Page 2,089«..1020..2,0882,0892,0902,091..2,1002,110..»

Government’s next big task? Avoiding the quantum computing pitfall – Open Access Government

For more than fifty years, public key infrastructure, or PKI, has been relied upon by almost all organisations to provide the cryptographic backbone which secures devices and the humans using them.

Relatively unknown outside the technology industry, PKI digital certificates provide the digital trust needed to secure critical national infrastructure from telecommunications to energy supply, the banking sector and even life-critical technology deployed by armed forces worldwide.

Without PKI, public and private network access would not be safe, or secure. Only with PKI can we ensure the devices, people, software, and applications that make up critical national infrastructure remain in the sole control of those trusted with their security. PKI relies mainly on two algorithms, which form the basis of current cryptography: the RSA 2048 (Rivest Shamir Adleman) and ECC 256 (elliptic-curve cryptography).

These algorithms are the foundation of the digital stamps which verify and protect human and non-human, or machine identities used to access sensitive data across government and all industries. However, change is coming.

Like most things, nothing lasts, and the PKI organisations the world over have relied upon to maintain digital trust has an emerging and very real threat. We are now standing at the precipice of a new age of quantum computing; an advanced type of computation that leans on quantum physics to run multiple processes simultaneously. Quantum computing will render traditional PKI, as we know it, no longer fit for purpose.

This poses a very real threat to the information security systems we all rely on to protect our freedom and liberty. To remain secure, government agencies will have to adopt new families of quantum-resistant cryptography.

Now is the time to prepare for this transition. The step-change quantum computing will bring cannot be underestimated. The average computer trying to break a message encrypted with our common RSA and ECC algorithms would need around 300 trillion years. A quantum computer, with its ability to guess keys in parallel, would need around a week.

The effects will be dire; when the first quantum computer becomes powerful enough, even data under the highest encryption will become easily decrypted by whoever has access to a functional quantum computer. In fact, some adversaries are already saving encrypted content, that they will later look to break with quantum computers (and perhaps other methods).

This could be anything from the control systems upholding the national electric grid, remote devices controlling the water supply, systems operated by the armed forces or secret services, even the central banking system. Scientists consider the predicted fallout of quantum computers so severe its called the Quantum Apocalypse.

Given the gigantic steps forward in the research and development of quantum computers, with Google, Honeywell, and indeed China in the race, it is a matter of when rather than whether quantum computers will change the digital world as we know it. One thing is certain: Governments must implement new cryptographic alternatives as soon as possible.

Work is already underway to overcome this looming issue: The USAs National Institute of Standards and Technology (NIST) is working to find quantum-resistant alternatives to our current algorithms. Organisations across the world, from the fields of academia, technology, and the public sector, have united to collaborate in the discovery of new, quantum-safe algorithms.

NIST coordinates their efforts, and its Post-Quantum Cryptography project is well en-route to identifying and vetting potential next-generation cryptographic schemes, which it expects to do by 2024. Even before the NIST arrives at its final candidates, government agencies must begin the transition to quantum-safe PKI certificates to withstand the Quantum Apocalypse.

This process presents the core challenge: replacing every one of the trillions of certificates and keys in circulation in our digital systems is a gargantuan task given the variety of types, sources, issuers, lifespans, and a myriad of other factors. For every government around the world, this is mission-critical: failure to replace even one certificate could lead to breaches, data exfiltration, or operational disruption.

The first step is to gain a full understanding of all certificates and keys present in the public environment, and enable government IT to replace them at will, regardless of their specificities. The only way to make this shift effectively and safely is to leverage crypto-agile automation.

That is a crypto-agile approach, which anticipates frequent changes across, potentially, millions of certificates, keys and cryptography. One example, as it pertains to certificates is with Certificate Lifecycle Management. This allows organisations to manage all the certificates in the enterprise system at once, renewing, deploying and revoking them as necessary. Deploying these CLM solutions now can ease the transition to quantum-resistant certificates.

The most advanced CLM solutions can manage the transition of all certificates, independently of their particulars, including which Certificate Authority issued them originally. This makes CLM extremely effective in the transition from existing PKI certificates to quantum-resistant ones, as it ensures no stone will be left unturned.

While the cryptographic community works to standardise quantum-safe algorithms, players who have been securing the digital systems since the dawn of the internet have published free sets of resources like Quantum Labs.

Organisations and governments must arm themselves with the tools to migrate to quantum-resistant algorithms and prepare for the quantum era. In this way, they face the quantum era as a leap forward, not a jump into the void.

