Page 2,493«..1020..2,4922,4932,4942,495..2,5002,510..»

Project of the Year Finalist, Best Landscape/Urban Development: Little Island – Engineering News-Record

]]>

Little Island New York CityPROJECT OF THE YEAR FINALIST and BEST PROJECTOWNER: Little IslandLEAD DESIGN FIRM: Heatherwick StudioGENERAL CONTRACTOR: Hunter Roberts Construction GroupCIVIL, STRUCTURAL AND MEP ENGINEER: ArupLANDSCAPE ARCHITECT: Mathews Nielsen Landscape Architects P.C.PRECAST CONTRACTOR: Fort Miller GroupMARINE CONTRACTORS: Weeks Marine and Trevcon ConstructionMARINE ENGINEER: Mueser Rutledge Consulting EngineersLIGHTING DESIGNER: Fisher Marantz Stone

Theres plenty of function to go with the unique form of this park situated on top of the Hudson River. Green urban space in Manhattan is such an incredibly precious thing that when you have the opportunity to build new park space, it should behave like a Swiss Army knife, says Mat Cash, partner and group leader at Heatherwick Studios, lead design firm for Little Island, which resembles a giant field of cement tulips growing out of the river.

Photo by Michael Grimm

The 2.4-acre public park, funded by the Diller-von Furstenberg Family Foundation, boasts trees, plants and other greenery growing out of flower-shaped pots. There also are walking paths, rolling hills, open lawns, a 700-seat amphitheater, an open plaza, a flat pier beneath the pots and other amenities. The park arrived at its May 2021 opening thanks to a feat of team coordination, innovations in design technology and use of the river itself as a crucial mode of transport. One Best Projects judge noted: The West Side was in need of more public space, and this is a wonderful addition.

Photo by Michael Grimm

The obvious challenge was how to fabricate, assemble and erect the pots with complex geometry onto the precast piles driven into the river, engineer Arup said in its submission. Heatherwick used its London workshops to mock up and test elements like slope angles and jointing widths between each structural pot. Cash says using a Cairo pentagon design helped simplify the geometry.

Photo by Michael Grimm

The architect developed the geometry in scripts, which were given to the engineer to create structural precast elements and connecting steel elements using 3D models. Digital models were sent to the fabricator for computer numerical control, milling of foamworks, rebar bending and laser cutting of steel connection plates.

Photo by Michael Grimm

Concrete precaster Fort Miller Group established an in-house company for the advanced, large scale foam milling used to form the pots. Apparently, they were told that the concept was crazy and not fit for a precast, president Scott D. Harrigan previously told ENR. Arup principal David Farnsworth says foam models were folded into correct shapes basically like origami, then cast into concrete. The submission says assembled pots were moved to the site via river barge and erected onto each pile using a large barge crane. Piles were driven with a fixed lead system with GPS equipment on leads and using traditional survey methods.

Photo by Michael Grimm

While the 132 pots dominate the park, each of its trees was carefully selected, with the team developing and periodically testing custom planting soil blends. The construction schedule was coordinated around planting seasons to insure the flora thrived. The team worked to achieve ADA compliance on pathways set on extensive geography. Site railings made of red brass with a pre-patina finish were fabricated to align with the curvilinear pathways. All wooden elements, such as black locust stair treads, were harvested and dried to a certain moisture content to minimize warping.

Photo by Michael Grimm

Cash praises the team collaboration, as did the family foundation. It was extraordinary to work with the exceptional design and engineering teams that made this unique park vision a reality, the organization said in a statement to ENR. In endeavoring to pursue outcomes never before achieved, we pushed the boundaries of what is possible for all of us.

Photo by Michael Grimm

Photo by Michael Grimm

See the original post:

Project of the Year Finalist, Best Landscape/Urban Development: Little Island - Engineering News-Record

Read More..

Purdue University Northwest engineering student part of team that won national packaging competition Northwest Indiana Business Magazine – Northwest…

Efforts by Purdue University Northwest student Andrew Smith has shined a national spotlight on the Region.

Smith, a mechatronics engineering technology student at PNW, was part of a three-student team that won the 2021 Amazing Packaging Race at the annual Pack Expo trade show in Las Vegas, presented by the Packaging Machinery Manufacturers Institute. Smith, a fourth-year student at PNW, along with teammates Anna Troutt of Virginia Tech and Serena Pu of California Polytechnic State University, completed a series of challenges across four exhibit halls, which landed them a $3,000 prize.

