Total Pageviews

Tuesday, June 3, 2025

A lire: "A tertiary review on quantum cryptography"

A lire: Luiz Filipe Anderson de Sousa Moura, Carlos Becker Westphall, A tertiary review on quantum cryptography, Federal University of Santa Catarina, Brazil, June 4, 2025, https://www.arxiv.org/pdf/2506.02028 

Abstract: Quantum computers impose an immense threat to system security. As a countermeasure, new cryptographic classes have been created to prevent these attacks. Technologies such as post-quantum cryptography and quantum cryptography. Quantum cryptography uses the principle of quantum physics to produce theoretically unbreakable security. This tertiary review selected 51 secondary studies from the Scopus database and presented bibliometric analysis, a list of the main techniques used in the field, and existing open challenges and future directions in quantum cryptography research. The results showed a prevalence of QKD over other techniques among the selected papers and stated that the field still faces many problems related to implementation cost, error correction, decoherence, key rates, communication distance, and quantum hacking. 

Tim Nicholas Rühlig, “The “Huawei Saga” in Europe Revisited: German Lessons for the Rollout of 6G”

Tim Nicholas Rühlig, “The “Huawei Saga” in Europe Revisited: German Lessons forthe Rollout of 6G”, Notes du Cerfa, No. 187, Ifri, June 2025.

Abstract: "This paper examines the evolving debate over Chinese telecommunications vendor Huawei’s role in Europe’s 5G infrastructure, focusing on Germany as a critical case study. While the European Union (EU) attempted to coordinate a collective response through its 5G Toolbox, member states diverged significantly in balancing political, economic, and technological considerations. Germany, despite its economic ties to China and status as Europe’s largest telecom market, only reached a tentative agreement in July 2024—one that appears largely symbolic. The paper argues that Germany’s compromise reflects persistent institutional divisions and a reluctance to decisively reduce reliance on Chinese technology, even in the face of geopolitical and security concerns. The analysis suggests that with 6G on the horizon, Europe must learn from its fragmented 5G response. A future 6G strategy should prioritize network diversity, enhanced encryption, and reduced dependency on high-risk suppliers to preserve European sovereignty and digital resilience. The paper concludes by urging a more unified and binding EU framework for managing the rollout of nextgeneration wireless infrastructure."

About AI in Defence

L'intégration de l'IA dans le domaine militaire a suscité de nombreux développements au cours de ces dernières années. Sur le même sujet, voici quelques récentes publications internationales qui permettent de poursuivre les réflexions. 

- Un livre blanc de l'EDA (European Defence Agency), "Trustworthiness for AI in Defence", 9 mai 2025. 

- Nicola Bonsegna, un article sur les systèmes d'arme autonomes (26 mai 2025)

- un article de chercheurs américains (Harvard, Cambridge, Boston, et US Army War College), "Military AI Needs Technically-Informed Regulation toSafeguard AI Research and its Applications" (mai 2025)

...

Protecting Unmanned Aircraft Systems (UAS) against Cyber Security Threats

Le CERT indien a récemment publié (18 avril 2025) un guide pour la cyber-sécurisation des systèmes UAS, rappelant les multiples sources de vulnérabilités de ces derniers: au niveau hardware (capteurs, risques physiques...), logiciel et firmware (stockage des données non chiffrés, mises à jour non sécurisées...), systèmes de communication (transmissions non chiffrées, authentification faible...), vulnérabilités opérationnelles. Les systèmes sont donc exposés à des attaques sur chacun de ces niveaux. 

Lire le rapport "Good Practices for protecting Unmanned Aircraft Systems (UAS) against Cyber Security Threats". 

Monday, June 2, 2025