Editor's Recommended Articles

More:
Government's next big task? Avoiding the quantum computing pitfall - Open Access Government

Read More..

USC ISI works with D-Wave to house one of the First US-Based Advantage Quantum Computer – USC Viterbi | School of Engineering – USC Viterbi School of…

The D-Wave Advantage quantum system.

LOS ANGELES (May 12, 2022) USC and D-Wave Systems Inc. are launching the first 5,000+ qubit D-Wave quantum computing system physically located in the United States, designed for academic researchers, government users, and business clients, the Advantage quantum system. Other systems are located in Germany and Canada.

As part of the USC-Lockheed Martin Quantum Computing Center (QCC) hosted at the USC Viterbi School of Engineerings Information Sciences Institute (ISI), the Advantage system is accessible via the Leap quantum cloud service.

The new system contains the Advantage performance update released in October 2021, featuring the highly connected Pegasus topology and 5,000+ qubits.

The D-Wave Advantage quantum annealer is the largest scale programmable quantum information processor currently available anywhere, said Daniel Lidar, holder of the Viterbi Professorship of Engineering at USC, and the scientific and technical director of QCC.

At ISI we want to be at the forefront of new technologies, and to explore all the possibilities. We are excited to be pioneers in research on quantum computing, and to advance this field so that companies can harness the power of this emerging technology for themselves, said Craig Knoblock, Michael Keston executive director of ISI.

The Advantage system provides a four-fold increase in the number of qubits from our previous system as well as increased coherence and other performance metrics, Lidar said. We have great hopes for the new system as we explore coherent quantum annealing to achieve quantum speedups in quantum simulation, best-in-class optimization and machine learning. Some of our first projects will be to investigate speedup over classical optimization methods for hard optimization problems as well as pursuing additional government-funded research for identification and classification of quantum phase transitions.

Through QCC, USC is currently one of the first universities in the world to host and operate a commercial quantum computing system. The launch of the USC-Lockheed Martin Quantum Computing Center in 2011 was followed by similar investments by Google and NASA the following year.

Quantum Information Science (QIS) is a top priority research area for the nation and has long been a focus of USC Viterbi said Yannis C. Yortsos, dean of the USC Viterbi School of Engineering. In collaboration with Lockheed Martin, we established at ISI in 2011 the first academic home for a quantum computing system, namely D-Wave One.

USC faculty have mentored a new generation of Ph.D. students in QIS, who now have leadership positions in academia and the industry, Yortsos noted. The school has also established a new MS degree in QIS, with current worldwide student demand growing steadily.

For more than a decade, research and education in QIS at USC Viterbi has been thriving and constantly growing, Yortsos said.

The upgrade to Advantage offers multiple benefits for users. It will enable researchers to continue studying how quantum effects may speed up the solution of complex optimization, machine learning and sampling problems, and new breakthrough results in quantum optimization.

Businesses will benefit from the commercial use-cases that can be run on the quantum hybrid solver service. Government agencies and researchers also will have access to one of the most advanced systems in the United States for tackling key public sector initiatives including electrical grid resilience, emergency response and infrastructure optimization projects.

As a part of the D-Wave Leap quantum cloud service, users will immediately be able to access the Advantage quantum computer located at USC in real-time. Leap access gives researchers, government agencies and enterprises access to all of the programming tools and hybrid quantum-classical resources offered through Leap. This system will also be available today for use in Amazon Braket, Amazons quantum computing service.

To date, D-Waves customers have developed hundreds of early quantum applications in an array of fields such as financial modeling, flight planning, quantum chemistry simulation, automotive engineering, health care, logistics and more.

Making quantum computing ubiquitous and available is one of our core areas of focus and is central to the commercialization of quantum computing, said Alan Baratz, CEO of D-Wave. This is an important moment for our U.S.-based customers who want their Leap cloud access to the newest Advantage system and quantum hybrid solver service to be in region.

Eleven years ago, together with Lockheed Martin, we installed our first quantum system at USC, Baratz added. Fast forward to today, delivering one of the most performant commercial quantum computers in the world yet again allows users to harness the power of annealing quantum computing for real-world optimization problems, all accessible real-time through our Leap quantum cloud service and in AWSs Amazon Braket.

Published on May 12th, 2022

Last updated on May 12th, 2022

Continue reading here:
USC ISI works with D-Wave to house one of the First US-Based Advantage Quantum Computer - USC Viterbi | School of Engineering - USC Viterbi School of...

Read More..