My teammates and I were really excited when our team was announced as the winners, said Smith of Griffith who led the team. The way we scored points throughout the race was by posting every single task we completed to Twitter. We would take a picture with the company and post it along with a thank you message which scored us extra points.

The competition required competing teams to search the exhibit halls to find the 10 booths with specific tasks to be completed by each team. Tasks included completing math problems related to packaging, executing functionality of a companys machine or learning about a companys machines and services and then answering related questions.

We try to close the gap between education and the working environment, said Maged Mikhail, associate professor of mechatronics engineering technology at PNW. Connecting our students to industry by having them attend the Pack Expo and participate in the competition shows them they are capable of solving manufacturing and packaging problems.

The mechatronics engineering technology program at PNW is a hybrid degree program that combines mechanical and electrical engineering technology with computer science.

PNWs collaboration with the Packaging Machinery Manufacturers Institute allows students to take part in industry-led conferences, seminars and trainings, including paying the students expenses to attend the Pack Expo and participate in the competition. The Pack Expo is an annual trade show that connects consumer goods companies with manufacturing solutions in packaging and processing, this year drawing 1,500 exhibitors and 23,000 attendees.

Larry is an award-winning journalist with more than 25 years of experience working with daily newspapers and business-to-business publications around the Midwest. Avila is a Michigan native and a graduate of Central Michigan University.

See original here:

Purdue University Northwest engineering student part of team that won national packaging competition Northwest Indiana Business Magazine - Northwest...

Read More..

Noninvasive brain biopsy shows improved sensitivity in tumor detection – The Source – Washington University in St. Louis Newsroom

Glioblastomas are aggressive brain tumors that are commonly diagnosed through a risky and invasive surgical biopsy. A team of researchers led by Hong Chen at Washington University in St. Louis has developed a noninvasive diagnostic method that may one day replace the tissue biopsy with a simple blood test.

Chen, associate professor of biomedical engineering at the McKelvey School of Engineering and of radiation oncology in the School of Medicine; Eric Leuthardt, MD, professor of neurosurgery at the School of Medicine and of biomedical engineering at McKelvey Engineering; and the team tested the method in both small and large animal models and found significantly improved detection and diagnostic sensitivity for brain tumors via a simple blood sample. Results of the study are published online in the journalTheranostics,Nov. 10.

The method, known as sonobiopsy,uses focused ultrasound to target tumors deep in the brain. Once located, the researchers inject microbubbles into the blood that travel to the ultrasound-targeted tissue and pulsate, which safely opens the blood-brain barrier. The temporary openings allow biomarkers, such as DNA, RNA and proteins, from the tumor to pass through the blood-brain barrier and release into the blood.

Chen, Leuthardt and the team have been working on their focused ultrasound-enabled liquid biopsy (sonobiopsy) method for several years, first conducting a feasibility study in mice, followed by a safety evaluation study, and most recently, another study in pigs. While blood-based liquid biopsy has been used in human patients with other cancers for personalized medicine, progress in extending the method to human brain cancer has been limited.

In the new research, the team, including Christopher Pacia, first author and a biomedical engineering doctoral student in the Chen ultrasound lab, found that the sonobiopsy method boosted detection of genes highly expressed in the mouse model of glioblastoma, EGFRvIII. The DNA levels of EGFRvIII circulating in the bloodstream of the group that underwent sonobiopsy was 920 times greater than the group that underwent conventional blood-based liquid biopsy. Further, detection of another circulating tumor genetic marker, TERT C228T ctDNA, was 10-fold higher after sonobiopsy. In addition, the method improved diagnostic sensitivity from 7.14% to 64.71% for EGFRvIII and from 14.29% to 45.83% for TERT C228T. The team found no increase in tissue damage in the tumor region of interest after the sonobiopsy.

In the pig model, sonobiopsy boosted detection of EGFRvIII ctDNA by 270-fold and increased levels of TERT ctDNA nine-fold. It improved diagnostic sensitivity from 28.57% to 100% for EGFRvIII and from 42.86% to 71.43% for TERT C228T. No significant tissue damage was found.

Our study showed that sonobiopsy enriched tumor-specific ctDNA in the plasma and improved the detection sensitivity for two glioblastoma phenotypes without posing significant safety risks, Chen said. The integration of sonobiopsy with advanced blood analysis assays has the promise to provide minimally invasive, spatiotemporal-controlled and sensitive diagnosis of brain cancer.

