Page 1,974«..1020..1,9731,9741,9751,976..1,9801,990..»

Proverbs to Cherish: ‘Pride Before the Fall’ – The Epoch Times

While, of course, everyone knows that pride can get you into trouble, the concept bears further reflection. For example, are there times in life where one might not have a problem as glaring as pride, but where shades of it can cause an issue? Most certainly.

First, some background on the meaty proverb Pride always comes before the fall.

The saying comes from the Bible (Proverbs 16:18), with the King James Version stating, Pride goeth before destruction, and a haughty spirit before a fall.

Most of the Book of Proverbs is said to date to the reign of King Solomon (971931 B.C.), which makes this saying perhaps 3,000 years old. The fact that its still with us today underscores its value for humankind.

Pride, of course, is the firstand certainly not the leastof the seven deadly sins.

Turning now to our time, you may have read that psychologist Jordan Peterson recently tweeted, in part, Remember when pride was a sin? and was removed from Twitter shortly after. While thats a much longer story, his remark is a truly sobering commentary on our day.

In my recent piece How to Get Kids to Appreciate Classical Music and Why, I talk about how some of the great composers would write To God be the glory or a similar statement on the front of their musical works. There is so much contained in thatthe idea that the glory shouldnt go to any human, and the idea that the talent and skill used to create the work werent the product of human effort alone.

When my husband watches sports and when someone on the football field, for example, does a self-satisfied joy dance after scoring a touchdown, he mentions what a contrast that is to the sort of composer I just described: a humble artist who owes all his thanks to the giver of his gifts.

Sometimes, I think about public figures who make enemies by being a bit over-the-top. Could it be that, at times, its pride that causes a desire to stick it to people through ones remarks?

Its helpful to consider times when there might have been a shade of pride at work when Ive said or done certain thingswhich really does reflect a lack of true faith in where things come from and even in how they come about. When I notice that, sometimes I sing a little song to myself, which goes mi mi mi mi mi, like an opera singer warming up. The little song serves as a reminder for me that its not about me me me, but rather about things that have been given.

But no matter what, we have to be confident in life, and especially in this troubled world. We have to stick to our values and have pride in who we are, in that sense. So the question becomes, when does self-confidence and all the other good traits that go into being your best self go too far and become pride, in a negative sense?

It may go back to a very old story and concept that relates to putting oneself above God, similar to the contrast mentioned above.

If we each think about our lives and the blessings in our lives, do we always remember where, or whom, these things come from? Yes, perhaps virtuous living has in part gotten us to where we are, but who was it, then, who created the principle whereby virtuous living brings blessings?

Next time you think that your children are beautiful, or how proud you are of your spouse, or what a lovely home you have, or how talented you are, remember not to fall for the trick of pride. Remember that it isnt you who brought you these things. Remember the divine hand behind it all, and that will help wash away your pride.

I think youll find that when you do that, a lot of stress will fall away, too, because youll remember that life isnt about what you do or what you accomplish. And by embracing your indebtedness and thus connection to the divine, youll be in a stronger, if not humbler, place.

See the original post here:
Proverbs to Cherish: 'Pride Before the Fall' - The Epoch Times

Read More..

What Is Zero-Knowledge Encryption, and Why Should I Choose It? – How-To Geek

Thapana_Studio/Shutterstock.com

Keeping your important data safe is an essential part of modern life, and encryption plays a big part in that. Zero-knowledge encryption, if done properly, is just about the best security method you can choose.

Encryption is a security process that alters readable data to make it unreadable. It takes plaintext, data readable by humans, and transforms it into ciphertext, which is unreadable by humans or machines. Only someone with the correct decryption key can convert the data back into plaintext and view it in its unscrambled form. Anyone else, who perhaps managed to intercept the data, would see only gibberish.

There are several different types of encryption methods available, each used for keeping data safe in different situations. The most common encryption type or protocol is Advanced Encryption Standard (AES). AES comes in three increasing security strengths, AES-128, AES-192, and AES-265. All of these are very secure, but AES-265 is considered military-grade encryption.

You likely use encrypted services several times a day, even if you dont realize it. But encryption is only as strong as the password or key used to secure it. So, justbecause something is encrypted, that doesnt mean it is completely safe. This is where zero-knowledge encryption comes into play. But what is zero-knowledge encryption, how does it work, and why should you choose it?

Zero-knowledge encryption is a method of encryption, rather than an encryption protocol such as AES-256. The term most often describes an encryption process where your data is secured at all times, with only you having the key or password needed to access and decrypt it.

For a service to be truly zero-knowledge, your data should be encrypted before it leaves your device, during transfer, and when it is stored on a server. These three stages are known as client-side encryption, encryption in transit, and encryption at rest, respectively. This will normally mean different encryption methods, including TLS and AES or an alternative, are used in combination to provide overall encryption.

Zero-knowledge encryption also requires that your password, which is the key to being able to decrypt the data, is never stored anywhere it could be accessed by a third party.Because only you have the password needed to decrypt the data, neither the service provider nor anyone who infiltrates the service can read it at any stage. Hence, zero-knowledge.

But how can your password be verified as being correct by a service provider if only you know it? That is where zero-knowledge proof comes in.

Zero-knowledge encryption and zero-knowledge proof are different concepts. Although zero-knowledge proof is often part of a service that promises zero-knowledge encryption, that isnt always the case.

Zero-knowledge proof is a cryptographic authentication method between two or more parties. During a standard authentication process, a password might be given as proof of the holders right to access data. The trouble is that the password needs to be known by both parties for it to be verified. This obviously makes it less secure.

In zero-knowledge proof authentication, only proof of knowledge of the password is needed, so the actual password is never revealed. Proving knowledge is achieved by the prover (you) answering a series of interactive or non-interactive challenges from the verifier (the service provider).