BT tests quantum radio receivers that could boost 5G coverage – TechRadar

BT is trialling a new hyper-sensitive quantum radio receiver that could boost the capabilities of 5G and Internet of Things (IoT) networks by reducing energy consumption and boosting coverage.

The receivers use excited atoms to achieve 100 times greater sensitivity than conventional radio equipment thanks to a quantum effect called electromagnetically induced transparency that forms a highly sensitive electric field detector.

Because the atomic radio frequency (RF) receivers are more sensitive, they could be deployed in areas where its impractical or not cost-effective to deploy mobile infrastructure. This would make nationwide 5G coverage a reality.

Meanwhile lower energy consumption would transform the economics of massive IoT projects that rely on long battery life.

The longer an IoT device can be left in the field without needing to be touched or replaced, the greater the return on investment.

BTs engineers successfully sent digitally-encoded messages using the technology via EEs 3.6GHz spectrum. The use of commercially-licensed frequencies could accelerate the timetable for the receivers to be used in the real world. Researchers are now working to miniaturise the equipment and find the optimum frequency modulation and signal processing so it can be used in the future.

BTs investment in cutting edge R&D plays a central role in ensuring the UK remains a network technology leader, said Howard Watson, BT chief technology officer (CTO). Our programme has huge potential to boost the performance of our next generation EE network and deliver an even better service to our customers. Although its early days for the technology, were proud to be playing an instrumental role in developing cutting edge science.

BTs interest in quantum technology has seen it and Toshiba build the worlds first commercial quantum-secured metro network using standard fibre cables in London.

The UK government has expressed a desire to be at the forefront of the field, believing quantum computing can play a vital role in the connected economy and accelerate Industrial Internet of things (IIoT) deployments. A National Quantum Computing Centre (NQCC) is expected to open in 2022 as part of the 1 billion National Quantum Technologies Programme.

Continue reading here:
BT tests quantum radio receivers that could boost 5G coverage - TechRadar

Read More..

Dynamics of Complex Quantum Systems and the Flight of the Bee – SciTechDaily

Levy flights describe statistical properties of elementary quantum magnets as well as of bees foraging for food. Credit: Christoph Hohmann (MCQST Cluster)

At first glance, a system consisting of 51 ions may appear to be easily manageable. But even if these charged atoms are only switched back and forth between two states, the result is more than two quadrillion (1015) different orderings which the system can take on.

The behavior of such a system is practically impossible to calculate with conventional computers, especially since an excitation introduced to the system can propagate erratically. The excitation follows a statistical pattern known as a Lvy Flight.

One characteristic of such movements is that, in addition to the smaller jumps which are to be expected, significantly larger jumps also sometimes take place. This phenomenon can also be observed in the flights of bees and in unusual fierce movements in the stock market.

While simulating the dynamics of a complex quantum system is a very tall order for even traditional super computers, the task is childs play for quantum simulators. But how can the results of a quantum simulator be verified without the ability to perform the same calculations it can?

Observation of quantum systems indicated that it might be possible to represent at least the long-term behavior of such systems with equations like the ones the Bernoulli brothers developed in the 18th century to describe the behavior of fluids.

In order to test this hypothesis, the authors used a quantum system which simulates the dynamics of quantum magnets. They were able to use it to prove that, after an initial phase dominated by quantum-mechanical effects, the system could actually be described with equations of the type familiar from fluid dynamics.

Furthermore, they showed that the same Lvy Flight statistics which describe the search strategies used by bees also apply to fluid-dynamic processes in quantum systems.

The quantum simulator was built at the Institute for Quantum Optics and Quantum Information (IQOQI) of the Austrian Academy of Sciences at The University of Innsbruck Campus. Our system effectively simulates a quantum magnet by representing the north and south poles of a molecular magnet using two energy levels of the ions, says IQOQI Innsbruck scientist Manoj Joshi.

Our greatest technical advance was the fact that we succeeded in individually addressing each one of the 51 ions individually, observes Manoj Joshi. As a result we were able to investigate the dynamics of any desired number of initial states, which was necessary in order to illustrate the emergence of the fluid dynamics.

While the number of qubits and the stability of the quantum states is currently very limited, there are questions for which we can already use the enormous computing power of quantum simulators today, says Michael Knap, Professor for Collective Quantum Dynamics at the Technical University of Munich.

In the near future, quantum simulators and quantum computers will be ideal platforms for researching the dynamics of complex quantum systems, explains Michael Knap. Now we know that after a certain point in time these systems follow the laws of classic fluid dynamics. Any strong deviations from that are an indication that the simulator isnt working properly.

