Mandiant: Cyberextortion schemes increasing pressure to pay – TechTarget

SAN FRANCISCO -- Enterprises are facing multilayered cyberextortion campaigns that combine data theft, public shaming and system encryption, which are increasing the pressure on victims to pay ransoms.

During an RSA Conference 2022 session Wednesday, David Wong, vice president at Mandiant, and Nick Bennett, vice president of professional services at Mandiant, provided case studies and anecdotal data that compared the outcomes of two clients that each suffered a ransomware attack and various cyberextortion attempts. While one client was more prepared to deal with a successful attack than the other, the examples highlighted an increasing persistence from attackers that pays off if the victim is ill-equipped.

Bennett highlighted some of the newer cyberextortion tactics that ransomware gangs and cybercriminals are using to pressure victims to pay. Encrypting data and demanding payments for decryption keys is only one of the tactics used by threat actors, he said.

"We see them reaching out directly to the victim's customers and antagonizing those customers," Bennett said. "We see them reaching out to the media to get more heat on the victim. We see them sometimes even reaching out to regulators that have jurisdiction over the victims."

The first case study involved a company that had relative success, despite it being the client's first incident response situation, because of some key factors in place. The client had implemented multifactor authentication across all remote access technologies, kept aggregated logs, understood its Active Directory environment, was ready to issue public statements and had a clear plan of whom to contact during all attack stages.

Bennett said that enabled Mandiant to react more swiftly and effectively in its incident response investigation.

"The client's team was confident, they were motivated, and importantly, they were authorized by leadership to make decisions and execute," Bennett said during the session.

On the other hand, the second client did not have confidence in bringing its environment back online, Bennett noted. The company was also worried about encryption starting again and feared public leaking of its data. Overall, the client just wanted to get the attacker to back down. Subsequently, Bennett said, it ended up paying a hefty ransom in the million-dollar range.

Wong also provided an example of an incident response case where the company had a policy against paying. While he said Mandiant agrees with that approach, sometimes they start ransom negotiations with the threat actor to stall and gain additional information on the attack, with no intention of paying. However, this company refused to engage in negotiations at all.

In return, the threat actor got nervous and followed through with posting the company's data on a public leak site, Wong said. That alerted the victim's customers, which caused further problems.

"The attacker started DDoS campaigns, they started calling customers because of that multifaceted extortion ransomware attack where they keep trying to put pressure on you, and you don't have much time to respond because you didn't prepare, and now you've got customers calling you," Wong said. "You need to think about those types of strategies, and it's not anything the IT can do -- it's your lawyers, communication teams and the business folks."

Another factor that is contributing to paying ransoms is cyber insurance, both from a company standpoint as well as incentives for attackers. Wong said that although it's an unpopular opinion, sometimes if companies are insured for ransomware coverage, they will pay because it has little effect on their bottom line.

Payal Chakravarty, head of product at cyber insurance company Coalition, echoed that sentiment in an interview with SearchSecurity. Some companies have become confident that if something happens, they will be covered.

"A few customers say, 'Why are you bothering to alert me, you've got me covered,' or 'I have insurance, so why are you telling me to fix things?'" Chakravarty said. "Additionally, if attackers know you're insured, they'll attack you because there's a higher chance of paying it."

Mandiant also addressed a problem stemming from alerts. In both incident response scenarios detailed during the presentation, Bennett said, the victims were equipped with endpoint security tools that identified credential harvesting and issued an alert. However, the human expertise was lacking.

Bennett said there's often failure in the analyst being able to see the alert, understand the full context and piece it together as part of a more significant event.

Chakravarty has observed similar problems with responses to alerts. In some cases, they are ignored, she said. Other times, there are too many people to loop in, or the person who received the alerts no longer works for that company.

"Recently we started tracking preventability, and almost 50% to 60% of ransomware cases are preventable if they had responded [to alerts]," Chakravarty said.

When Mandiant clients do pay, Wong said, nearly 100% do not attempt to recover the funds, even when law enforcement offers to do so. Several reasons contribute to that decision, including cyber insurance and potential attack reciprocation.

"You just suffered a ransomware attack and made that difficult decision to pay, and once you do, you don't really want to open that can of worms," Wong said during the session. "I do want to give law enforcement credit -- for a lot of crimes, you can follow the money and tackle the problem. But with ransomware today, if the victims aren't really trying to recover those funds, it will make it a lot harder for law enforcement, and we're going to have to tackle this in a different way."

See more here:
Mandiant: Cyberextortion schemes increasing pressure to pay - TechTarget

Using the random motion of electrons to improve cybersecurity – Help Net Security

In October 2017, Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to force all affected users to change passwords and re-encrypt their credentials. In recent years, there have been several instances of such security breaches that have left users vulnerable.

Almost everything we do on the internet is encrypted for security. The strength of this encryption depends on the quality of random number generation, says Nithin Abraham, a PhD student at the Department of Electrical Communication Engineering (ECE), Indian Institute of Science (IISc). Abraham is a part of a team led by Kausik Majumdar, Associate Professor at ECE, which has developed a true random number generator (TRNG), which can improve data encryption and provide better security for sensitive digital data such as credit card details, passwords and other personal information. The study describing this device has been published in the journal ACS Nano.

Encrypted information can be decoded only by authorised users who have access to a cryptographic key. But the key needs to be unpredictable and, therefore, randomly generated to resist hacking. Cryptographic keys are typically generated in computers using pseudorandom number generators (PRNGs), which rely on mathematical formulae or pre-programmed tables to produce numbers that appear random but are not. In contrast, a TRNG extracts random numbers from inherently random physical processes, making it more secure.