This work is a collaborative effort involving members from both engineering and medical schools, including Leuthardt, chief of the Division of Neurotechnology and of theCenter for Innovation in Neuroscience and Technology and professor of neurosurgery and of neuroscience at the School of Medicine, as well as of biomedical engineering and of mechanical engineering and applied science at the McKelvey School of Engineering.

Besides neuroimaging and surgically-acquired tissue for pathology and molecular profiling, sonobiopsy has the potential to become the third pillar for brain tumor management by substantially advancing brain cancer diagnosis, treatment monitoring, and recurrence detection, Leuthardt said.

This enhanced capability could have an important impact throughout the continuum of patient care.

Funding for this research was provided by the National Institutes of Health (R01EB027223, R01EB030102, and R01MH116981). C.P.P was supported by the NIH T32NS115672.

The McKelvey School of Engineering at Washington University in St. Louis promotes independent inquiry and education with an emphasis on scientific excellence, innovation and collaboration without boundaries. McKelvey Engineering has top-ranked research and graduate programs across departments, particularly in biomedical engineering, environmental engineering and computing, and has one of the most selective undergraduate programs in the country. With 140 full-time faculty, 1,387 undergraduate students, 1,448 graduate students and 21,000 living alumni, we are working to solve some of societys greatest challenges; to prepare students to become leaders and innovate throughout their careers; and to be a catalyst of economic development for the St. Louis region and beyond.

Go here to read the rest:

Noninvasive brain biopsy shows improved sensitivity in tumor detection - The Source - Washington University in St. Louis Newsroom

Read More..

BRANDON WEBSTER joins Method Engineering Group | Construction & Building | savannahbusinessjournal.com – Savannah Business Journal

November 15, 2021 - Method Engineering Group recently announced that Brandon Webster has joined its team of engineering professionals.

Webster, a registered professional engineer, joins Method Engineering Group as a project manager. He has a Bachelor of Science Degree in Mechanical Engineering from the Georgia Institute of Technology. In this position, Webster will join his previous co-workers and current firm principals Christopher Shaffer and Andrew McKeever to assist in the design and project management of multiple projects throughout the Southeast.

This position is a great opportunity to expand on the engineering and project management skills I have acquired over the past 7 years, Webster said. Method Engineering Group is a growing company in the Savannah area with a unique work environment that strives for client satisfaction. I look forward to being part of the growing team and I am excited for the new opportunity.

Brandon is married to Ashley, who is a Registered Nurse and studying to become a Nurse Practitioner. In his spare time, Brandon can be found working at his family Christmas tree farm in Darien, Georgia. Brandon is also a licensed private pilot and enjoys golfing and traveling.

Webster is a currently licensed in Georgia and South Carolina. He has extensive experience in K-12 education, higher education, multifamily, and hospitality building design. He has a strong understanding of HVAC, plumbing, and fire protection design principles for commercial buildings.

Brandon is a great addition to the Method Engineering team, said firm principal Andrew McKeever. We are familiar with his strong work ethic and his knowledge of mechanical engineering systems. He will help us deliver thoughtful engineering designs for our architecture and building-owner clients.

Were excited to welcome Brandon to our team, said firm principal Chris Shaffer. We know his talents will help us grow our reputation to provide exceptional engineering while using the latest design software.

Method Engineering Group is a consulting engineering firm focused on providing MEP engineering solutions for architects and building owners. Founded in Savannah, Georgia in 2019, Method Engineering Group specializes in the design of mechanical, electrical, and plumbing systems for new and renovated buildings. Additional services include fire protection design, communication system design, and sustainability consulting. Method Engineering Group offers engineering design services in 7 states, including Georgia, South Carolina, and Florida. For more information or to contact Method Engineering Group, call 912-963-1611, or visit http://www.methodeg.com.

More:

BRANDON WEBSTER joins Method Engineering Group | Construction & Building | savannahbusinessjournal.com - Savannah Business Journal

Read More..

Sadbhav Engineering reports consolidated net loss of Rs 64.49 crore in the September 2021 quarter – Business Standard

Sales decline 37.76% to Rs 336.53 crore

Powered by Capital Market - Live News

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Mon, November 15 2021. 15:53 IST

See the rest here:

Sadbhav Engineering reports consolidated net loss of Rs 64.49 crore in the September 2021 quarter - Business Standard

Read More..