Reference: Observing emergent hydrodynamics in a long-range quantum magnet by M. K. JoshiF. Kranzl, A. Schuckert, I. Lovas, C. MaierR. Blatt, M. Knap and C. F. Roos, 12 May 2022, Science.DOI: 10.1126/science.abk2400

The research activities were subsidized by the European Community as part of the Horizon 2020 research and innovation program and the European Research Council (ERC); by the German Research Foundation (DFG) as part of the Excellence Cluster Munich Center for Quantum Science and Technology (MCQST); and by the Technical University of Munich through the Institute for Advanced Study, which is supported by funding from the German Excellence Initiative and the European Union. Additional support was provided by the Max Planck Society (MPG) under the auspices of the International Max Planck Research School for Quantum Science and Technology (IMPRS-QST); by the Austrian Science Fund (FWF) and the Federation of Austrian Industries Tyrol.

Authors Prof. Michael Knap (TU Munich) and Prof. Rainer Blatt (University of Innsbruck) are active in Munich Quantum Valley, an initiative with the objective of establishing a Center for Quantum Computing and Quantum Technology (ZQQ) over the next five years. Here three quantum computers are to be built based on superconducting qubits as well as qubits from ions and atoms. Members of the Munich Quantum Valley e.V. association include the Bavarian Academy of Sciences and Humanities (BAdW), Fraunhofer (FhG), the German Aerospace Center (DLR), Friedrich-Alexander-Universitt Erlangen-Nrnberg (FAU), Ludwig-Maximilians-Universitt Munich (LMU), Max Planck Society (MPG) and die Technical University of Munich (TUM).

See original here:
Dynamics of Complex Quantum Systems and the Flight of the Bee - SciTechDaily

Read More..

Pentagon Leaders Get Briefed on Innovative Duke Research – Duke Today

A team from the U.S. military that included Gabriel Camarillo, under secretary of the Army, learned how shrimp, ants and quantum computing could improve military operations and technology during a tour of three Duke University research labs Monday.

Camarillo spent the afternoon getting briefed by Duke faculty members leading projects funded by the Army and other government agencies.

This research is absolutely critical to making the technological advances to develop war-fighting into the future, Camarillo said at the conclusion of his visit.

Jenny Lodge, Dukes vice president for research and innovation, said the tour highlighted the importance of Dukes partnerships with the Army and other agencies who see real-world applications in the science practiced every day in campus labs.

We dont want our research to just sit on shelves, Lodge said. We want it out in the world. These partnerships enable those translations to real-world uses.

Camarillos tour included stops in:

Its really hard to visualize the progress teams are making and potential future applications until you see the work, Camarillo said. Its also a chance to interact with the researchers and understand what the applications might be.

The visit Monday was the latest in a string of partnerships between Duke and the U.S. Army.

Last year, Duke entered an agreement with the Armys 18th Airborne Corps, based at Fort Bragg, N.C. to spur innovation by bringing military situations into the university research lab.

That partnership created Soldier-Academic Innovation Teams to collaborate on problems of interest to both the Army and Duke researchers. The agreement similar to those the Army has with other universities is intended to spur innovation in the military and increase research and learning opportunities at Duke.

That agreement, in turn, built on Army-Duke collaborations already underway, where Duke scholars helped develop solutions to real-world problems faced by the military.

In one exercise, for example, Duke students worked with officials at Seymour Johnson Air Force Base in Goldsboro streamline the planning and logistics of reservist training weekends through the design of software programs.

Camarillos visit to Duke also included a visit with recently retired mens basketball coach Mike Krzyzewski. Camarillo presented a statue to Krzyzewski a graduate of the U.S. Military Academy who also coached the Army basketball team for five seasons prior to taking over the Duke program in 1980

Read more:
Pentagon Leaders Get Briefed on Innovative Duke Research - Duke Today

Read More..

NFT Artist Refik Anadols First Supporters Were in the Tech World. All of a Sudden, Hes Become a Star at Auction, Too – artnet News

In 2006, the British mathematician Clive Humby famously proclaimed that data is the new oil.Little did he know it would also become the new art.

As one of the foremost practitioners of what he calls data painting, the Turkish American artist and TED Fellow Refik Anadol has been using data as the substance of his work for the better part of a decade. Over that time, hes won awardslike Lumen Prize and been featured at Venice Architecture Biennale and in shows at the National Gallery of Victoria and the Museum of Modern Art in New York.

