Tag: Encryption

  • Even with Encryption, Robots are Vulnerable to Privacy Breaches

    Even with Encryption, Robots are Vulnerable to Privacy Breaches

    A recent study by the University of Waterloo has revealed significant privacy vulnerabilities in collaborative robots, highlighting the need for enhanced protective measures.
    Image Credits: Pixabay

    A recent study by the University of Waterloo has revealed significant privacy vulnerabilities in collaborative robots, highlighting the need for enhanced protective measures.

    Widespread Adoption of Robotics and Emerging Privacy Risks

    In recent years, robotics have become widely used in both public and private sectors. Hospitals utilize robots as surgical assistants because of their precision and skill, while many manufacturing companies increasingly rely on robots for dangerous and hazardous jobs. Robots not only produce high-quality products quickly and consistently but also help enhance workplace safety.

    However, despite their growing use, collaborative robots remain vulnerable to malicious attacks.If a hacker detects command patterns during operations, they can deduce sensitive patient information, such as medical conditions or medication routines—even if encryption protects the commands.

    “Imagine a robot communicating with its controller. While you can’t understand the actual conversation, you can tell when the robot is speaking and when it isn’t,” explains Cheng Tang, the lead author and a third-year engineering undergraduate. By examining the frequency of communication, the duration of the exchanges, and the pauses in between, an attacker can deduce the types of commands being transmitted.

    Remote Robot Control and Collaborative Efforts to Address Security Vulnerabilities

    Dr. Yue Hu, a professor in the Department of Mechanical and Mechatronics Engineering, adds, “There is growing interest in the robotics field to control robots remotely by sending commands over networks. These robots could be located anywhere—from hospitals to factories, or even different countries. However, many don’t realize that connecting robots to networks exposes them to security vulnerabilities.”

    These privacy issues led Hu to contact her former co-op student, Cheng, along with Drs. Diogo Barradas and Urs Hengartner, computer science researchers and members of the University of Waterloo’s Cybersecurity and Privacy Institute (CPI), to collaboratively find solutions. CPI brings together all six faculties of Waterloo and industry partners to protect critical Canadian infrastructure.

    While past research has concentrated on privacy risks in teleoperated robotics—where humans control robots in real-time using devices like joysticks or virtual reality—this study focused on script-based robots that execute pre-programmed commands. This distinctive approach enables robots to perform tasks with minimal human involvement.

    Analyzing Network Traffic to Identify Robot Actions Using Signal Processing

    The team explored methods to identify a robot’s actions by examining its network traffic. They developed a classification approach inspired by signal processing techniques—similar to those used in noise-canceling headphones—that analyze and transform signals to extract information or enhance quality.

    In their experiment, the researchers instructed a Kinova Gen3 robotic arm to perform four different tasks and collected 200 network traces, which are crucial for understanding the system’s data flow between the robot and its controller.

    They found that robot commands generate specific traffic sub-patterns, and common signal processing methods—particularly signal correlation and convolution—can detect these patterns. Impressively, their technique was able to correctly identify the Kinova robot’s actions 97% of the time, even though the data was encrypted.

    Addressing Privacy Risks Through Improved System Design and Security Measures

    These findings indicate that robots have the potential to unintentionally expose sensitive information, ranging from industry secrets to patient privacy, highlighting the urgent need for stronger security measures in the robotics field.

    Nevertheless, specific design adjustments could help prevent such data leaks and stabilize the network. The researchers suggest strategies like modifying the system’s interface—such as adjusting the timing of its application programming interface (API)—or implementing intelligent traffic shaping algorithms during operation.

    Their work was recognized with the Best Research Paper Award at the 20th International Conference on Availability, Reliability and Security (ARES).

    “The researchers published their study, On the Feasibility of Fingerprinting Collaborative Robot Network Traffic, in the ARES 2025 conference proceedings, and it also appears in the Lecture Notes in Computer Science book series.”


    Read the original article on: Tech Xplore

    Read more: Interacting With Robots Can Reduce Feelings of Loneliness Among Caregivers

  • No, Chinese Quantum Computers Have not Broken Military-Grade Encryption

    No, Chinese Quantum Computers Have not Broken Military-Grade Encryption

    Recent headlines claim Chinese researchers used D-Wave quantum computers to hack RSA, AES, and "military-grade encryption." This is both true and misleading.
    Hacking a 50-bit RSA key is so easy you could do it with your cell phone in seconds

    Recent headlines claim Chinese researchers used D-Wave quantum computers to hack RSA, AES, and “military-grade encryption.” This is both true and misleading.

    A May 2024 white paper in the Chinese Journal of Computers details how researchers used D-Wave’s quantum annealing to factor RSA-protected integers using Ising and QUBO models. The paper reports successful decryption of 50-bit RSA keys, explaining the process. However, there is no mention of AES or “military-grade” encryption.

    What does this mean, and should you worry?

    Short answer: No. But let’s break it down.

    The Strength of RSA Encryption in Securing Online Data

    RSA encryption secures daily internet activities (the “s” in “https://“) by using a pair of keys linked by a very large number. Cracking this number into prime factors is extremely hard without the private key. Most RSA encryption today is 2048-bit, exponentially harder to break than 50-bit—about 2^1998 times harder, which is a 1 followed by 601 zeros. For context, a 768-bit RSA key took two and a half years and hundreds of computers to crack in 2010.

    The paper doesn’t mention AES, which is typically 128- or 256-bit in common use, and “military-grade” encryption generally refers to 256-bit AES, equivalent to 15,360-bit RSA.

    While quantum computers hold immense potential, today’s quantum machines aren’t powerful enough to break modern encryption standards like 2048-bit RSA or 256-bit AES. Years from now, they may be—but not yet.

    In summary, while D-Wave quantum computers did crack a 50-bit RSA key, so could any modern smartphone or even an old laptop. Quantum computers sound futuristic, but we’re just beginning to understand their capabilities.


    Read Original Article: New Atlas

    Read More: Scitke