A real-world comparison is when you are asked to supply the 3rd, 5th, and 9th letters of your password to verify login to a banking app. Only someone who knows the full password would know which letters to provide, yet the actual password is not revealed.

In most situations, such as logging in to a password manager app, you wont actually need to answer questions or challenges to verify yourself. You will just need to enter your password. The zero-knowledge proof part of the process will be handled in the background by complex mathematical algorithms.

Zero-knowledge encryption has been around for a while, but its use has increased in the last few years. This is particularly true for consumer data storage services.

Any digital service that locks data behind a password login could use zero-knowledge encryption. The two most common services that offer zero-knowledge encryption are cloud storage services and password manager apps.

In fact, zero-knowledge encryption is increasingly being used to secure cloud storage. As mentioned earlier, this encryption method only works properly if the data is encrypted before leaving your computer, during transit, and when in the storage vault. That means true zero-knowledge cloud storage will be accessed through an app or desktop client, rather than through a browser interface.

Password manager apps are another place where zero-knowledge encryption makes perfect sense. When trusting all of your passwords to a single app or service, knowing that not even the service provider can access them unencrypted goes a long way. The best password managers will encrypt your passwords before they are even stored in the app or client, not just when they are stored in the cloud.

Although it is one of the most secure ways to protect your data, zero-knowledge encryption isnt without its downsides.

The most obvious potential problem is that there is often no way for you to retrieve your password if you lose or forget it. Your data will be lost, stuck behind an impenetrable barrier. Some services that use zero-knowledge encryption let you create a recovery key, which will allow you to reset your password once. However, this just moves the problem back one step, and if you lose the recovery key you will be in the same situation.

Zero-knowledge encryption can result in a service being slower than it might be with other security measures in place. The extra security and encryption steps needed can mean that something like cloud storage isnt as fast as it would be without zero knowledge being used. The loss of speed will probably be, for most people, outweighed by the extra security, but it is still worth considering.

Services that use zero-knowledge encryption might also lack some of the features offered by similar services that dont use it. For example, you might be unable to preview images or videos stored in a backup vault because that would require the data to be decrypted. In this case, you have to decide if convenience is more important to you than security.

Many big names in cloud storage offer zero-knowledge services. These include Sync.com, MEGA, pCloud, IDrive, and icedrive. Likewise, some of the best password manager services protect your data with this type of encryption, from NordPass to LastPass. As we spend more and more time in the cloud, entrusting our data security to others, we can only hope that more services get on board with zero-knowledge encryption.

Because, despite the few potential downsides, zero-knowledge encryption is the best choice if you care about the security of your data. By taking complete control of who can access and view your data, be it in a password manager, cloud storage, or another service, you remove the only realistic way it can be compromised.

Best Free Password Manager

Best Paid Password Manager

Best Password Manager and VPN Combo

One of the Best Password Managers

Best Offline Password Manager

Here is the original post:
What Is Zero-Knowledge Encryption, and Why Should I Choose It? - How-To Geek

Read More..

Google’s BigQuery Introduces Column-Level Encryption Functions and Dynamic Masking of Information – InfoQ.com

Google recently released new features for its SaaS data warehouse BigQuery which include column level encryption functions and dynamic masking of information. These features add a second layer of defense on top of access control to help secure and manage sensitive data.

Specifically, dynamic masking of information can be used for real-time transactions whereas column level encryption provides additional security for data at rest or in motion where real-time usability is not required.

These new features could be useful for companies that store personally identifiable information (PII) and other sensitive data such as credit-card data and biometric information. Companies that store and analyze data in countries where data regulation and privacy mandates are evolving, face ongoing risks from data breaches and data leakage and need to control data access, and these companies may also benefit from the new features.

Column-level encryption enables the encryption and decryption of information at column level, which means that the administrator can select which column is encrypted and which is not. It supports the AES-GCM (non-deterministic) and AES-SIV (deterministic) encryption algorithms. Functions support AES-SIV to allow for grouping, aggregation, and joins on encrypted data. This new feature enables some new use cases: when data is natively encrypted in BigQuery and must be decrypted when accessed, or where data is externally encrypted, stored in BigQuery, and must then be decrypted when accessed.

Column-level encryption is integrated with Cloud Key Management System (Cloud KMS) to provide the administrator more control, to allow management of the encryption keys in KMS, and to enable on-access secure key retrieval as well as detailed logging. Cloud KMS can be used to generate the KEK (key encryption key) that encrypts the DEK (data encryption key) that encrypts the data in BigQuery columns. Cloud KMS uses IAM (identity and access management) to define roles and permissions. KEK is a symmetric encryption keyset that is stored in Cloud KMS, and referencing an encrypted keyset in BigQuery reduces the risk of key exposure.

The BigQuery documentation explains:

At query execution time, you provide the Cloud KMS resource path of the KEK and the ciphertext from the wrapped DEK. BigQuery calls Cloud KMS to unwrap the DEK, and then uses that key to decrypt the data in your query. The unwrapped version of the DEK is only stored in memory for the duration of the query, and then destroyed.

In one example of a use case, the ZIP code is the data to be encrypted and a non-deterministic functions decrypt data when it is accessed by using the function in the query that is being run on the table.

From BigQuery documentation

In a second example, the AEAD deterministic function can decrypt data when it is accessed by using the function in the query that is being run on the table and supports aggregation and joins using the encrypted data.

From BigQuery documentation

In this way even a user who is not allowed to access the encrypted data can perform a join.

Before the release of column level encryption feature, the administrators need to make copies of the datasets with data obfuscated in order to manage the right accesses to groups. This creates an inconsistent approach to protecting data, which can be expensive to manage. Column level encryption increases the security level because each column can have its own encryption key instead of a single key for the entire database. Using column level encryption allows faster data access because theres less encryption data.

Dynamic masking of information, released in preview, allows more control to administrators who can choose, combined with the column-level access control, to grant full access, no access to data or masked data extending the column-level security. This capability selectively masks column-level data at query time based on the defined masking rules, user roles and privileges. This feature allows the administrators to obfuscate sensitive data and control user access while mitigating the risk of data leakage.