I have always been interested in painting with data, Anadol told Artnet News from Barcelona last weekend, where he was on site to create a new digital artwork for the facade of Antoni Gauds iconic Casa Batll. Thousands of onlookers crowded the outside square towatch the illumination in an event organized by theOFFF Festival. The work was already traded as an NFT through Christies last week, when it sold for$1.38 million(and came with a dinner for 10).

Refik Anadol, Living Architecture: Casa Batll, courtesy of RAS

For me, NFTs and digital art should be experiential. Landmarks have become my canvas, Anadol said. Im interested in exploring the architectural domain as deeply as I can. All my art works tend to have a physical connection to public space.

Using AI to regeneratively map iconic public buildings, Anadol works in equal parts architecture, graphic design, and computer science using a JavaScript object-based coding language called VVVV, which allows for live programming and projection mapping.

It was at UCLA that I learned about creative coding, he says, referring to his time in the schools media arts program. There, his advisors includedChristian Moeller, Casey Reas, and Jennifer Steinkamp.

In 2014, after graduating, he established the Refik Anadol Studio,which currently has a staff of 15 people. Our staff is multicultural and multilingual, Anadol said. We have an incredible staff of different minds and competencies.

Early in his career, Anadol focused on finding support from fellow technologists, rather than in the art world. Back when I first opened the studio in 2014, our earliest collaborators were not from the art or design worlds. They came from tech, he said.

In Quantum Memories, made when he was Googles artist-in-residence, he used the search giants publicly available quantum computing algorithms to 3D map the possibility of a parallel world. Part sci-fi, part next-level computer graphics, thealgorithm processed approximately 200 million images of nature to form an interactive algorithmic gesamtkunstwerk, mimicking the real-time simulations of audiences movements into an entangled web of generative world-building.

Refik Anadol, Quantum Memories, 10M x 10M x 2.5M AI Data Sculpture.Courtesy RAS

In another piece, Melting Memories (2018), inspired by his uncles Alzheimers diagnosis, Anadol transformed brain scans into projected images for the walls of the Pilevneli Gallery in Istanbul.The artwork and others also drew on Anadols longstanding interest in the imagery and history of space exploration.

To date,various iterations of the NFT have been auctioned via Nifty Gateway and Sothebys, with total sales of the project now exceeding $13 million USD, according to CryptoArt.io.Im extremely grateful to the NFT community for supporting my work, he said. The NFT world has given my studio economic independence.

(Asked what he has done with his wealth,Anadol says that whatever he doesnt reinvest into his studio goes to charity. OneNFT from a collection titled An Important Memory for Humanityraised $1.5 million for St Jude Childrens Hospital.)

Seoul Light, DDP, Seoul, KR, Courtesy RAS

In my art practice, I often ask myself the question: how would a computer collaborate with us to make art that not only is futuristic, but also about the possibility of various futures? he said. I do think that we approach answering this question only when we combine research efforts in various fields, including neuroscience, architecture, quantum computing, material science, philosophy, and arts.

Anadol is now busily preparing for two new works: one for an exhibition at Palazzo Strozzi that reimagines Italian Renaissance artworks; the other, a new piece to be shown in Istanbul and based on the writings of the13th-century Persian poet Rumi.For the latter work, Anadol will construct a digital installation in the foyer of the recently redesigned AKM Theater in Taksim Square.

All of us are standing on the shoulders of giants, Anadol said. Im just trying to explore the language of humanity.

Go here to see the original:
NFT Artist Refik Anadols First Supporters Were in the Tech World. All of a Sudden, Hes Become a Star at Auction, Too - artnet News

Read More..

Bureau of Industry and Security

Mass Market (Section 740.17)

Hardware and software items that would otherwise be classified as 5A002 or 5D002 can be classified under 5A992.c and 5D992.c if they meet the criteria listed in Note 3 to Category 5, Part 2 ("the mass market criteria"). In other words, some 5x002 items can become 5x992.c based on the way they are sold. Mass market items are described in 740.17(b)(1) and (b)(3) but not (b)(3)(iii) e.g., digital forensics) of License Exception ENC and have classification and reporting requirements.

Although a 5A992.c and 5D992.c item does not require a license exception to go to most places (because it is only Anti-Terrorism controlled) they are described in License Exception ENC 740.17, which includes the submission requirements that need to be made to BIS. Whether an item is 5x002 or 5x992.c - mass market (per Note 3 to Cat. 5 Part 2), the submission requirements are the same and therefore described in a single place under 740.17(b)(1) (self-classifiable) and (b)(3) (requires classification request to BIS).

