We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ...We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.展开更多
We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The...We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.展开更多
There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduce...There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduced hacking as the transmission phenomenon. In this article, an SPP-based reduced hacking scheme is presented at interface between atomic medium and metallic conductor. The SPP propagation is manipulated with conductivity of the metal. The delay or advance of the SPP is found to create nanosecond time gap which can be used for storing and sending the information safely. The reduced hacking is further modified with conductivity of the metal and the control parameters of the atomic medium.展开更多
For decades,lignin-the rigid polymer that gives plants their structure-has been the“problem child”of green chemistry.When processed,its molecules tangle like stubborn knots,forming useless clumps.Then came 2024’s t...For decades,lignin-the rigid polymer that gives plants their structure-has been the“problem child”of green chemistry.When processed,its molecules tangle like stubborn knots,forming useless clumps.Then came 2024’s transformative solution-breaking lignin’s tangles at the molecular level.In that May,a team led by scientists from the Chinese Academy of Sciences(CAS)came up with an approach to make this“knotty problem”profitable by hacking lignin’s chemistry to spin it into bio-bisphenols.展开更多
To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast cryp...To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast crypto-aggregation scheme called RandomCrypt was proposed.RandomCrypt performed clipping and quantization to fix the range of gradient values and then added two types of noise on the gradient for encryption and differential privacy(DP) protection.It conducted HE on noise keys to revise the precision loss caused by DP protection.RandomCrypt was implemented based on a FATE framework,and a hacking simulation experiment was conducted.The results show that the proposed scheme can effectively hinder inference attacks while ensuring training accuracy.It only requires 45%~51% communication cost and 5%~23% computation cost compared with traditional schemes.展开更多
This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonom...This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonomous vessels.Autonomous ships can provide significant financial and logistical benefits for shipping companies and their stakeholders.However,these vessels suffer from shortcomings concerning cybersecurity.Previous cyberattacks are investigated to understand how the command system of an autonomous ship is infiltrated,the consequences of an attack,and the shortfalls of the security of the vessel.This aim is achieved via a literature review concerning cyberattacks on autonomous vessels with a focus on sources indicating how the security systems of previous vessels were breached,the consequence of said cyberattacks,and their capability for recovery.Sources used include Web of Science,Scopus,Google Scholar,Mendeley,Zotero,SciFinder,broadsheet,and newspaper articles.The results of the literature review showed that autonomous vessels are significantly vulnerable to cyberattacks.Autonomous vessels were determined to have relatively easy-to-breach security systems.In most cases,the consequences of a cyberattack had a negative financial impact,a loss of cargo,and a potential breach of oceanic airspace,resulting in military action.The vessels analyzed were left“dead in the water”until they were recovered,and after a severe attack,the affected shipping company servers suffered potential weeklong incapacitation.This study also aims to fill the gaps in the transport industry and maritime market concerning the security of autonomous vessels and viable recovery procedures.展开更多
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.展开更多
基金supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
文摘We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
文摘We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.
文摘There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduced hacking as the transmission phenomenon. In this article, an SPP-based reduced hacking scheme is presented at interface between atomic medium and metallic conductor. The SPP propagation is manipulated with conductivity of the metal. The delay or advance of the SPP is found to create nanosecond time gap which can be used for storing and sending the information safely. The reduced hacking is further modified with conductivity of the metal and the control parameters of the atomic medium.
文摘For decades,lignin-the rigid polymer that gives plants their structure-has been the“problem child”of green chemistry.When processed,its molecules tangle like stubborn knots,forming useless clumps.Then came 2024’s transformative solution-breaking lignin’s tangles at the molecular level.In that May,a team led by scientists from the Chinese Academy of Sciences(CAS)came up with an approach to make this“knotty problem”profitable by hacking lignin’s chemistry to spin it into bio-bisphenols.
基金Beijing Natural Science Foundation (L233005)National Key Research and Development Program of China (2023YFB3308200)。
文摘To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast crypto-aggregation scheme called RandomCrypt was proposed.RandomCrypt performed clipping and quantization to fix the range of gradient values and then added two types of noise on the gradient for encryption and differential privacy(DP) protection.It conducted HE on noise keys to revise the precision loss caused by DP protection.RandomCrypt was implemented based on a FATE framework,and a hacking simulation experiment was conducted.The results show that the proposed scheme can effectively hinder inference attacks while ensuring training accuracy.It only requires 45%~51% communication cost and 5%~23% computation cost compared with traditional schemes.
文摘This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonomous vessels.Autonomous ships can provide significant financial and logistical benefits for shipping companies and their stakeholders.However,these vessels suffer from shortcomings concerning cybersecurity.Previous cyberattacks are investigated to understand how the command system of an autonomous ship is infiltrated,the consequences of an attack,and the shortfalls of the security of the vessel.This aim is achieved via a literature review concerning cyberattacks on autonomous vessels with a focus on sources indicating how the security systems of previous vessels were breached,the consequence of said cyberattacks,and their capability for recovery.Sources used include Web of Science,Scopus,Google Scholar,Mendeley,Zotero,SciFinder,broadsheet,and newspaper articles.The results of the literature review showed that autonomous vessels are significantly vulnerable to cyberattacks.Autonomous vessels were determined to have relatively easy-to-breach security systems.In most cases,the consequences of a cyberattack had a negative financial impact,a loss of cargo,and a potential breach of oceanic airspace,resulting in military action.The vessels analyzed were left“dead in the water”until they were recovered,and after a severe attack,the affected shipping company servers suffered potential weeklong incapacitation.This study also aims to fill the gaps in the transport industry and maritime market concerning the security of autonomous vessels and viable recovery procedures.
文摘Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.