In IIScs TRNG device, random numbers are generated using the random motion of electrons. It consists of an artificial electron trap constructed by stacking atomically-thin layers of materials like black phosphorus and graphene. The current measured from the device increases when an electron is trapped, and decreases when it is released. Since electrons move in and out of the trap in a random manner, the measured current also changes randomly. The timing of this change determines the generated random number. You cannot predict exactly at what time the electron is going to enter the trap. So, there is an inherent randomness that is embedded in this process, explains Majumdar.

The performance of the device on the standard tests for cryptographic applications designed by the US National Institute of Standards and Technology (NIST) has exceeded Majumdars own expectations. When the idea first struck me, I knew it would be a good random number generator, but I didnt expect it to have a record-high min-entropy, he says.

Min-entropy is a parameter used to measure the performance of TRNGs. Its value ranges from 0 (completely predictable) to 1 (completely random). The device from Majumdars lab showed a record-high min-entropy of 0.98, a significant improvement over previously reported values, which were around 0.89. Ours is by far the highest reported min-entropy among TRNGs, says Abraham.

The teams electronic TRNG is also more compact than its clunkier counterparts that are based on optical phenomena, says Abraham. Since our device is purely electronic, millions of such devices can be created on a single chip, adds Majumdar. He and his group plan to improve the device by making it faster and developing a new fabrication process that would enable the mass production of these chips.

Continue reading here:
Using the random motion of electrons to improve cybersecurity - Help Net Security

The race toward a new computing technology is heating up and Asia is jumping on the trend – CNBC

A quantum computer in a vibration-free building. Quantum computing will ultimately speed up the computational power that drives many industries and could affect everything from drug discovery to how data is secured.

Oliver Berg | Picture Alliance | Getty Images

Quantum computing was already gathering pace in Japan and elsewhere in Asia when the University of Tokyo and IBM launched their new quantum computer last year.

The computer was the second such system built outside the United States by IBM the latest in a string of key moves in quantum research.

The university and IBM have led the Quantum Innovation Initiative Consortium alongside heavyweights of Japanese industry like Toyota and Sony all with a view to nailing the quantum question.

Quantum computing refers to the use of quantum mechanics to run calculations. Quantum computing can run multiple processes at once by using quantum bits, unlike binary bits which power traditional computing.

The new technology will ultimately speed up the computational power that drives many industries and could affect everything from drug discovery to how data is secured. Several countries are racing to get quantum computers fully operational.

Christopher Savoie, CEO of quantum computing firm Zapata, who spent much of his career in Japan, said technological development has been very U.S.-centric. But now, Asian nations don't want to be left behind on quantum computing, he added.

"Nation states like India, Japan and China are very much interested in not being the only folks without a capability there. They don't want to see the kind of hegemony that's arisen where the large cloud aggregators by and large are only US companies," Savoie said, referring to the likes of Amazon Web Services and Microsoft Azure.

China, for example, has committed a great deal of brainpower to the quantum race. Researchers have touted breakthroughs and debates are simmering over whether China has surpassed the U.S. on some fronts.

India, for its part, announced plans earlier this year to invest $1 billion in a five-year plan to develop a quantum computer in the country.

James Sanders, an analyst at S&P Global Market Intelligence, told CNBC that governments around the world have been taking more interest in quantum computing in recent years.

In March, Sanders published a report that found governments have pledged around $4.2 billion to support quantum research. Some notable examples include South Korea's $40 million investment in the field and Singapore's Ministry of Education's funding of a research center, The Center for Quantum Technologies.

All of these efforts have a long lens on the future. And for some, the benefits of quantum can seem nebulous.

According to Sanders, the benefits of quantum computing aren't going to be immediately evident for everyday consumers.

What is likely to happen is that quantum computers will wind up utilized in designing products that consumers eventually buy.

James Sanders

analyst, S&P Global Market Intelligence

"On a bad day, I'm talking people down from the idea of quantum cell phones. That's not realistic, that's not going to be a thing," he said.

"What is likely to happen is that quantum computers will wind up utilized in designing products that consumers eventually buy."

There are two major areas where quantum's breakthrough will be felt industry and defense.

A staff member of tech company Q.ant puts a chip for quantum computing in a test station in Stuttgart, Germany, on Sept. 14, 2021. It's expected that the power of quantum computing will be able to decrypt RSA encryption, one of the most common encryption methods for securing data.

Thomas Kienzle | Afp | Getty Images

"Areas where you have HPC [high-performance computing] are areas where we will be seeing quantum computers having an impact. It's things like material simulation, aerodynamic simulation, these kinds of things, very high, difficult computational problems, and then machine learning artificial intelligence," Savoie said.

In pharmaceuticals, traditional systems for calculating the behavior of drug molecules can be time-consuming. The speed of quantum computing could rapidly increase these processes around drug discovery and, ultimately, the timeline for drugs coming to market.

On the flip side, quantum could present security challenges. As computing power advances, so too does the risk to existing security methods.

"The longer-term [motivation] but the one that that everyone recognizes as an existential threat, both offensively and defensively, is the cryptography area. RSA will be eventually compromised by this," Savoie added.

RSA refers to one of the most common encryption methods for securing data, developed in 1977, that could be upended by quantum's speed. It is named after its inventors Ron Rivest, Adi Shamir and Leonard Adleman.

You're seeing a lot of interest from governments and communities that don't want to be the last people on the block to have that technology because [other nations] will be able to decrypt our messages.