The mass market criteria under Note 3 to Cat. 5, Part 2 has two paragraphs:

Paragraph A describes products that are generally available to the public at retail. Mass market products are typically consumer products sold at retail stores or internet locations, but products sold only to businesses can also qualify for mass market. BIS takes into account a range of factors when determining whether something qualifies for mass market including quantity of the item sold, price, technical skill required to use the product, existing sales channels, typical customer, and any exclusionary practices of the supplier.

Paragraph B applies to components of mass market products. In order to qualify for this paragraph:1. It must be a hardware or software component of an existing mass market product, meaning it is:- The same component that is factory installed in the mass market product; or- A functionally equivalent aftermarket replacement that has the same form fit and function.

2. Information Security must not be the primary function of the component;

3. It must not change the cryptographic functionality of an existing mass market item, or add new encryption functionality to the item; and

4. The feature set of the component must be fixed and not designed or modified to customer specifications.

ITEMS NOT Eligible for Mass Market 5x992.c: Items that meet the criteria in 740.17(b)(2) (e.g., network infrastructure) and 740.17(b)(3)(iii) (e.g., digital forensics) are NOT eligible for mass market treatment.

When a mass market 5x992.c item requires a Classification Request to BIS:Mass market items described under 740.17 (b)(3)(e.g., chips, components, SDK) (except for (b)(3)(iii)(e.g., digital forensics), which are not eligible for mass market) require a classification by BIS via SNAP-R before they can be classified as 5x992.c.

When a mass market 5x992.c item can be Self-Classified:Mass market items that are described under in 740.17(b)(1) can be self-classified with an annual self-classification report. If you choose to submit a classification request for a 740.17(b)(1) item, then a self-classification report for that item is not required.

When nothing is required to export a mass market item 5x992.c:The export of Mass market items that are described in the scenarios under in 740.17(a) do not require any submission to BIS.

Read the original:
Bureau of Industry and Security

Read More..

Why End-to-End Encryption May Not Be Enough – Newswire

Press Release - May 18, 2022 18:15 EDT

NEW YORK, May 18, 2022 (Newswire.com) - iQuanti: In the 21st century, data security is a key part of our daily lives. However, the sheer amount of information we regularly share across the internet leaves us vulnerable to cyberattackers and other unscrupulous actors or threats to businesses and individuals. This realization has led to a broad range of approaches to data security. Since email and other types of messaging are among the most vulnerable elements within our digital lives, there is plenty of focus on these mediums.

The bottom line is that we regularly share our most sensitive data, including identity and payment details, through these mediums, and protecting that data is paramount. Thankfully, technologies such as end-to-end encryption are helping us achieve extremely high levels of security when sending and receiving messages, protecting our data, quite literally, from end to end.

Unfortunately, however, end-to-end security protocols can never keep us 100% safe, and risks remain in several areas despite the level of protection offered by these technologies. This article explores why even end-to-end encryption may not be enough in our fight against data leaks and other security breaches.

What is End-to-End Email Encryption?

At its most basic level, end-to-end encryption works by securing data at both the source and the destination. Using public and private keys, it encrypts the data before it is sent out (sender) and then unencrypts the data at the other end (receiver). It is generally regarded as the most secure type ofencrypted email, providing robust data protection when it is in transit.

It is worth noting that this type of data protection is used for much more than encrypting emails. In fact, many instant messenger services, video communications apps, and social media platforms also use variations of end-to-end encryption to safeguard data across a broad range of communications channels.

The Limits of End-to-End Encryption

While end-to-end encryption is excellent for safeguarding data during transit, unfortunately, that's where its protection ends. In other words, while your data may be safe from man-in-the-middle attacks and other similar threats, if your computer, tablet, or cell phone is already compromised, it's possible that your data can be accessed upon receipt.

This means that anyone with backdoor access to your device can easily read and take any information received. Often, this is down to vulnerabilities within operating systems that are either unknown or unaddressed, essentially allowing a variety of malware to access your systems without your consent or knowledge.

In addition to this, end-to-end encryption is often beyond many people's skillset when it comes to email. The process of encrypting and decrypting information can be complicated and convoluted, leaving many people believing they are protected when in fact, they are not.

Taken together, it is clear that end-to-end encryption may not be enough to keep both businesses and individuals fully protected. Therefore, it remains imperative that we explore novel ways of data protection and continue to stay vigilant in the face of ever-evolving online threats.

Source: iQuanti, Inc.

Read the original:
Why End-to-End Encryption May Not Be Enough - Newswire

Read More..

Types of Encryption Algorithms – Security Boulevard

How Do Encryption Algorithms Work?