Thanks to this new feature, sharing data is easier, because the administrators can hide information selectively and the tables can be shared with large groups of users. At application level, the developers dont need to modify the query to hide sensitive data, after the data masking is configured at BigQuery level, the existing query automatically hides the data based on the roles the user is granted. Last but not least, the application of security is more easy, because the administrator can write the security rule once and then apply it to any number of columns with tags.

Any masking policies or encryption applied on the base tables are carried over to authorized views and materialized views, and masking or encryption is compatible with other security features such as row-level security.

Both new features can be used to increase security, manage access control, comply with privacy law, and create safe test environments. Allow a more consistent way to manage tables with sensitive data, the administrators dont need to create multiple datasets with encrypted (or not) data and share these copies with right users.

Go here to read the rest:
Google's BigQuery Introduces Column-Level Encryption Functions and Dynamic Masking of Information - InfoQ.com

Read More..

Bluefin Announces Partnership with Waystar to Deliver Advanced Payment Security Solution in Healthcare Payments – PR Web

Bluefin and Waystar Partner for Advanced Payment Security

ATLANTA and LOUISVILLE, Ky. (PRWEB) July 12, 2022

Bluefin, the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data, and Waystar, the leading provider of healthcare payments software, have partnered to provide Bluefins PCI-validated point-to-point encryption (P2PE) solution and payment gateway through Waystars software.

Healthcare data breaches hit an all-time high in 2021 tripling compared to 2018 and impacting 45 million patients and healthcare organizations are focused more than ever on increasing payment and data security.

To advance the industrys ability to meet growing cybersecurity challenges, the combined solution will provide Bluefins integrated payment processing with PCI-validated P2PE through Waystars HITRUST-certified healthcare payments platform, ensuring complete data security across all points of the patient financial experience, from patient access to key revenue cycle areas, like central business offices.

Bluefins PCI-validated P2PE solutions immediately encrypt payment data upon tap, dip, swipe, or key entry in a P2PE certified device, with encryption being done outside of the healthcare environment by Bluefin. Benefits include reduced PCI compliance scope, cost savings and protection of the healthcare brand.

We have always been committed to safeguarding the privacy of payment information for providers and patients, said Matt Hawkins, CEO, Waystar. When data and payments are secure, providers are able to focus on what matters most caring for their patients and communities.

Named a 2022 Fortress Cyber Security award winner in the data protection category, Bluefin provides their payment and data security technologies as integrated and stand-alone solutions. The companys PayConex payment gateway includes PCI-validated P2PE for point-of-sale payments and their ShieldConex data security platform for the vaultless tokenization of Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, and automatic clearing house (ACH) account data entered online.

In an industry where security breaches and ransomware attacks are rising, payment protection is non-negotiable, said John M. Perry, Bluefin CEO. Our PayConex gateway ensures that all payments across Waystars platforms are backed by the gold standard of payment security, PCI-validated P2PE. We applaud Waystar for leading healthcare payment cybersecurity and implementing this solution to secure the data of providers and their patients.

About Bluefin

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data. The companys product suite includes solutions for contactless, face-to-face, call center, mobile, eCommerce and unattended payments and data in the healthcare, higher education, government, and nonprofit industries. The companys 200 global partners serve 20,000 enterprise and software clients operating in 47 countries. For more information, visit http://www.bluefin.com.

About Waystar

Waystar delivers innovative technology that simplifies and unifies healthcare payments via a cloud-based platform to help healthcare providers across all care settings streamline workflows, improve financial performance and bring more transparency to the patient financial experience. Waystar solutions have been named Best in KLAS or Category Leader by KLAS Research 16 times (across multiple product categories) and earned multiple #1 rankings from Black Book Research. The Waystar platform is used by more than 500,000 providers, 1,000 health systems and hospitals, and 5,000 payers and health plansand integrates with all major hospital information and practice management systems. On an annual basis, Waystars AI-powered solutions process $5B in patient payments, generate $4B in out-of-pocket estimates and process claims representing approximately 40% of the U.S. patient population. For more information, visit http://www.waystar.com or follow @Waystar on Twitter.

Share article on social media or email:

Original post:
Bluefin Announces Partnership with Waystar to Deliver Advanced Payment Security Solution in Healthcare Payments - PR Web

Read More..

This Is the Code the FBI Used to Wiretap the World – VICE

Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.

The FBI operation in which the agency intercepted messages from thousands of encrypted phones around the world was powered by cobbled together code. Motherboard has obtained that code and is now publishing sections of it that show how the FBI was able to create its honeypot. The code shows that the messages were secretly duplicated and sent to a ghost contact that was hidden from the users contact lists. This ghost user, in a way, was the FBI and its law enforcement partners, reading over the shoulder of organized criminals as they talked to each other.

Last year, the FBI and its international partners announced Operation Trojan Shield, in which the FBI secretly ran an encrypted phone company called Anom for years and used it to hoover up tens of millions of messages from Anom users. Anom was marketed to criminals, and ended up in the hands of over 300 criminal syndicates worldwide. The landmark operation has led to more than 1,000 arrests including alleged top tier drug traffickers and massive seizures of weapons, cash, narcotics, and luxury cars.

Motherboard has obtained this underlying code of the Anom app and is now publishing sections of it due to the public interest in understanding how law enforcement agencies are tackling the so-called Going Dark problem, where criminals use encryption to keep their communications out of the hands of the authorities. The code provides greater insight into the hurried nature of its development, the freely available online tools that Anoms developers copied for their own purposes, and how the relevant section of code copied the messages as part of one of the largest law enforcement operations ever.

Do you know anything else about Anom? Were you a user? Did you work for the company? Did you work on the investigation? Are you defending an alleged Anom user? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or emailjoseph.cox@vice.com.

