You are here


RUBIN Science Magazine

On mobile devices, entering passwords is a fairly laborious task.
Information Technology

Mobile devices present a great challenge

Passwords are a necessary evil, indispensable for the purpose of ensuring data confidentiality. Unfortunately, the most secure passwords are also the ones that are most difficult to memorise.

Customers shopping online enter personal data in their browser; the TLS encryption protocol has been designed to ensure secure transmission.
Information Technology

New TLS version

Every time we use online banking or log into a web application, we are transmitting sensitive data such as passwords and account information via the Internet. Currently, they are not one hundred per cent secure.

By their own account, the company D-Wave released the first quantum computer to the market in 2010. However, critics doubt that the computer truly operates with quantum effects and that it achieves the enormous computing performance that would be attained by a genuine quantum computer.
Information Technology, Mathematics

Future-proof encryption methods

Even though a quantum computer does, as yet, remain pure theory, IT experts are able to determine how easily it could break common encryptions. They deploy a trick familiar used in logics.

Computer chips may become targets of attackers. Protecting them is not an easy task.
Information Technology

Manipulating computer chips

Integrating Trojans in computer chips is a time consuming and at the same time highly sophisticated attack method. They are almost impossible to detect – an advantage that intelligence agencies would love to exploit.

The number of devices connected to the Internet is continuously growing – including household appliances. They open up numerous new attack targets.
Information Technology

Technology for the Internet of Things

Cars, fridges, household appliances – in the future, many everyday items will be online. That opens up numerous new targets for attacks. This is how the researchers from Bochum want to protect us.

A car key should open only the one car to which it belongs. In order to ensure that this is the case, cryptographic protocols run on the microprocessor integrated in the key.
Information Technology

In search of economical encoding

Remote control of radiators or wireless door locks – the possibilities offered by interconnected devices are fascinating, but they have to be protected against hacker attacks.

Patient files may contain hints for detecting diseases at an early stage

Distorted data, correct conclusions

Patient files might contain hints for detecting diseases at an early stage. But how can the collated data be evaluated without invading the patients’ privacy? With the help of mathematics.

PhD student Abhishek Sharma performs one of many lablet production steps. He positions electrodes in order to coat a part of the wafer.

Imitating nature

Autonomous micro labs the size of cells that monitor chemical systems  from the inside – pure fiction, as yet. But several crucial steps have been taken.

In the audiometry lab, Hendrik Meutzner asks participants to solve his audio captchas in order to assess their usability.
Information Technology

Audio captchas: a challenge for the ears

In order to avoid spam, on many websites users are prompted to prove that they are human by entering symbols that are difficult to read. In case of partially sighted people, audio captchas are used, but there’s room for improvement.

Olivia Masseck (right) happily shares her knowledge of optogenetic methods with students.

New optogenetic tools

Anxiety and depression are two of the most frequently occurring mental disorders worldwide. Light-activated nerve cells may indicate how they are formed.

Filter articles

Featured topic: When science and science-fiction merge