WhatsApp starts rolling out end-to-end encryption for …

WhatsApp currently provides end-to-end encryption for chats that means nobody apart from the sender and receiver can access the chats, not even WhatsApp and Facebook.

WhatsApp has been long rumoured to be testing end-to-end encryption for cloud back-ups. This means that WhatsApp will now protect that chats that are backed up in Google Drive and iCloud. As per the latest reports, WhatsApp has already started rolling out end-to-end encryption for iOS and Android beta testers. WhatsApp currently provides end-to-end encryption for chats that means nobody apart from the sender and receiver can access the chats, not even WhatsApp and Facebook. Soon the feature will be enabled for the chat backups.

As per wabetainfo report, WhatsApp is rolling out the possibility to encrypt your backup using end-to-end encryption. If you enable end-to-end encryption, you will be able to secure your backup on iCloud from unauthorized access. WhatsApp was first spotted testing the feature on the iOS beta app. The messaging app was also testing a similar feature for the Android beta app as well. The report states that when your chat backup is end-to-end encrypted, not even WhatsApp, Facebook and Apple can read the content because its encrypted using a password or a 64-digit encryption key.

In order to protect your backup using end-to-end encryption, you can choose a personal password or a 64-bit encryption key. Note that WhatsApp cannot help you to restore your chat history from an encrypted backup if you lose the password, so be sure to save it in a safe place. If the feature is not enabled for your WhatsApp account, the next beta updates should help you to receive the feature, the report noted.

The screenshots reveal that the end-to-end encryption would be an opt-in feature in both iOS snd Android. Meaning, you will have to manually enable the feature to safeguard your chat backups from unauthorised access. To enable the feature, you can go to WhatsApp Settings > Chats > Chat Backup > End-to-end Encrypted Backup. WhatsApp is currently rolling out the feature for selected users only, if you do not find the end-to-end encryption option yet, you may get it in future updates if you are a beta tester.

Click here for IndiaToday.ins complete coverage of the coronavirus pandemic.

Visit link:
WhatsApp starts rolling out end-to-end encryption for ...

Read More..

Thrio Reduces Risk of Data Loss with Global Redaction and Encryption – WFMZ Allentown

CALABASAS, Calif., Nov. 15, 2021 /PRNewswire-PRWeb/ --Thrio, Inc., maker of award-winning cloud contact center software, announced today the launch of ThrioRedact, a new feature to help reduce the risk of personally identifiable information falling into the wrong hands. This AI-powered data loss prevention capability automatically finds and redacts PII (Personally Identifiable Information) in customer-facing interactions of all types, across voice and digital channels. ThrioRedact goes a step further than standard DLP and encrypts PII at every stage and in every state, including in-memory buffers. ThrioRedact is built into Thrio, so implementing a more secure solution has never been easier to deploy. ThrioRedact Data Loss Protection is PCI and GDPR-compliant and supports global enterprise compliance efforts.

With ThrioRedact, customers can:

"We are pleased to help bring peace of mind to retail services providers, insurance companies, health care providers, and other enterprises who deal with sensitive data as part of their business," said Ran Ezerzer, Thrio Chief Technology Officer. "With ThrioRedact, enterprises can effectively reduce reputational and financial risk in their contact center operations easier and more cost-effectively than ever.

"Thrio is encrypting and applying DLP to all facets of communication from end to end. Thrio builds a digital fence around any PII, regardless of how it comes into the contact center. We see ThrioRedact as a great way to further protect sensitive interactions across the board."

About Thrio, Inc.

Thrio's groundbreaking CCaaS platform features robotic process automation, inbound and outbound voice engines, a complete suite of digital channels (email, chat, SMS, social), and a range of built in AI tools. Thrio offers an API-first architecture and array of security certifications that make it a strong choice for complex and high-volume environments. Thrio's team of contact center experts develop and market cutting edge technology that sets a new standard for reliability in contact centers. To learn more, please visit http://www.thrio.com.

Thrio Contact:

Lance Fried, Chief Marketing Officer, 858-248-0098 Lance.Fried@Thrio.com

Media Contact

Lance Fried, Thrio, Inc., +1 (858) 248-0098, Lance.Fried@Thrio.com

SOURCE Thrio, Inc.