The key part of the Anom app is a section called bot.

The app uses XMPP to communicate, a long-established protocol for sending instant messages. On top of that, Anom wrapped messages in a layer of encryption. XMPP works by having each contact use a handle that in some way looks like an email address. For Anom, these included an XMPP account for the customer support channel that Anom users could contact. Another of these was bot.

Unlike the support channel, bot hid itself from Anom users contact lists and operated in the background, according to the code and to photos of active Anom devices obtained by Motherboard. In practice the app scrolled through the users list of contacts, and when it came across the bot account, the app filtered that out and removed it from view.

That finding is corroborated by law enforcement files Motherboard obtained which say that bot was a hidden or ghost contact that made copies of Anom users messages.

Authorities have previously floated the idea of using a ghost contact to penetrate encrypted communications. In a November 2018 piece published on Lawfare, Ian Levy and Crispin Robinson, two senior officials from UK intelligence agency GCHQ, wrote that Its relatively easy for a service provider to silently add a law enforcement participant to a group chat or call, and You end up with everything still being end-to-end encrypted, but theres an extra end on this particular communication.

The code also shows that in the section that handles sending messages, the app attached location information to any message that is sent to bot. On top of that, the AndroidManifest.xml file in the app, which shows what permissions an app accesses, includes the permission for ACCESS_FINE_LOCATION. This confirms what Motherboard previously reported after reviewing thousands of pages of police files in an Anom-related investigation. Many of the intercepted Anom messages in those documents included the precise GPS location of the device at the time the message was sent.

In some cases, police officers reported that the Anom system failed to record those GPS locations correctly, but that authorities believe the coordinates are generally reliable as they have in some cases been matched with other information such as photos, according to those police files.

A lot of the code for handling communications was apparently copied from an open source messaging app.

The code itself is messy, with large chunks commented out and the app repeatedly logging debug messages to the phone itself.

Cooper Quintin, a senior staff technologist at activist organization the Electronic Frontier Foundation (EFF), didnt think it was unusual for developers to use other modules of code found online. But he did find it bonkers that the FBI used ordinary developers for this law enforcement operation.

This would be like if Raytheon hired the fireworks company down the street to make missile primers, but didnt tell them they were making missile primers, he said in a phone call. I would typically assume the FBI would want to keep tighter control on what theyre working on, such as working with inhouse computer engineers who had security clearance and not bringing in people who are unknowingly taking down criminal organizations, he added. (One reason for the use of third-party developers was that Anom already existed as a company in its own right, with coders hired by the companys creator who worked on an early version of the app, before the FBI became secretly involved in Anoms management).

Recently courts in Europe and Australia have seen the next step of the Anom operation: the prosecution of these alleged criminals with Anom messages making up much of the evidence against them. Defense lawyers in Australia have started legal requests to obtain the code of the Anom app itself, arguing that access to the code is important to determine that the messages being presented in court by the prosecution are accurate. The Australian Federal Police (AFP) has refused to release the code.

Anybody who has been charged with an offence arising from messages that are alleged to have been made on the so called Anom Platform has a clear and obvious interest in understanding how the device worked, how anyone was able to access these messages and most importantly whether the original accessing and subsequent dissemination of these messages to Australian authorities was lawful, Jennifer Stefanac, an Australian solicitor who is defending some of the people arrested as part of Operation Ironside, the Australian authorities side of the Anom operation, told Motherboard in an email.

A second lawyer handling Anom related cases said they didn't think the Anom code would be of much relevance to defendants cases. A third said they saw why defendants may seek access to the code, but that they believed it shouldnt be publicly available.

When asked for comment, the San Diego FBI told Motherboard in a statement that We appreciate the opportunity to provide feedback on potentially publishing portions of the Anom source code. We have significant concerns that releasing the entire source code would result in a number of situations not in the public interest like the exposure of sources and methods, as well as providing a playbook for others, to include criminal elements, to duplicate the application without the substantial time and resource investment necessary to create such an application. We believe producing snippets of the code could produce similar results.

Motherboard is not publishing the full code of Anom. Motherboard believes the code contains identifying information on who worked on the app. Most of the people who worked on the Anom app were not aware it was secretly an FBI tool for surveilling organized crime, and exposing their identities could put them at serious risk. Motherboard will not be releasing the app publicly or distributing it further.

Motherboard previously obtained one of the Anom phones from the secondary market after the law enforcement operation was announced. In that case, the phone had a locked bootloader, meaning it was more difficult to extract files from the device. For this new analysis of the code, a source provided a copy of the Anom APK as a standalone file which Motherboard then decompiled. Motherboard granted multiple sources in this piece anonymity to protect them from retaliation.

Decompiling an app is an everyday process used by reverse engineers to access the code used to construct an app. It can be used to fix problems with the software, find vulnerabilities, or generally to research how an app was put together. Two reverse engineering experts corroborated and elaborated upon Motherboards own analysis of the app.

Operation Trojan Shield has been widely successful. On top of the wave of arrests, authorities were also able to intervene using the messages and stop multiple planned murders. In June to mark the one year anniversary of the operations announcement, the AFP revealed it has shifted some of its focus to investigating thousands of people suspected of being linked to Italian organized crime in Australia and that it is working with international partners.

Subscribe to our cybersecurity podcast,CYBER. Subscribe toour new Twitch channel.

See the article here:
This Is the Code the FBI Used to Wiretap the World - VICE

Read More..