Christopher Savoie

CEO of Zapata

"You're seeing a lot of interest from governments and communities that don't want to be the last people on the block to have that technology because [other nations] will be able to decrypt our messages," Savoie said.

Magda Lilia Chelly, chief information security officer at Singaporean cybersecurity firm Responsible Cyber, told CNBC that there needs to be a twin track of encryption and quantum research and development so that security isn't outpaced.

"Some experts believe that quantum computers will eventually be able to break all forms of encryption, while others believe that new and more sophisticated forms of encryption will be developed that cannot be broken by quantum computers," Chelly said.

A quantum processor on a prototype of a quantum computer. There needs to be a twin track of encryption and quantum research and development so that security isn't outpaced, said Magda Lilia Chelly, chief information security officer at Singaporean cybersecurity firm Responsible Cyber.

Julian Stratenschulte/dpa | Picture Alliance | Getty Images

"In particular, [researchers] have been looking at ways to use quantum computers to factor large numbers quickly. This is important because many of the modern encryption schemes used today rely on the fact that it is very difficult to factor large numbers," she added.

If successful, this would make it possible to break most current encryption schemes, making it possible to unlock messages that are encrypted.

Sanders said the development and eventual commercialization of quantum computing will not be a straight line.

Issues like the threat to encryption can garner attention from governments, but research and breakthroughs, as well as mainstream interest, can be "stop-start," he said.

Progress can also be affected by fluctuating interest of private investors as quantum computing won't deliver a quick return on investment.

"There are a lot of situations in this industry where you might have a lead for a week and then another company will come out with another type of the advancement and then everything will go quiet for a little bit."

Another looming challenge for quantum research is finding the right talent with specific skills for this research.

"Quantum scientists that can do quantum computing don't grow on trees," Savoie said, adding that cross-border collaboration is necessary in the face of competing government interests.

"Talent is global. People don't get to choose what country they're born in or what nationality they have."

Visit link:
The race toward a new computing technology is heating up and Asia is jumping on the trend - CNBC

What is the Orca PT-1 computer and how does quantum computing work? – The National

Britain's Ministry of Defence said on Thursday it will work with UK tech firm Orca Computing to investigate the scope to apply quantum technology in defence.

Here, The National explains what quantum computing is and why the UK MoD has agreed to work with Orca.

The pioneer of quantum computing was Paul Benioff of Argonne National Labs, who in 1984 theorised the possibility of designing a computer based exclusively on quantum theory.

In the most simple of terms, quantum computing is extremely high-performance computing so high performing it has the potential revolutionise global industry.

Normal computers process data in bits which have a binary value of zero or one. Quantum computers, by contrast, can process digits simultaneously using a two-state unit called a qubit.

This means that quantum computers have far greater processing power than their regular counterparts.

This extra processing power comes at a heady cost. Quantum computing firm SEECQ says "a single qubit costs around $10,000 and needs to be supported by a host of microwave controller electronics, coaxial cabling and other materials that require large controlled rooms in order to function".

It estimates that in terms of pure hardware, "a useful quantum computer costs tens of billions of dollars to build".

Orca Computing is a 2-year-old UK company that is seeking to scale and integrate quantum computers with real-world technology.

This is a challenge, as qubits must be kept at extremely old temperatures or they will become unstable.

However, Orca says it has found an alternative to conventional quantum computing whereby its software allows small-scale photonic processors to use single units of light to power the process at room temperature.

Investors have been persuaded by Orca's Series A funding round, raising $15 million and attracting investment from the likes of Octopus Ventures, Oxford Science Enterprises, Quantonation and Verve Ventures.

The UK's MoD is also seemingly persuaded by Orca's proposition, having agreed to work in concert with the firm to develop future data-processing capabilities, using Orca's small PT-1 quantum computer.

"Our partnership with MoD gives us the type of hands-on, close interaction, working with real hardware which will help us to jointly discover new applications of this revolutionary new technology," said Richard Murray, chief executive of Orca Computing.

Stephen Till, of the MoD's science and technology lab, said access to the PT-1 would accelerate his ministry's understanding of the technology.

"We expect the Orca system to provide significantly improved latency the speed at which we can read and write to the quantum computer," he said.

Updated: June 09, 2022, 4:04 PM

Read this article:
What is the Orca PT-1 computer and how does quantum computing work? - The National

What’s So Great About Quantum Computing? A Q&A with NIST Theorist Alexey Gorshkov – HPCwire

The following is a Q&A originally published on Taking Measure, the official blog of the National Institute of Standards and Technology (NIST). Photo credit: NIST.

As the rise of quantum computers becomes the subject of more and more news articles especially those that prophesy these devices ability to crack the encryption that protects secure messages, such as our bank transfers its illuminating to speak with one of the quantum experts who is actually developing the ideas behind these as-yet-unrealized machines. Whereas ordinary computers work with bits of data that can be either 0 or 1, quantum computers work with bits called qubits that can be 0 and 1 simultaneously, enabling them to perform certain functions exponentially faster, such as trying out the different keys that can break encryption.

Simple quantum computers already exist, but it has been extremely challenging to build powerful versions of them. Thats because the quantum world is so delicate; the tiniest disturbances from the outside world, such as stray electrical signals, can cause a quantum computer to crash before it can carry out useful calculations.

National Institute of Standards and Technology (NIST) public affairs specialist Chad Boutin interviewed Alexey Gorshkov, a NIST theorist at NIST/University of MarylandsJoint Center for Quantum Information and Computer Science(QuICS) andJoint Quantum Institute, who works at the intersection of physics and computer science research. His efforts are helping in the design of quantum computers, revealing what capabilities they might possess, and showing why we all should be excited about their creation.

