Skip to Content
Uncategorized

Curvy Security

To keep messages secure, the computers that run wireless networks must do some complicated math to authenticate every Internet-enabled cell phone or wireless personal digital assistant that contacts them, and the devices must do the reverse, which can tax their batteries. Sun Microsystems senior staff engineer Hans Eberle and his team at Sun Labs are addressing that problem by creating a microprocessor that can be plugged into network computers to quickly authenticate messages from a range of wireless gadgets. The numerical “keys” used to authenticate most electronic messages today are generated by multiplying prime numbers; but to foil hackers, these numbers must be very large, containing up to 1,024 digital bits. Eberle uses a technique called elliptic-curve cryptography that instead derives keys from complex geometrical curves. The complexity of the curves makes the keys more difficult to break, so the same level of security can be achieved with smaller keys that require less computation to use. Eberle’s chips can establish secure connections at the rate of 7,000 per second-the “fastest reported,” he says. Sun’s product groups are evaluating the microprocessors for inclusion in the firm’s server computers.

Other Prototypes:
Videoconferencing by the Numbers

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.