Quantum Cryptography and Encryption Market Size, Share 2022: Emerging Technologies, Sales Revenue, Key Players Analysis, Development Status, and…

Global Quantum Cryptography and Encryption Market by Types, Application Outlook, Companies, and By Geography (Asia-Pacific, North America, Europe, South America, and the Middle East & Africa), Segments, and Forecasts from 2022-2028

The Quantum Cryptography and Encryption market research combines a thorough examination of current and future potential to forecast future development in the Quantum Cryptography and Encryption industry. This research examines the Quantum Cryptography and Encryption industry from top to bottom, covering enabling technologies, major trends, market dynamics, difficulties, standardization, regulatory environment, potential, future guidance, value network, ecosystem participant profiles, and approaches. This research, which provides industry chain structure, business strategies, and ideas for new project investments, is a significant source of support for organizations and individuals. The Quantum Cryptography and Encryption Market research also examines key market inhibitors and motivators in both quantitative and qualitative ways to provide reliable information to end-users.

Get a Full PDF Sample Copy of the Report: (Including Full TOC, List of Tables and Figures, and Chart) at https://www.eonmarketresearch.com/sample/92399

Quantum Cryptography and Encryption Market Segmentation

Quantum Cryptography and Encryption Market Competitor Outlook, this report covers ID Quantique, Qrypt, Single Quantum, Post-Quantum, Crypto Quantique, CryptoNext Security, Quantum Resistant Ledger, InfiniQuant, Agnostiq, ISARA Corporation, KETS Quantum Security, MagiQ Technologies, PQShield, Qabacus, Qaisec, Qasky Quantum Technology

Product Type Outlook (Revenue, USD Billion; 2022 2028) Code-based, Lattice-based, Others

Application/ End-user Industry Outlook (Revenue, USD Billion; 2022 2028) Financial, Government, Military & Defense, Others

Region Outlook (Revenue, USD Billion; 2022 2028) North Americao USo Canadao Mexico Europeo Germanyo UKo Franceo Italyo Spaino Beneluxo Rest of Europe Asia Pacifico Chinao Indiao Japano South Koreao Rest of Asia Pacific Latin Americao Brazilo Rest of Latin America Middle East and Africao Saudi Arabiao UAEo South Africao Rest of Middle East & Africa

Inquiry Quantum Cryptography and Encryption Market Report at https://www.eonmarketresearch.com/enquiry/92399

A Quantum Cryptography and Encryption Market report includes a thorough market analysis as well as input from industry experts. Quantum Cryptography and Encryption Market type, organization size, on-premises distribution, end-users organization type, and accessibility in locations such as North America, South America, Europe, Asia-Pacific, and the Middle East and Africa are all factors considered when creating this worldwide Quantum Cryptography and Encryption market study. The top-of-the-line market research analysis brings a massive market into sharp focus. Quantum Cryptography and Encryption Market report research works assist in evaluating various crucial aspects such as development in a growing market, the triumph of a current strategy, and share of the Quantum Cryptography and Encryption market development.

The following are some of the reports most important features:1. Detailed market study of the Quantum Cryptography and Encryption market2. Changing industry competitive landscape3. Detailed competitive categorization4. Historical, current, and forecast market size in quantity and value5. Recent industry trends and developments6. The Quantum Cryptography and Encryption Markets Competitive Landscape Key Players Strategies and Product Portfolio7. Segments/Regions Showing Promising Growth a Neutral Perspective on the Quantum Cryptography and Encryptions Performance

Click Here to Download Free Sample Report (Get Detailed Analysis in PDF 151 Pages)

A section from the table of contents is as follows: The market overview covers the research scope, major manufacturers included market segments by type, Quantum Cryptography and Encryption market segments by application, study objectives, and years analyzed. The global Quantum Cryptography and Encryption market competitiveness is assessed in terms of price, revenue, sales, and market share by the organization, market rate, competitive situations, and current developments, expansions, acquisitions, mergers, and sales volumes of top enterprises. The major players in the international Quantum Cryptography and Encryption market are characterized by sales area, key products, operating income, revenues, price, and manufacturing. In this section of the Quantum Cryptography and Encryption market study, the authors focused on manufacturing and supply value predictions, key manufacturer forecasts, and productivity and production cost estimates by category.

Browse Complete Quantum Cryptography and Encryption Market Report Details with Table of contents and list of tables athttps://www.eonmarketresearch.com/quantum-cryptography-and-encryption-market-92399

About: Eon Market Research (EMR) is a specialized market research, analytics, and solutions company, offering strategic and tactical support to clients for making well-informed business decisions. We are a team of dedicated and impassioned individuals, who believe strongly in giving our very best to what we do and we never back down from any challenge. Eon Market Research offers services such as data mining, information management, and revenue enhancement solutions and suggestions. We cater to industries, individuals, and organizations across the globe, and deliver our offerings in the shortest possible turnaround time.

Contact: 8345 NW 66th St Miami, Florida, Zip 33195 United States; Email: [emailprotected]

See the rest here:
Quantum Cryptography and Encryption Market Size, Share 2022: Emerging Technologies, Sales Revenue, Key Players Analysis, Development Status, and...

Read More..

Quantum computer succeeds where a classical algorithm fails

Enlarge / Google's Sycamore processor.

People have performed many mathematical proofs to show that a quantum computer will vastly outperform traditional computers on a number of algorithms. But the quantum computers we have now are error-prone and don't have enough qubits to allow for error correction. The only demonstrations we've had involve quantum computing hardware evolving out of a random configuration and traditional computers failing to simulate their normal behavior. Useful calculations are an exercise for the future.

But a new paper from Google's quantum computing group has now moved beyond these sorts of demonstrations and used a quantum computer as part of a system that can help us understand quantum systems in general, rather than the quantum computer. And they show that, even on today's error-prone hardware, the system can outperform classical computers on the same problem.

To understand what the new work involves, it helps to step back and think about how we typically understand quantum systems. Since the behavior of these systems is probabilistic, we typically need to measure them repeatedly. The results of these measurements are then imported into a classical computer, which processes them to generate a statistical understanding of the system's behavior. With a quantum computer, by contrast, it can be possible to mirror a quantum state using the qubits themselves, reproduce it as often as needed, and manipulate it as necessary. This method has the potential to provide a route to a more direct understanding of the quantum system at issue.