We all hear about quantum computers and how many research groups around the world are trying to help build them. What has your theoretical work helped clarify about what they can do and how?

I work on ideas for quantum computer hardware. Quantum computers will be different from the classical computers we all know, and they will use memory units called qubits. One thing I do is propose ideas for various qubit systems made up of different materials, such as neutral atoms. I also talk about how to make logic gates, and how to connect qubits into a big computer.

Another thing my group does is propose quantum algorithms: software that one can potentially run on a quantum computer. We also study large quantum systems and figure out which ones have promise for doing useful computations faster than is possible with classical computers. So, our work covers a lot of ground, but theres a lot to do. You have this big, complicated beast in front of you and youre trying to chip away at it with whatever tools you have.

You focus on quantum systems. What are they?

I usually start by saying, at very small scales the world obeys quantum mechanics. People know about atoms and electrons, which are small quantum systems. Compared to the big objects we know, they are peculiar because they can be in two seemingly incompatible states at once, such as particles being in two places at the same time. The way these systems work is weird at first, but you get to know them.

Large systems, made up of a bunch of atoms, are different from individual particles. Those weird quantum effects we want to harness are hard to maintain in bigger systems. Lets say you have one atom thats working as a quantum memory bit. A small disturbance like a nearby magnetic field has a chance of causing the atom to lose its information. But if you have 500 atoms working together, that disturbance is 500 times as likely to cause a problem. Thats why classical physics worked well enough for so many years: Because classical effects overwhelm weird quantum effects so easily, usually classical physics is enough for us to understand the big objects we know from our everyday life.

What were doing is trying to understand and build large quantum systems that stay quantum something we specialists call coherent even when they are large. We want to combine lots of ingredients, say 300 qubits, and yet ensure that the environment doesnt mess up the quantum effects we want to harness. Large coherent systems that are not killed by the environment are hard to create or even simulate on a classical computer, but coherence is also what will make the large systems powerful as quantum computers.

What is compelling about a large quantum system?

One of the first motivations for trying to understand large quantum systems is potential technological applications. So far quantum computers havent done anything useful, but people think they will very soon and its very interesting. A quantum internet would be a secure internet, and it also would allow you to connect many quantum computers to make them more powerful. Im fascinated by these possibilities.

Its also fascinating because of fundamental physics. You try to understand why this system does some funny stuff. I think a lot of scientists just enjoy doing that.

Why are you personally so interested in quantum research?

I got my first exposure to it after my junior year in college. I quickly found it has a great mix of math, physics, computer science and interactions with experimentalists. The intersection of all these fields is why its so much fun. I like seeing the connections. You end up pulling an idea from one field and applying it to another and it becomes this beautiful thing.

Lots of people worry that a quantum computer will be able to break all our encryption, revealing all our digitized secrets. What are some less worrying things they might be able to do that excite you?

Before I get into what excites me, let me say first that its important to remember that not all of our encryption will break. Some encryption protocols are based on math problems that will be vulnerable to a quantum computer, but other protocols arent. NISTs post-quantum cryptography project is working on encryption algorithms that could foil a quantum computer.

As for what excites me, lots does! But here are a couple of examples.

One thing we can do is simulation. We might be able to simulate really complicated things in chemistry, materials science and nuclear physics. If you have a big complex chemical reaction and you want to figure out how its taking place, you have to be able to simulate a big molecule that has lots of electrons in a cloud around it. Its a mess, and its hard to study. A quantum computer can in principle answer these questions. So maybe you could use it to find a new drug.

Another possibility is finding better solutions to what are called classical optimization problems, which give classical computers a lot of trouble. An example is, What are more efficient ways to direct shipments in a complex supply chain network? Its not clear whether quantum computers will be able to answer this question any better than classical computers, but theres hope.

A follow-up to the previous question: If quantum computers arent actually built yet, how do we know anything about their abilities?

We know or think we know the microscopic quantum theory that qubits rely on, so if you put these qubits together, we can describe their capabilities mathematically, and that would tell us what quantum computers might be able to do. Its a combination of math, physics and computer science. You just use the equations and go to town.

There are skeptics who say that there might be effects we dont know about yet that would destroy the ability of large systems to remain coherent. Its unlikely that these skeptics are right, but the way to disprove them is to run experiments on larger and larger quantum systems.

Are you chasing a particular research goal? Any dreams youd like to realize someday, and why?

The main motivation is a quantum computer that does something useful. Were living in an exciting time. But another motivation is just having fun. As a kid in eighth grade, I would try to solve math problems for fun. I just couldnt stop working on them. And as you have fun, you discover things. The types of problems we are solving now are just as fun and exciting to me.

Lastly, why NIST? Why is working at a measurement lab on this research so important?

Quantum is at the heart of NIST, and its people are why. We have top experimentalists here including multipleNobel laureates. NIST gives us the resources to do great science. And its good to work for a public institution, where you can serve society.

In many ways, quantum computing came out of NIST and measurement: It came out of trying to build better clocks.Dave Winelands work with ions is important here.Jun Yes work with neutral atoms is too. Their work led to the development of amazing control over ions and neutral atoms, and this is very important for quantum computing.

Measurement is at the heart of quantum computing. An exciting open question that lots of people are working on is how to measure the quantum advantage, as we call it. Suppose someone says, Here is a quantum computer, but just how big is its advantage over a classical computer? Were proposing how to measure that.