Encryption algorithms are mathematical formulas that transform plaintext into ciphertext. Plaintext is what the message looks like unaltered, but ciphertext scrambles the message to a point where its unreadableunless you have the right authorization to decrypt the code back into plaintext. Put simply, algorithms make encrypting and decrypting code possible, specifically between the correct users. These algorithms are written into software for computer systems and networks.

Before dissecting the different types of algorithms, lets review the difference between symmetric and asymmetric encryption.

When a message or file is encrypted, it can only be unscrambled and read if the receiver of the message has the correct password or code. Codes used to encrypt or decrypt are often referred to as keys, and without the proper cryptographic key, a recipient has no way of accessing an encrypted file.

With symmetric encryption, there is only one key that is used by both the owner and the recipient. Symmetric encryption uses either stream ciphers (encrypting bits of data one at a time) or block ciphers (encrypting a certain number of bits and grouping them into a single unit).

Think of it as sending someone a package thats locked. No one can open the package without the key, including hackers, but you also have to find a secure way to send or share the key. In the case of computers, both computers would need to have the key to open certain files.

One advantage of this type of encryption is how efficiently large amounts of data can be sent. Only having one key doesnt require as much mathematical computing. Symmetric encryption is also extremely secure if you have a trusted algorithm.

The issue with symmetric encryption is sharing the key with others without compromising security. If, for example, the owner of an encrypted file sends the key over email, a hacker can hack into their email and use the key to access shared information, defeating the purpose of encrypting something to begin with. The key is often shared in person to mitigate such risk, but this isnt always a realistic option for the extent of the internet. This issue calls for a key hierarchy or a way to manage the keys being used in huge bouts of data.

Asymmetric encryption, also known as public-key encryption, involves two keys. The key that encrypts a message or file is public, meaning it can be exchanged with anyone. However, the second key is private and is the only key that can decrypt the message or file.

Think of asymmetric encryption like a deposit box. Anyone can leave a letter, but only the owner of the private key can open the box to access the private information. This is most commonly used to exchange information and data on the internet.

The most obvious advantage of public-key encryption is its security and convenience. Instead of having a secret code that only two specific sources know, data can be safely exchanged with more people online. Asymmetric encryption also uses Public Key Infrastructure (PKI), which protects communications between the server and the client using digital certificates, which make it easier to verify that the recipient is coming from the correct sender.

The downside to asymmetric encryption is that the keys only go one direction, meaning a correspondence would require both parties to have their own set keys, one public and one private. In other words, every recipient needing to decrypt a message needs their own deposit box with a private key. Unlike symmetric encryption, the asymmetric encryption method is also more mathematically complex, which can slow down processing time.

With data being exchanged constantly online, both symmetric and asymmetric encryption is used today to verify, authenticate, and protect users. Depending on the level of security necessary, who needs access to data, the type of requests being made, etc., different encryption algorithms are better for certain scenarios. Some are more advanced than others, but the following systems are the most common and secure types of encryption.

One of the first main algorithms used was the Data Encryption Standard (DES), a type of symmetric encryption. It was the standard for electronic communications, but, though DES provided a solid foundation for encryption, it could be hacked in a matter of hours and couldnt keep up with modern computing.

Triple-DES was much more secure because it overcame the small keyspace of DES, and it eventually became the standard symmetric encryption algorithm for a time, specifically in the 1990s. It weaved its way into cryptographic protocols, too, such as SSH and TLS. Triple-DES (or 3DES) uses the cipher of DES three times over to encrypt data, which allows for multiple key lengths despite only using 56-bit keys.

Features

Triple-DES is one of the most efficient algorithms to implement. In its prime, 3DES changed security and helped resolve some of the biggest security leaks of DES. It still works for some hardware security encryptions.

In the face of more secure encryption algorithms, Triple-DES is becoming more and more obsolete. Though it can compute more than DES, 3DES can only work with 64-bit blocks, which doesnt keep up with most modern organizations. Most big companies and organizations use different symmetric encryption methods.

During the peak of Triple-DES use, big names like Microsoft and Firefox used Triple-DES for data security. Financial, payment, and other private services still use Triple-DES, though its unlikely they will continue using it.

The Advanced Encryption Standard (AES) is a type of symmetric encryption that is considered both the most unbreakable algorithm and the global standard of security. AES dethroned Triple-DES due to its higher computing capabilities and advanced security.

Features

There are no guarantees in the cyberworld, but to date, AES has yet to be cracked as far as anyone knows. With the ability to use a 256-bit key length, its one of the most secure forms of encryption. In fact, it would take billions of years to crack even a 128-bit encryption.