Much of the paper is devoted to describing situations where this should be the case, in part elaborating on ideas described in earlier papers.

The first of these ideas describes some property of a quantum system involving an arbitrary number of itemslike a quantum computer with n qubits. This is exactly the circumstance described above, where repeated measurements need to be made before a classical computer can reliably identify a property. By contrast, a quantum computer can store a copy of the system in its memory, allowing it to be repeatedly duplicated and processed.

These problems, the authors show, can be solved on a quantum computer in what's called polynomial time, where the number of qubits is raised to a constant power (denoted nk). Using classical hardware, by contrast, the time scales as a constant raised to the power related to the number of qubits. As the number of qubits increases, the time needed for classical hardware rises much faster.

The second task they identify is a quantum principal component analysis, where computers are used to identify the property that has the largest influence on the quantum system's behavior. This was chosen in part because this analysis is thought to be relatively insensitive to the noise introduced by errors in today's quantum processors. Mathematically, the team shows that the number of times you'd need to repeat the measurements for analysis on a classical system grows exponentially with the number of qubits. Using a quantum system, the analysis can be done with a constant number of repeats.

The final situation involves allowing a physical process to influence the state of a quantum system, causing it to evolve to a new state. The goal is to find a model of the process that can accurately predict what the new state would be. Again, using a classical system means the challenge of getting enough measurements scales exponentially with the number of qubits but grows much more slowly when quantum computing is used.

Why does a quantum computer perform so much better? The researchers say that a key step is storing two copies of the examined system and then entangling them. This method is something that's only possible on quantum hardware.

Read this article:
Quantum computer succeeds where a classical algorithm fails

Read More..

UMN-led team receives $1.4M Keck Foundation grant to study possible breakthrough in quantum computing – UMN News

A University of Minnesota Twin Cities-led team received a $1.4 million award from the W. M. Keck Foundation to study a new process that combines quantum physics and biochemistry. If successful, the research could lead to a major breakthrough in the quantum computing field.

The project is one of two proposals the University of Minnesota submits each year to the Keck Foundation and is the first grant of its kind the University has received in 20 years.

Quantum computers have the potential to solve very complex problems at an unprecedented fast rate. They have applications in fields like cryptography, information security, supply chain optimization and could one day assist in the discovery of new materials and drugs.

One of the biggest challenges for scientists is that the information stored in quantum bits (the building blocks of quantum computers) is often short-lived. Early-stage prototype quantum computers do exist, but they lose the information they store so quickly that solving big problems of practical relevance is currently unachievable.

One approach researchers have studied to attempt to make quantum devices more stable is by combining semiconductors and superconductors to obtain robust states called Majorana modes, but this approach has been challenging and so far inconclusive since it requires very high-purity semiconductors. U of M School of Physics and Astronomy Associate Professor Vlad Pribiag, who is leading the project, has come up with a new idea that could yield stable Majorana quantum structures.

Pribiags proposed method leverages recent advances in DNA nanoassembly, combined with magnetic nanoparticles and superconductors, in order to detect Majoranas, which are theoretical particles that could be a key element for protecting quantum information and creating stable quantum devices.

This is a radically new way to think about quantum devices, Pribiag said. When I heard about this technique of DNA nanoassembly, I thought it fit right into this problem I had been working on about Majoranas and quantum devices. Its really a paradigm shift in the field and it has tremendous potential for finding a way to protect quantum information so that we can build more advanced quantum machines to do these complex operations.

The project, entitled Topological Quantum Architectures Through DNA Programmable Molecular Lithography, will span three years. Pribiag is collaborating with Columbia University Professor Oleg Gang, whose lab will handle the DNA nanoassembly part of the work.

About the W. M. Keck FoundationBased in Los Angeles, the W. M. Keck Foundation was established in 1954 by the late W. M. Keck, founder of the Superior Oil Company. The Foundations grant making is focused primarily on pioneering efforts in the areas of medical research and science and engineering. The Foundation also supports undergraduate education and maintains a Southern California Grant Program that provides support for the Los Angeles community, with a special emphasis on children and youth. For more information, visit the Keck Foundation website.

About the College of Science and EngineeringThe University of Minnesota College of Science and Engineering brings together the Universitys programs in engineering, physical sciences, mathematics and computer science into one college. The college is ranked among the top academic programs in the country and includes 12 academic departments offering a wide range of degree programs at the baccalaureate, master's, and doctoral levels. Learn more at cse.umn.edu.

See the original post here:
UMN-led team receives $1.4M Keck Foundation grant to study possible breakthrough in quantum computing - UMN News

Read More..

Quantum Source Secures $15 Million in Seed Round Funding to Develop Photonic Quantum Computer Technology that Can Scale to Millions of Qubits -…

Quantum Source Secures $15 Million in Seed Round Funding to Develop Photonic Quantum Computer Technology that Can Scale to Millions of Qubits

Israel based Quantum Source has received $15 Million in venture funding from Grove Ventures,Pitango First, andEclipse Ventures. They are developing technology for a large quantum computer based upon photonic technology. Photonic technologies have potential advantages over other technologies because they run at room temperatures, can potentially be built with chips manufactured in a standard semiconductor fabrication facility, are easier to network using optical fiber optic cables, can potentially take advantage of photonic components and other infrastructure developed for the telecommunications industry, and are less affected by external environmental factors that can destroy qubit fidelity and coherence. However, one of the biggest challenges is to implement two qubit gates.

Quantum Source has a goal of developing photonic quantum computing technology that can be scaled to millions of qubits. There are other companies that are pursuing a similar strategy with photonic technology, but Quantum Source is using a unique technology that uses something called photon-atom gates that could potentially give them an advantage. A key characteristic of the photon-atom gate is can provide a entangling two-qubit gate which is deterministic. The key concept of the photon-atom gate is it uses a single-photon Rman interaction with a single atom near a nanofibre-couple microresonator. Other photonic approaches can also implement photonic gates, but those may be probabilistic in nature. They can get around a gate which is probabilistic in nature by using a try until you succeed approach, but Quantum Source contends that by using a deterministic gate to begin with they will be able to create systems that are smaller, less complex, and lower in cost by several orders of magnitude. This approach has come out of research developed at the Weizmann Institute of Science in Israel. Additional technical papers describing the technology can be found here, here, and here.