Read more:
What's So Great About Quantum Computing? A Q&A with NIST Theorist Alexey Gorshkov - HPCwire

Quantum Computing Inc. Unveils Software Built to Expand Quantum Processing Power By Up to 20x – insideHPC

LEESBURG, Va., June 07, 2022 Quantum Computing Inc. today unveiled QAmplify, a suite of quantum software technologies designed to expand the processing power of current quantum computers by up to 20x. QAmplify is intended to supercharge any quantum computer to solve business problems today. The company is actively working with customers and partners in scaling the amplification capabilities of its ready-to-run Qatalystsoftware, which is designed to eliminate the need for complex quantum programming and runs seamlessly across a variety of quantum computers. QCI has filed for patents on QAmplify technology.

Currently there are two primary technology approaches that deliver a wide range of capabilities spanning the current Quantum Processing Unit (QPU) hardware landscape; gate model (e.g. IBM, IonQ, Rigetti, OQC, etc.) and annealing (e.g. D-Wave) quantum computers. Both are limited in the size of problems (i.e., number of variables and complexity of computations) they can process. For example, gate models can typically process from 10-120 data variables, and annealing machines can process approximately 400 variables in a simple problem set. These small problem sets restrict the size of the problems that can be solved by todays QPUs, limiting businesses ability to explore the value of quantum computing.

QCIs patent-pending QAmplify suite of powerful QPU-expansion software technologies overcomes these challenges, dramatically increasing the problem set size that each can process. The QAmplify gate model expansions demonstrated capabilities have been benchmarked at a 500% (5x) increase and the annealing expansion has been benchmarked at up to a 2,000% (20x) increase.

QAmplify maximizes end-user investment in current QPUs by allowing quantum users to transform from science experiments to solving real-world problems without waiting for the quantum hardware industry to catch up. For example, in terms of real-world applications, this means that an IBM quantum computer with QAmplify could solve a problem with over 600 variables, versus the current limit of 127 variables. A D-Wave annealing computer with QAmplify could solve an optimization with over 4,000 variables, versus the current limit of 200 for a dense matrix problem set.

It is central to QCIs mission to deliver practical and sustainable value to the quantum computing industry, said William McGann, Chief Operating and Technology Officer of QCI. QCIs innovative software solutions deliver expansive compute capabilities for todays state-of-the-art QPU systems and offer great future scalability as those technologies continually advance. The use of our QAmplify algorithm in the2021 BMW Group Quantum Computing Challengefor vehicle sensor optimization provided proof of performance by expanding the effective capability of the annealer by 20-fold, to 2,888 qubits.

More here:
Quantum Computing Inc. Unveils Software Built to Expand Quantum Processing Power By Up to 20x - insideHPC

Mphasis accelerates the world-leading Quantum Computing Ecosystem in partnership with the University of Calgary and the Government of Alberta – Yahoo…

~ The Quantum Lab is set to accelerate the development of quantum skills in the city to enable job creation

CALGARY, AB, June 9, 2022 /CNW/ --Mphasis, (BSE: 526299; NSE: MPHASIS), an Information Technology (IT) solutions provider specializing in cloudand cognitiveservices, today joined the Government of Alberta and the University of Calgary to announce the launch of the world-leading Quantum City - Canada. Quantum city will further establish Alberta as a leading technology hub and will accelerate the development of the quantum ecosystem in Calgary.

Mphasis (PRNewsfoto/Mphasis)

The partnership aims to utilize the synergy between academia, industry, and government to put the process of ideation to market at the forefront. This will include assessment, consulting, and joint development of quantum computing solutions along with exploring possible industry solutions in the areas of machine learning, optimization, simulation, and cryptography, among others. Additionally, to enable capability building in next-gen technologies, joint design, and development of an industry-focused quantum computing curriculum and leveraging Mphasis' TalentNEXT training framework at the University of Calgary will help build an industry-ready workforce to operationalize the development and delivery of quantum solutions for real-world problems.

Further, Mphasis will help with Go-To-Market activities through its sales, partner, and analyst channels for commercialization and adoption of Quantum computing solutions by the public and private sectors developed under this partnership. Mphasis has built a host of industry-focused IPs in areas including AI and Quantum computing and will extend those to the University of Calgary to jumpstart innovation and ideation. The collaboration will also accelerate the university's innovation ecosystem to build a quantum start-up incubation center.

Quantum City will cultivate a national network of researchers, spur economic, technological, and infrastructural development, and act as a focal point for attracting talent through high-quality mentoring, training, and skills development in the country. The center will focus on developing cutting-edge solutions, collaborations, and skills-building initiatives in crucial areas of research such as Health, Energy, Environment, Agriculture & Food, Clean Tech, Oil & Gas, Social Sciences, Space, Finance, Logistics, and Transportation, etc.

Story continues

"Alberta's tech sector is one of the fastest growing in the world, and that is thanks to the ingenuity, know-how, and hard work of Alberta's innovators and job creators. With this new support, the University of Calgary and its partners will play a key role in making Alberta a world-renowned technology and innovation hub diversifying our economy today to create more jobs tomorrow," said the HonorableJason Kenney, Premier of Alberta, Canada.

The partnership in quantum computing will foster economic growth and job creation in the region. Our aim is to leverage the Engineering DNA, to help advance the adoption of digital technologies and talent for the future Mphasis seeks to strengthen and contribute to Alberta's quantum computing, machine learning, and artificial intelligence ecosystems. Our aim is to help organizations harness the power of rapidly advancing digital technologies to gain competitive advantage and advance their business strategies," said Nitin Rakesh, Chief Executive Officer and Managing Director, Mphasis.