Excerpt from:
Thrio Reduces Risk of Data Loss with Global Redaction and Encryption - WFMZ Allentown

Read More..

Quantum Xchange Collaborates with Thales to Enable Quantum-Safe Key Delivery Across Any Distance, Over Any Network Media – Yahoo Finance

Thales High Speed Encryptors Combined with Phio TX Offers Immediate Quantum-Resistant Network Security for Protecting Data in Motion with No Limitations

BETHESDA, Md., Nov. 15, 2021 /PRNewswire/ -- Quantum Xchange, delivering the future of encryption with its leading-edge key distribution platform has collaborated with Thales to offer immediate quantum-safe and crypto-agile key delivery capabilities. The resulting quantum-resistant network solution enables end-users to future-proof the security of their data and communications networks; overcome the vulnerabilities of present-day encryption techniques, e.g., keys and data traveling together; and protect against man-in-the-middle, harvesting, and future quantum attacks.

Quantum (PRNewsfoto/Quantum Xchange)

Quantum Xchange's groundbreaking out-of-band symmetric key delivery system, Phio Trusted Xchange (TX), is a simple architecture overlay that works in tandem with conventional encryption systems, in this instance Thales High Speed Encryptors (HSEs), and any TCP/IP connection (wireless, copper, satellite, fiber) to decouple key generation and delivery from data transmissions. With Phio TX a second, quantum-enhanced encryption key is sent down a separate quantum-protected tunnel and mesh network to multiple transmission points. This presents an attacker with the enormous challenge of having to defeat the combined security of Key Encrypting Key (KEK) where a second key is in play and sent independently of the data path. Continuous key rotation takes place on every transfer, further heightening the system's security today and in the quantum future.

Phio TX embraces crypto agility, supporting quantum keys generated from any source, i.e., Quantum Key Distribution (QKD), Quantum Random Number Generator (QRNG), or a combination, and all Post-Quantum Cryptographic (PQC) candidate algorithms being evaluated by the National Institute of Standards and Technology (NIST) scheduled for standardization by 2022. The FIPS-validated network security appliance also meets the European Telecommunication Standards Institute (ETSI) protocol for QKD. With Phio TX, users can start with PQC, then easily scale to QKD protection levels with no interruptions to their underlying infrastructure and no network downtime.

Story continues

"Phio TX used in combination with Thales High Speed Encryptors (HSEs) arm customers with a powerful, enterprise security solution capable of making native encryption keys immediately quantum resistant," said Eddy Zervigon, CEO of Quantum Xchange. "The standards-based solution can easily meet the risk mitigation needs of a business at any time and delivers an infinitely stronger cybersecurity posture to any network environment."

"Quantum computing will be one of the biggest technological achievements in recent memory, but it comes with a lot of security risks," said Todd Moore, Vice President Encryption Products at Thales. "While there is no such thing as a silver bullet when it comes to cybersecurity, deploying crypto-agile systems, or those with the ability to update cryptographic algorithms, keys and certificates quickly in response to advances in cyber-attacks is the next frontier in protection against the emerging threats. Today Thales is enabling businesses to deploy security algorithms in a flexible way that include quantum-resistant algorithms that provide mitigation techniques to the current and future security risks presented by the evolution of quantum computing. NIST is currently selecting finalists amongst the quantum-safe encryption algorithms being developed. In anticipation of this, Thales already supports the current finalists including Thales' Falcon algorithm."

To learn more about the key advantages and features of Thales network encryption solutions with Phio TX, download the solutions brief here.

About Quantum XchangeQuantum Xchange gives commercial enterprises and government agencies the ultimate solution for protecting data in motion today and in the quantum future. Its award-winning out-of-band symmetric key distribution system, Phio Trusted Xchange (TX), is uniquely capable of making existing encryption environments quantum safe and supports both post-quantum crypto (PQC) and Quantum Key Distribution (QKD). Only by decoupling key generation and delivery from data transmissions can organizations achieve true crypto agility and quantum readiness with no interruptions to underlying infrastructure or business operations. To learn more about future-proofing your data from whatever threat awaits, visit QuantumXC.com or follow us on Twitter @Quantum_Xchange #BeQuantumSafe.

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/quantum-xchange-collaborates-with-thales-to-enable-quantum-safe-key-delivery-across-any-distance-over-any-network-media-301424239.html

SOURCE Quantum Xchange

Read the original here:
Quantum Xchange Collaborates with Thales to Enable Quantum-Safe Key Delivery Across Any Distance, Over Any Network Media - Yahoo Finance

Read More..