Even though its more powerful than both DES and Triple-DES, it is a bit harder to implement. Its also slower due to the key size, which can sometimes hinder communication.

The U.S. government uses this algorithm to keep all sorts of information private and secure. From government computers to cybersecurity, AES is an essential tool for keeping data classified. AES is truthfully used everywhere: solid-state drives (SSDs), WiFi in local area networks, cloud storage, internet browsers, and more.

Rivest-Shamir-Adleman (RSA) is a public-key encryption algorithm and is the primary way data is securely sent over the internet. As an asymmetric encryption method, RSA uses two keys, one for public encryption and one for private decryption. A defining element of RSA is how the algorithm is used: by factoring prime numbers.

Features

This is the best system for communicating with others online, especially when exchanging potentially sensitive information. Its especially used to verify digital signatures. Its easy to implement and sharing public keys to online users is relatively easy.

Because RSA is an asymmetric algorithm, its notably slower in comparison to symmetric encryption. It also requires more power compared to single-key encryption. Plus, though its great for security, if the private key is lost, the data cannot be decrypted.

RSA is used all over online, including web browsers, VPNs, emails, chats, and other communication servers.

Venafi is the leader of machine identity management and works behind the scenes to secure some of the largest networks in the world. Our technology protects cryptographic keys and digital certificates so that your business can safely succeed.

The machines used to communicate, streamline and process data are immensely helpful, but also at immense risk. Leaving machine communications unprotected leaves confidential and classified information unprotected, too. Thats why you need to efficiently manage the identities of all machines, which is why Venafi exists.

Want to learn more about how you can reduce risk at your organization? Download the Machine Identity Management for dummies Guide.

Read the original here:
Types of Encryption Algorithms - Security Boulevard

Read More..

An end to end-to-end encryption? – Reason

Is the European Union (EU) about to save the FBI from Going Dark by essentially outlawing end-to-end encryption? Jamil Jaffer and Nate Jones tell us that a new directive aimed at preventing child sex abuse might just do the trick. That view is backed by people who've been fighting the bureau on encryption for years.

The Biden administration is prepping to impose some of the toughest sanctions ever on Chinese camera maker Hikvision, Jordan Schneider reports. No one wants to defend Hikvision's role in enabling China's Uyghur policy, but I'm skeptical that we should spend all that ammo on a company that is far from the greatest national security threat we face. Jamil is more comfortable with the measure, and Jordan reminds me that China's economy is shaky enough that it may not pick a fight to save Hikvision. Speaking of which, Jordan schools me on the likelihood that Xi Jin Ping's hold on power will be loosened even by a combination of the Chinese tech downturn, harsh pandemic lockdowns, and the grim lesson provided by Putin's ability to move without check from tactical error to strategic blunder and then to historic disaster.

Speaking of products with more serious national security impact than Hikvision, Nate and I try to figure out why the effort to get Kaspersky software out of U.S. infrastructure is still stalled. I argue that the Commerce Department should take the blame.

In a rare triumph of common sense and science, the wave of dumb laws attacking face recognition may be receding as lawmakers finally notice what's been obvious for five years: The claim that face recognition is "racist" is false. Virginia, fresh off GOP electoral gains, has revamped its law on face recognition so it now more or less makes sense. In related news, I puzzle over why Clearview AI accepted a settlement of the ACLU's lawsuit under Illinois's biometric law.

Nate and I debate how much authority Cyber Command should have to launch actions and intrude on third country networks without going through the interagency process. A Biden White House review of that question seems to have split the difference between the laissez-faire spirit of the Trump administration and the analysis-paralysis of the Obama years.

Quelle surprise! Jamil concludes that the EU's regulation of cybersecurity is an overambitious and questionable expansion of the U.S. approach.

The EU may not be alone. Jordan notes the Defense Department's effort to keep small businesses who take its money from decamping to China once they start to succeed. Jordan and I fear that the cure may be worse than the disease.

I get to say I told you so about the unpersuasive and cursory opinion issued by United States District Judge Robert Pitman, when he enjoined Texas' social media law. The Fifth Circuit has overturned his injunction, so the bill will take effect, at least for a while. In my view some of the provisions are constitutional and others are a stretch; but Judge Pitman's refusal to do a serious severability analysis means that all of them will get a try-out over the next few weeks.

Jamil and I debate geofenced search warrants and the reasons why companies like Google, Microsoft and Yahoo want them restricted.

In quick hits,

Download the 407th Episode (mp3)

You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug!

The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

Follow this link:
An end to end-to-end encryption? - Reason

Read More..