The collaboration between Mphasis and the University of Calgary will also focus onhosting quantum consulting workshops for use case identification, assessment, and infrastructure requirements. In addition, Mphasis will identify several industry partners and prospective clients for the commercialization of jointly developed quantum solutions.

"Quantum City is a leading example of how world-class talent, investment, and advanced technology are coming into Calgary. Calgary's economy will grow and diversify as a result of the technologies developed through Quantum City. The University of Calgary will offer deep research expertise that can bring innovations to life and will reap immense benefits for people and societies. UCalgary is excited to be partnering with Mphasis and the Government of Alberta to leapfrog towards the future of innovation," said Ed McCauley, President and Vice-Chancellor, University of Calgary.

"Our collaboration with the University of Calgary and Govt. of Alberta will enable us to tap into quantum computing's enormous potential, allowing us to create cutting-edge capabilities and talents for the future. The opening of our center illustrates our commitment to bringing the most creative, game-changing solutions to market and to investing in skills early on, to stay ahead of the curve. With the world on the verge of a new age of computing, Quantum Computers will soon be able to tackle issues that were previously unsolvable by traditional computers. Building a unified quantum computing business demands a concerted effort to grow the ecosystem across industries, which is what our partnership aims to do. The Quantum Computing Centre is another example of our dedication to fostering open innovation ecosystems to address the big problems of our time," said Rohit Jayachandran, Senior Vice President and Head Strategic Accounts, Mphasis.

The center will work in alignment with the goals of the government and harness the computational technology for traffic management, vehicle routing, financial services portfolio, and social network analysis. The confluence of machine learning and quantum simulation & modeling will be utilized for supply chain demand prediction, anomaly detection, drug development, human mobility modeling, cybersecurity, and climate modeling.

Mphasis is at the forefront of leveraging the power of quantum computing in solving complex business problems in areas such as machine learning, optimization, and simulation problems. As a pioneer in delivering AI/ML solutions, Mphasis foresee quantum computing as a major driver in solving clients' business problems. Mphasis EON (Energy Optimized Network) quantum computing framework is a patent-pending framework that overcomes the limitations of quantum computing systems not being able to work on varied input datasets. It consists of Quantum assisted Machine Learning, Quantum Circuit and Deep neural network layers.

About MphasisMphasis' purpose is to be the "Driver in a Driverless Car"for global enterprisesby applying next-generationdesign, architecture, and engineering services, to deliver scalable and sustainable software and technology solutions.Customer-centricity is foundational to Mphasis, and it is reflected in Mphasis' Front2Back Transformation approach. Front2Back uses the exponential power of cloud and cognitive computing to provide a hyper-personalized (C=X2C2TM=1) digital experience to clients and their end customers.Mphasis' Service Transformation approach helps 'shrink the core' through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis' core reference architectures and tools, speed and innovation with domain expertise and specialization, combined with an integrated sustainability and purpose-led approach across its operations and solutions are key to building strong relationships with marquee clients. Click hereto know more.(BSE: 526299;NSE: MPHASIS)

About the University of CalgaryFounded in 1966, the University of Calgary is a broad-based research university with several campuses in Calgary and the surrounding area. It is one of the highest-ranked universities in North America. About 35,000 students experience an innovative learning environment here, made rich by research and hands-on experiences. For more information, visit ucalgary.ca. Stay up to date with UCalgary's news headlines on Twitter @UCalgary. For access to news releases, details on faculties, and experts, go to our media center at ucalgary.ca/newsroom.

SOURCE Mphasis

Cision

View original content to download multimedia: http://www.newswire.ca/en/releases/archive/June2022/09/c9077.html

More:
Mphasis accelerates the world-leading Quantum Computing Ecosystem in partnership with the University of Calgary and the Government of Alberta - Yahoo...

Now Is the Time to Plan for Post-Quantum Cryptography – DARKReading

RSA CONFERENCE 2022 San Francisco Even the most future-facing panels at this year's RSA Conference are grounded in the lessons of the past. At the post-quantum cryptography keynote "Wells Fargo PQC Program: The Five Ws," the moderator evoked the upheaval from RSAC 1999 when a team from Electronic Frontier Foundation and Distributed.net broke the Data Encryption Standard (DES) in less than a day.

"We're trying to avoid the scramble" when classical cryptography techniques like elliptic curve and the RSA algorithm inevitably fall to quantum decrypting, said Sam Phillips, chief architect for information security architecture at Wells Fargo. And he set up the high stakes encryption battles often have: "Where were all the DES implemented? Hint: ATM machines."

"We had to set up teams to see where all we were using[was DES] and then establish the migration plan based upon using a risk-based approach," Phillips said. "We're trying to avoid that by really trying to get ahead of the game and do some planning in this case."

Phillips was joined on stage by Dale Miller, chief architect of information security architecture at Wells Fargo, and Richard Toohey, technology analyst at Wells Fargo.

Toohey, a doctoral candidate at Cornell University, handled most of the technical aspects of quantum computing during the panel.

"For most problems, if you have a quantum calculator and a regular calculator, they can add numbers just as well," he explained. "There's a very small subset of problems that are classically very hard, but for a quantum computer, they can solve [them] very efficiently."

These problems are called np-hard problems.

"A lot of cryptography, specifically in asymmetric cryptography, relies on these np-hard type problems things like elliptic curve cryptography, the RSA algorithm, famously and when quantum computers are developed enough, they'll be able to brute-force their way through these," Toohey explained. "So that breaks a lot of our modern classical cryptography."