Hacking group says it has found encryption keys needed to unlock the PS5 [Updated] – Ars Technica

Enlarge / Decrypting the PS5 kernel doesn't involve opening the hardware like this, but it still serves as a good visual metaphor for how the system is now being "exposed."

Hacking group Fail0verflow announced Sunday evening that it had obtained the encryption "root keys" for the PlayStation 5, an important first step in any effort to unlock the system and allow users to run homebrew software.

The tweeted announcement includes an image of what appears to be the PS5's decrypted firmware files, highlighting code that references the system's "secure loader." Analyzing that decrypted firmware could let Fail0verflow (or other hackers) reverse engineer the code and create custom firmware with the ability to load homebrew PS5 software (signed by those same symmetric keys to get the PS5 to recognize them as authentic).

[Update (Nov. 9): Aside from the symmetric encryption/decryption keys that have apparently been discovered, separate asymmetric keys are needed to validate any homebrew software to be seen as authentic by the system. The private portion of those authentication keys does not seem to have been uncovered yet, and probably won't be found on the system itself. Still, the symmetric keys in question should prove useful for enabling further analysis of the PS5 system software and discovering other exploits that could lead to the execution of unsigned code. Ars regrets the error.]

Extracting the PS5's system software and installing a replacement both require some sort of exploit that provides read and/or write access to the PS5's usually secure kernel. Fail0verflow's post does not detail the exploit the group used, but the tweet says the keys were "obtained from software," suggesting the group didn't need to make any modifications to the hardware itself.

Separately this weekend, well-known PlayStation hacker theFlow0 tweeted a screenshot showing a "Debug Settings" option amid the usual list of PS5 settings. As console-hacking news site Wololo explains, this debug setting was previously only seen on development hardware, where the GUI looks significantly different. But TheFlow0's tweet appears to come from the built-in sharing function of a retail PS5, suggesting he has also used an exploit to enable the internal flags that unlock the mode on standard consumer hardware.

TheFlow0 adds that he has "no plans for disclosure" of his PS5 exploit at this point. In recent years, TheFlow0 has taken part in Sony bug-bounty programs that reward the responsible disclosure of security flaws in PlayStation hardware.

It remains to be seen if and when similar exploits for the PS5 will become public and if Sony will be able to temporarily cut them off with firmware updates as it has in the past.

Read the original here:
Hacking group says it has found encryption keys needed to unlock the PS5 [Updated] - Ars Technica

Read More..

When it comes to securing systems against quantum computers, there is no one-size-fits-all solution – Help Net Security

Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been leading an effort to define new cryptographic algorithms that will withstand attacks from quantum computers.

NIST started this process in 2015. Beginning with almost 70 candidate algorithms, NIST narrowed the field down to a set of finalists over 3 selection rounds. We now have a well-defined set of algorithms that are potential replacements to the currently used algorithms. Implementations of each finalist are available. NIST is expected to announce the initial set of algorithms to be standardized within just a few months.

With implementations of the finalist algorithms available and standards forthcoming, companies will begin in earnest to migrate from classical crypto solutions to the new post-quantum crypto (PQC) algorithms. As companies begin this process, some of the questions they must answer are: where are hardware implementations required, and where are software implementations sufficient?

Migration to PQC algorithms is a major undertaking. Digital certificates using RSA or ECC encryption are used to provide identities and enable secure communication for everything from websites, DevOps processes, credit cards, and cloud services to connected vehicles, IoT devices, electronic passports, document signing, and secure email. Use of ECC and RSA encryption is pervasive; all systems using RSA and ECC encryption will need to be updated to use the new PQC algorithms.

Many large enterprises are already planning for this migration. Some have created a Crypto Center of Excellence or similarly named group to lead this effort. Due to the number of systems requiring updates, and the interdependencies of these systems, this will be a large, multi-year project for most enterprises.

For most enterprises the first step is cataloguing their systems using encryption. Next, companies must determine the risk associated with each system. They can then begin developing a roadmap for migration to PQC.

As part of this process, companies need to identify the details of crypto implementations, including:

Once this information is available, a roadmap to update crypto components can be developed. RSA and ECC encryption are frequently used for secure communication, so companies must take into consideration dependencies between systems and devices. If one device is updated, but the systems it communicates with are not, the devices will either fail to communicate or will revert to using classical crypto until all devices are updated.