Quantum Source may also benefit by having several members of their senior management team come from deep backgrounds in the semiconductor industry with extensive experience in developing chip level products that are built in semiconductor wafer fabs. CEO Oded Melamed was the former CEO of Altair Semiconductor which was acquired by Sony Corporation in 2016 for $212 million, VP of R&D Gil Semo was the Director of VLSI for Anobit which was acquired by Apple in 2012, and Chairman Dan Charash was the CEO of Provigent, which was acquired by Broadcom in 2011 for $300 million. Filling out that management team is Professor Barak Dayan of the Weizmann Institute who helped to originally develop some of the key technical concepts.

You can access the press release from Quantum Source announcing the new funding here.

July 12, 2022

.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

See original here:
Quantum Source Secures $15 Million in Seed Round Funding to Develop Photonic Quantum Computer Technology that Can Scale to Millions of Qubits -...

Read More..

Welcome to the Quantum Age – 6 Things You Need to Know About Quantum Computing – JD Supra

Quantum computing has the potential to drive economic growth and promote innovation across a range of industries such as manufacturing, supply chain optimization and logistics, molecular simulations and pharmaceuticals, machine learning, and finance. With a sustained influx of private and government investment and scientific advancements, quantum computing has moved rapidly towards the commercial market. For certain currently intractable problems, quantum computers will have a transformative effect, providing answers exponentially faster than a classical computer.

However, alongside this potential, quantum computing poses an existential threat to certain current forms of cryptography and thus the security of our data.

We have outlined the 6 things you need to know about quantum computing, from its use cases to the hazards it poses to cybersecurity, and how to prepare for the quantum age.

1. The Quantum Computing Industry is Growing

In December 2018, former President Trump signed the National Quantum Initiative Act (the NQI). The NQI called for a coordinated Federal program to accelerate quantum research and development for the economic and national security of the United States and allocated $1.2 billion to advance quantum technologies.

Spurred by recent scientific breakthroughs and extensive government support across agencies, national labs, and partnerships across government, academia, and the private sector, the quantum market is on the rise. According to McKinsey, funding of start-ups focused on quantum technologies (which also encompass quantum sensing and quantum networking) more than doubledfrom $700 million in 2020 to $1.4 billion in 2021. The share of investments in quantum coming from private-capital entities now accounts for more than 70 percent of investments. In total, quantum computing companies raised $3 billion by the end of 2021. In particular, four industriespharmaceuticals, chemicals, automotive, and financeare projected to be the first beneficiaries of quantum advantages, with the potential to capture nearly $700 billion in value as early as 2035. This increased funding suggests a growing confidence from the investment community in quantum computing.

While the possibility of huge long-term returns from quantum computing investments is clear, many companies and industries are already deriving value by mapping many of their high-value intractable problems onto hybrid quantum-classical algorithms being developed by quantum software companies. Companies that have already announced major quantum initiatives include Daimler, Volkswagen, Boeing, Airbus, Goldman Sachs, JPMorgan Chase, Wells Fargo and Merck. Additionally, prominent technology companies are also developing their own quantum capabilities - notably Alibaba, Amazon, IBM, Google, and Microsoft have launched commercial quantum computing cloud services.

2. Quantum Computing Poses a Real Threat to Cybersecurity

A quantum computer can factor prime numbers far more efficiently than a classical computer, thus allowing a requisitely large scale fault tolerant computer running what is known as Shors algorithm to break RSA encryption. The RSA cryptosystem is based on the complexity of prime number factorization for classical computers and is the building block of the current internet infrastructure used to secure most online communication and protect banking, health care, national security, trade secrets, and other vital digital information. As of April 2022, some 78% of all websites communicate relying on the secure version of the HTTP protocol, which is based on RSA encryption. Thus, the possibility of a quantum computer breaking RSA poses a significant threat to the public and private sectors information technology systems.

Although large scale fault tolerant quantum computers remain on the technological horizon as the hardware and software continue to develop, the cybersecurity risk is not just at the point when a quantum computer reaches the technological capacity to run Shors algorithm. Using what is known as harvest, decrypt later attacks, a hacker could obtain RSA-encrypted data now in a classic cyberattack and then decrypt that data in the future when large scale fault tolerant quantum computers are accessible. This is especially concerning for the financial and healthcare industries as unauthorized disclosure of sensitive financial and personal health information would impact consumers and patients at an unprecedented scale.

3. Solutions to Mitigate the Threat are Available

To address these threats while still promoting the overwhelmingly positive impacts that quantum technologies can have, on May 4, 2022, the White House released a national security memorandum (the NSM) outlining the Biden Administrations plan to address the cybersecurity risks posed by quantum technology. The NSM directs the National Institute of Standards and Technology (NIST) to come up with new algorithms (post-quantum algorithms) and standards through a "Migration to Post-Quantum Cryptography Project". NIST is currently engaged in a six-year effort to devise and assess encryption methods that could resist an attack from a future quantum computer.

On July 5, 2022, NIST announced four encryption algorithms that will become part of its post-quantum cryptographic standard, expected to be finalized in about two years at which point the public and private sector can fully implement them. The selection signals the beginning of the final stage of NISTs post-quantum cryptography standardization project, which will likely become an international reference for the industry. However, it is important to note that the final standards will likely constitute more than one algorithm for different use cases in the event one proves vulnerable. While the standards remain in development, NIST encourages IT professionals to explore the new algorithms and consider how their applications will implement them, while remaining flexible as the algorithms could change before the standard is finalized.