The reason why we don't have crypto-breaking quantum computers today, despite headline-making offerings from IBM and others, is because the technology to reach that level of power has not been accomplished yet.

"To become a cryptographically relevant quantum computer, a quantum computer needs to have about 1 to 10 million logical qubits, and those logical qubits all need to be made up of about 1,000 physical qubits," Toohey said. "Today, right now, the largest quantum computers are somewhere around 120 physical qubits."

He estimated that to even muster the first logical qubit will take three years, and from there it has to scale up to "a million or so logical qubits. So it's still quite a few years away."

Another technical challenge that needs solving before we get these powerful quantum computers is the cooling systems they require.

"Qubits are incredibly sensitive; most of them have to be held at very low, cryogenic temperatures," Toohey explained. "So because of that, quantum computing architecture is incredibly expensive right now."

Other problems include decoherence and error correction. The panel agreed that the combination of these issues means crypto-cracking quantum computers are eight to10 years away. But that doesn't mean we have a decade to address PQC.

The panel was named for the journalistic model of five questions that start with the letter "w," but that didn't come up until late in the audience Q&A portion.

"Sam was asking the what, the who, the why, the where, and the when," Miller said. "So I think we've covered that in our conversations here."

Most of the titular questions were somewhat vague and a matter of judgment. However, on the concept of when you should start planning for the post-quantum future, there was complete agreement: Now.

"You've got to start the process now, and you have to move yourself forward so that you are ready when a quantum computer comes along," Miller said.

Phillips concurred.

"There is not right now a quantum computer that is commercially viable, but the amount of money and effort going into the work is there to move it forward, because people recognize the benefits that are there, and we are recognizing the risk," he said. "We feel that it's an eventuality, that we don't know the exact time, and we don't know when it'll happen."

Toohey suggested beginning preparations with a crypto inventory again, now.

"Discover where you have instances of certain algorithms or certain types of cryptography, because how many people were using Log4j and had no idea because it was buried so deep?" he said. "That's a big ask, to know every type of cryptography used throughout your business with all your third parties that's not trivial. That's a lot of work, and that's going to need to be started now."

Wells Fargo has a goal to beready to run post-quantum cryptography in five uears, which Miller described as"a very aggressive goal."

"So the time to start is now," he said,"and that's one of the most important takeaways from this get-together."

Pivoting is a key marker of agility for the panel, and agility is vital for being able to react to not just quantum threats, but whatever comes next.

"The goal here should be crypto agility, where you're able to modify your algorithms fairly quickly across your enterprise and be able to counter a quantum-based attack," Miller said. "And I'm really not thinking on a day-to-day basis about when is the quantum computer going to get here. For us, it's more about laying a path and a track for quantum resiliency for the organization."

Toomey agreed about the importance of agility.

"Whether it's a quantum computer or new developments in classical computing, we don't want to be put in a position where it takes us 10 years to do any kind of cryptographic transition," he said. "We want to be able to pivot and adapt to the market as new threats come out."

Because there will be computers that can break current cryptography techniques, organizations do need to develop new encryption methods that stand up to quantum brute-force attacks. But that's only the half of it.

"Don't just focus on the algorithms," Phillips said. "Start looking at your data. What data are you transiting back and forth? And look at devaluing that data. Where do you need to have that confidential information, and what can you do to remove that from the exposure? It will help a lot not only in the crypto efforts, but in terms of who has access to the data and why they have to have access."

One open question loomed over the discussion: When would NIST announce its picks for the new standards to develop for post-quantum cryptography? The answer: Not yet. But the uncertainty is no cause for inaction, Miller said.

"So NIST will continue to work with other vendors and other companies and research groups to look at algorithms that are further out there," he said. "Our job is to be able to allow those algorithms to come into place quickly, in a very orderly manner, without disrupting business or breaking your business processes and [to] be able to keep things moving along."

Phillips agreed. "That's one of the reasons for pushing on plug and play," he said. "Because we know that the first set of algorithms that come out may not satisfy the long-term need, and we don't want to keep jumping through these hoops every time somebody goes through it."

Toohey tied the standards question back into the concept of preparing now.

"That way, when NIST finally finishes publishing their recommendations, and standards get developed in the coming years, we're ready as an industry to be able to take that and tackle it," he said."That's going back to crypto agility and this mindset that we need to be able to plug and play. We need to be able to pivot as an industry very quickly to new and developing threats."

Continue reading here:
Now Is the Time to Plan for Post-Quantum Cryptography - DARKReading

What Is a Hash Function Within Cryptography [Quick Guide] – Security Boulevard

Hash Function Is One Type of Computer Security That Provides Authentication & Data Integrity A Quick Guide on Hash Function and How Does It Work

Cryptography is the essential process and method thats used for maintaining the integrity, confidentiality, and security of the data. Its essential to create robust machine identities that protect machine-to-machine communications and connections. Put simply, the hash function is the mathematical process that has an essential part in public-key cryptography.

In addition, the hash function helps in:

Furthermore, hash functions are helpful in many other ways. For instance, it helps sign software applications and secure the website connection to transmit information online.

The hash function is seen differently by different people. But if youre questioning what a hash function in cryptography is, it becomes a bit different. The hash function is seen as a unique identifier for any content in cryptography. It processes the plaintext data of all sizes and converts it into a unique ciphertext of a certain length.

In other words, hashing is a mathematical function that gives an output called a hash value of ciphertext or plaintext. Its a cryptographic technique that transforms your data into a specific text string. Henceforth, once you put a plaintext within a strong hash algorithm, you get the output in a hash value.

