RUB » RUBIN » 

You are here

Homepage

RUBIN Science Magazine

Featured Topic: IT Security Go to article overview
The number of devices connected to the Internet is continuously growing – including household appliances. They open up numerous new attack targets.

Cars, fridges, household appliances – in the future, many everyday items will be online. That opens up numerous new targets for attacks. This is how the researchers from Bochum want to protect us.

Research does not get any more theoretical than at Eike Kiltz’s Chair.

Eike Kiltz studies the hardest problems in mathematics – research doesn’t get any more theoretical and abstract than that. A glimpse into his work routine.

RUB researchers have been analysing which recovery strategies are effective after sport.
Sports Science

Results from competitive sports

What does an Olympic athlete do after the competition? He runs another round to warm down, goes to the sauna or has a massage. Sports scientists have analysed the effect these activities have on the body.

In some places, customers have the option to pay using the digital currency Bitcoin.
Information Technology, Mathematics

The Bitcoin system

In order to prevent fraud with digital currency such as bitcoin, sophisticated security mechanisms are deployed. However, they currently consume enormous volumes of electricity.

On mobile devices, entering passwords is a fairly laborious task.
Information Technology

Mobile devices present a great challenge

Passwords are a necessary evil, indispensable for the purpose of ensuring data confidentiality. Unfortunately, the most secure passwords are also the ones that are most difficult to memorise.

Customers shopping online enter personal data in their browser; the TLS encryption protocol has been designed to ensure secure transmission.
Information Technology

New TLS version

Every time we use online banking or log into a web application, we are transmitting sensitive data such as passwords and account information via the Internet. Currently, they are not one hundred per cent secure.

By their own account, the company D-Wave released the first quantum computer to the market in 2010. However, critics doubt that the computer truly operates with quantum effects and that it achieves the enormous computing performance that would be attained by a genuine quantum computer.
Information Technology, Mathematics

Future-proof encryption methods

Even though a quantum computer does, as yet, remain pure theory, IT experts are able to determine how easily it could break common encryptions. They deploy a trick familiar used in logics.

Computer chips may become targets of attackers. Protecting them is not an easy task.
Information Technology

Manipulating computer chips

Integrating Trojans in computer chips is a time consuming and at the same time highly sophisticated attack method. They are almost impossible to detect – an advantage that intelligence agencies would love to exploit.

The number of devices connected to the Internet is continuously growing – including household appliances. They open up numerous new attack targets.
Information Technology

Technology for the Internet of Things

Cars, fridges, household appliances – in the future, many everyday items will be online. That opens up numerous new targets for attacks. This is how the researchers from Bochum want to protect us.

A car key should open only the one car to which it belongs. In order to ensure that this is the case, cryptographic protocols run on the microprocessor integrated in the key.
Information Technology

In search of economical encoding

Remote control of radiators or wireless door locks – the possibilities offered by interconnected devices are fascinating, but they have to be protected against hacker attacks.

Patient files may contain hints for detecting diseases at an early stage
Mathematics

Distorted data, correct conclusions

Patient files might contain hints for detecting diseases at an early stage. But how can the collated data be evaluated without invading the patients’ privacy? With the help of mathematics.

PhD student Abhishek Sharma performs one of many lablet production steps. He positions electrodes in order to coat a part of the wafer.
Chemistry

Imitating nature

Autonomous micro labs the size of cells that monitor chemical systems  from the inside – pure fiction, as yet. But several crucial steps have been taken.

Filter articles

Pages