4. The Cybersecurity Threat is Likely to Have Legal Consequences

The advent of quantum computers will likely change the nature of what is considered appropriate cybersecurity or industry standard security practice under privacy laws, industry regulations, and commercial contracts. If organizations wait to invest in solutions to adequately protect their data until after a quantum hack, they put themselves at risk both of losing their data in the future and suffering reputational harm.

Regulations such as Articles 5 and 32 of the European Unions General Protection Regulation (GDPR) require personal data to be stored with appropriate security and protection against unauthorized users and to implement appropriate technical and organizational measures to ensure a level of security suitable to the risk. In addition, the California Consumer Privacy Act (CCPA) requires that a business utilize reasonable security in the context of personal information collected or processed for specific purposes. Meanwhile, industry-specific laws such as the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA) include security rules and safeguard requirements to ensure that financial and health data respectively is adequately protected. However, due to the scale at which a quantum computer will likely be able to break current methods of encryption, appropriate protection against a ransomware or other classical cyberattack will likely look far different in the quantum age.

If an organization processes personal data protected under current encryption methods that arent quantum-proof, that may be seen by future regulators as failing to take appropriate security measures to protect personal data and could subject the organization to significant fines under the GDPR as well as the possibility for costly fines and regulatory settlements from the Federal Trade Commission (FTC), Consumer Financial Protection Bureau (CFPB), and state regulators. The risk of the immense amount of personal, financial, and other types of data that could be lost or otherwise compromised in a quantum-driven hack will increase the burden companies face in terms of what is an appropriate security measure. Over the coming years, as the NIST standards are finalized, we will likely see a push across the legislative and regulatory landscape to promote implementation of post-quantum algorithms with regulators looking for (i) privacy, cybersecurity, and IT policies to affirmatively address the quantum threat and detail what the company has done to mitigate it and (ii) physical updates to cryptography practices and IT stacks to fortify data, especially sensitive and personal information.

In April 2022, a bipartisan group of U.S. lawmakers introduced The Quantum Cybersecurity Preparedness Act (the Cybersecurity Act), which would ensure NISTs standards are implemented in all US Federal systems within a year after their release and require the Office of Management and Budget (OMB) to submit a report to Congress on what else is needed to protect quantum computers from hackers. This focus on protecting US government systems will likely spur further legislation and possible regulatory rules requiring similar post-quantum cryptographic standards be instituted across the private sector as well.

Quantum computers also threaten digital signatures, often used to verify identities in a digital transaction or sign documents remotely. While the NIST algorithms address this threat as well, organizations should understand that digital signatures must too be fortified to protect these vital instruments of modern commerce and limit the possibility of widespread identity theft, fraud, and forgery.

These wide-ranging downstream legal consequences must be considered and addressed by business leaders, lawyers, and technologists alike.

5. Quantum Technologies Can Promote Long-Term Cybersecurity

Though the quantum threat to cybersecurity is real with certain data potentially already at risk due to harvest now, decrypt later attacks, the technology must not be seen as the death nail to privacy and cybersecurity. Quantum technologies such as quantum random number generators and quantum key distribution (QKD) can both mitigate the cybersecurity risks posed by quantum computers and strengthen cybersecurity systems that better protect communications and data.

It is paramount to see quantum technologies both as a sword and a shield for cybersecurity. The time is now for organizations to begin the planning and implementation process for post-quantum cryptography while also exploring quantum-enhanced technologies to proactively defend against cyber threats in the quantum age. By taking an all of the above approach investing in different quantum and quantum-enhanced technologies to fortify IT stacks, addressing quantum mitigation measures in policies and programs, and by evaluating quantums pros and cons, organizations can proactively protect their data and limit regulatory scrutiny and legal liability without curbing innovation.

6. You Can Create a Quantum-Safe Organization Today

For organizations, the first steps are to identify vulnerable data and systems and prepare to institute NISTs post-quantum algorithms (and any other government standards regarding quantum cryptographic standards) once they are standardized. Organizations should undertake a quantum-readiness assessment that (i) classifies what data needs protecting and the length of time for which it must be protected and (ii) inventories the types of cryptography protecting critical data. With this information, organizations will be able to label which types of critical data are currently vulnerable to a theoretical quantum attack and can then make necessary plans and investments to ensure that data is adequately protected against both classical and quantum attacks.

Organizations that store financial records, medical records, national security documents, and other sensitive data for long periods of time should immediately consider building post-quantum cryptography into their IT budgets, policies, and strategic planning processes. Failure to start adopting a post-quantum cryptographic strategy could put all existing encrypted data assets at risk of exposure.

The key to protecting data in the quantum age is cryptographic agility which will allow the existing cryptography to be easily swapped out with NIST-approved post-quantum algorithms when they are announced as well as further developments in cryptography and in quantum technologies themselves. This will be a long-term transformation for IT systems akin to Y2K at a larger scale. Integrating an understanding of the quantum threat into policies and programs while also investing the time and resources to begin making systems quantum-safe will be the key to avoiding regulatory scrutiny, protecting sensitive information, and proving to clients, shareholders, and investors that an organization is ready for the quantum age.

Quantum technologies promise a massive impact. As investments and technological evolution continue to increase, organizations must come to terms with quantums vast promise alongside its risks. The cybersecurity danger posed by quantum computing is undeniable. However, rather than fearing quantum technologies, organizations can both seek to address currently intractable business problems via quantum-leveraged solutions and invest in the policy and IT infrastructure necessary to protect data from an attack via a quantum computer. Making this investment in resources now will be the first step in developing the next stage of cybersecurity to protect data long-term both from classical cyberattacks as well as future quantum attacks. Harnessing quantum technologies will be the key to economic growth and building stronger cyber defenses in this dawning age of the technological revolution.

See more here:
Welcome to the Quantum Age - 6 Things You Need to Know About Quantum Computing - JD Supra

Read More..