation
Devoutly to be wished. To wake, to sleep–
To sleep–perchance to dream: ay, there’s the rub,
For in that sleep of Copenhagen what dreams may come
When we have shuffled all our mortal calculations,
Must give us pause. There’s the Aspect
That makes calamity of so entangled a life.
For who would bear the Bells and Wittens of time,
Th’ position’s wrong, the proud momentum’s contumely
The pangs of despised theory, the quantal law’s decay,
The insolence of academic office, and the spurns
That patient merit of th’ unworthy unlearned takes,
When he himself might his quietus make
With a bare bra-ket? Who would fardels bear,
To grunt and sweat under a weary state vector,
But that the dread of something not quite real,
The undiscovered counterfactual, from whose bourn
No traveller returns, puzzles the will,
And makes us rather bear those classical ills we have
Than fly to others that we know not of?
Thus common sense does make cowards of us all,
And thus the native hue of resolution
Is sicklied o’er with the pale cast of Heisenberg,
And enterprise of great position and momentum
With this regard their currents turn awry
And lose the name of action. — Soft you now,
The fair Dirac — noble and precise, in thy orisons
Be all my spins remembered.”

via Wavewatching