With a full inventory of systems using cryptography in hand including details on algorithms, crypto libraries and hardware accelerators used they can begin planning to migrate to PQC. Planning must take into consideration where systems are sourced and what systems are internally controlled vs. externally controlled. Many enterprise systems include hardware and software components developed by third-party vendors. The process of upgrading will require coordination across the entire supply chain.

Crypto implementations may be built into many different layers of the technology stack. Hardware platforms often include crypto acceleration and hardware-based secure key storage. The operating system may utilize the hardware crypto primitives but may also include a crypto library. Furthermore, applications may include their own crypto libraries.

On systems with multiple applications, several crypto implementations may be present and each needs to be updated. Furthermore, these systems rely on digital certificates issued by a PKI system or certificate authority that must also be updated. Migration to PQC algorithms requires all these systems to be updated in a coordinated fashion.

In addition to supply chain considerations, organizations need to address interoperability with partners, customers, and third-party service providers. These systems will also require updating, and these updates must be coordinated to ensure ongoing compatibility.

It should be clear by now that migration of existing systems to PQC algorithms requires significant coordination between internal software development groups, vendors, partners, and customers. For each system, both internal and external, it is important to determine where the crypto algorithms should be implemented. Should software-based crypto libraries be used? Or is there a need for hardware-based crypto primitives?

It will be no surprise, there is no one-size-fits-all answer to this question.

For many systems, initial migration to PQC will require use of software libraries with PQC algorithms implemented in software. This is the fastest upgrade path. It will allow independent upgrades to software applications, without dependency on new hardware or operating systems. Given the complex set of dependencies, this is a necessary step.

Starting with software-based PQC reduces dependencies on long hardware design lifecycles and hardware update schedules. New hardware designs generally take 12-24 months. Even if companies are starting now, platforms will not support PQC algorithms in hardware for at least a year or two. Once new hardware designs are available, companies will need to plan the rollout of new hardware. Generally, companies cannot afford to replace all hardware systems at once.

Once hardware support for PQC becomes available, companies can begin migrating to hardware-based PQC, but it will take years to replace all platforms with new systems providing PQC in hardware. Software-based PQC solutions provide a critical migration path.

The flip side of this argument, however, is that hardware-based support for crypto implementations provides a greater level of security than software-based systems. Current security best practices rely on using a crypto co-processor such as a TPM chip, Secure Element, or HSM to perform security critical operations. This allows isolation of cryptographic keys in hardware that cannot be accessed by application code; protecting them, even if the device is compromised by a cyberattack. These crypto processors also provide countermeasures to side-channel attacks.

The use of hardware-based security for PQC implementations is particularly important when you consider the threat landscape for PQC. PQC is needed to protect systems from attacks using quantum computers to break encryption. Quantum computing technology is rapidly advancing but is still in the early stages of development.

For the foreseeable future, quantum computing will remain the province of very large corporations and nation-states. This will change over time, but early adopters of PQC are companies and systems that include nation-state actors in their threat model.

Nation-state actors have extremely deep pockets and sophisticated capabilities to carry out cyberattacks. They often have access to zero-day vulnerabilities allowing them to defeat software-based security solutions and penetrating security perimeters. As a result, they can often install malware on target adversaries computing devices. With malware on a target computer, nation-states can monitor any operations performed in software, including crypto operations.

In this manner, they can discover crypto keys even on systems using PQC. While they have not defeated the PQC algorithms, they would be able to defeat the overall security solution. This is akin to a robber getting hired by a bank as a trusted employee and then stealing the vault codes. The robber may not have cracked the safe, but is still able to gain access to its contents.

RSA and ECC-based encryption systems started with software-based implementations. Over time, hardware security co-processors, security elements, and TPM chips have become increasingly cost effective and widely available, allowing a migration to hardware-based crypto. Security critical systems were early adopters of these hardware-based security solutions.

PQC algorithms will follow a similar path. Companies are beginning to invest in hardware-based crypto for securing critical systems. Over time, hardware-based solutions will become cost effective and be widely adopted for PQC. For security-critical applications, companies can begin implementing hardware-based PQC now.

See original here:
When it comes to securing systems against quantum computers, there is no one-size-fits-all solution - Help Net Security

Read More..