Similarly, the hash function is a one-way cryptographic algorithm that maps your input of all the sizes to a unique output of a fixed length in bits. And the resulting output is known as a hash value, hash digest, or hash code which is the resulting unique output.

Hashing converts readable text into unreadable text, making it secure. And, once hashing is executed, its not easy to reverse, which makes it a little different from the encryption, where you can reverse the encrypted information.

The original data input is often broken down into small blocks of equal sizes in hashing methods. And, if theres not enough data within any block to make it of the same size, padding (1s and 0s) is added. Similarly, those individual data blocks are run using a hashing algorithm and give an output known as a hash value.

No doubt, the process may differ if youre hashing passwords for storing in a web server. But, the hashing of passwords for storing involves salting. Here salt is a unique random value added to the message before it undergoes the hashing algorithm. Lastly, adding one character will create a new hash value once the process is completed.

Though both hash function and encryption use cryptography, they are not similar. For instance, a hash function is a one-way function, which means once you covert readable content into ciphertext, you cant reverse it. And, when it comes to encryption, you can convert it back into a readable format, also known as decrypting, after its encrypted. But, it would help if you were authorized to decrypt the encrypted information. Similarly, hashing is mainly used for comparison reasons and not for encryption.

Some of the most commonly used hashing algorithms are:

Below are the properties of Hash Function:

Hashing secures passwords that are stored and saved on the server. Instead of storing passwords in plaintext, you store actual hash values within the hash table by hashing. Therefore, if an intruder tries to log into the system, theyll only be able to see the hash value and not the actual passwords.

Hashing is useful for verifying passwords every time you login into your account or system. Password verification shows youre the actual user of the account. Similarly, if your password matches the hash value on the server, it confirms youre authorized.

Hashing verifies data integrity. It assures you that your data is not modified and its correct. Similarly, it also ensures your information is in its original form.

Hash functions are helpful for most things. For instance, its used to sign new software and verify digital signatures to secure the website connection with the computer or mobile web browsers. Similarly, its also good for indexing and retrieving information from the online database.

For instance, the hash function is commonly seen in usage for:

In addition, the hash function is commonly found through public-key cryptography. For example, the hash function is seen in:

For instance, you are looking to digitally sign software and distribute it online on your website for download. For this, youll need to create a hash of the executable youre signing. After embedding your digital signature, youll need to hash that digital signature.

And once the user downloads that software, the browser goes to decrypt the file, and at that time, it inspects the two unique hash values. Similarly, the browser will run the same hash function with the help of the same used algorithm and hash both the signature and file once again. If the produced hash value is the same, the browser knows that both the file and signature are authentic and not altered. And, if the hash value differs, the browser will show a warning message.

Hashing is an essential tool for computer security. It helps secure data and offers visibility within alteration or modification of files and data. In addition, its unique characteristics prevent attackers from taking advantage of reverse engineering for viewing plaintext or original input data.

Lastly, in combination with other cryptographic tools like encryption, the hash function supports authentication, signatory non-repudiation, and data integrity when using digital signatures.

View post:
What Is a Hash Function Within Cryptography [Quick Guide] - Security Boulevard

RSA Conference 2022 Announces Recipients of Lifetime Achievement Award and Annual Excellence in the Field of Mathematics Award – PR Newswire

Established in 1998, the RSA Conference Awards continue to acknowledge the outstanding contributions of individuals and/or organizations whose work helps to continue the fight against cybercrime and help prepare professionals within the industry to perform their jobs at the highest possible level.

"The RSA Conference Awards celebrate inspirational people whose contributions have had a profound, long-lasting effect on the industry and influenced the next generation of industry professionals," said Linda Gray Martin, Vice President, RSA Conference. "These awards are just one way we can recognize their achievements and thank them for their dedication to advancing the field of cybersecurity."

Lifetime Achievement Award The Lifetime Achievement Award honors outstanding leaders who have made significant contributions to the advancement of the cybersecurity industry over their lifetime. Past recipients represent several of the most influential minds in the field whose work continues to have a lasting impact.

The RSA Conference 2022 Lifetime Achievement Award is posthumously awarded to: Alan Paller

Alan founded SANS in 1988, which provides advanced training for 45,000 cybersecurity technologists annually, and was the former president of SANS Technology Institute, the first regionally accredited college focused on educating future cyber stars. Alan served on the board of the National Cyber Scholarship Foundation and led CyberStart, a nationwide on-ramp that allows students to discover and demonstrate cyber talent. He testified before Congress, was a charter member of the President's National Infrastructure Assurance Council, and co-chaired both the DHS Task Force on CyberSkills and the FCC Task Force on Best Practices in Cybersecurity. In 2010, The Washington Post included Alan on its list of "seven people worth knowing in cybersecurity."

Over the years at RSA Conference, Alan led an annual keynote discussion on the most dangerous new attack vectors, to teach companies about what techniques are in use today, what is coming next, and what organizations can do to prepare. During that same session this year titled "The Five Most Dangerous New Attack Techniques," the current president of SANS Technology Institute Ed Skoudis will accept the award on his former colleague's behalf. More information about Alan Paller's legacy can be found here.

"Alan Paller was a beloved colleague and treasured mentor to countless people throughout the cybersecurity community. I can think of no one more deserving of the RSAC Lifetime Achievement Award than the man who dedicated his life to vastly improve cybersecurity practitioners' skills to thwart ever increasing threats," said Ed Skoudis, President of the SANS Technology Institute and Fellow at the SANS Institute. "It is an honor to accept the award on behalf of Alan and his family. Alan was one of the first true visionaries in cybersecurity, with an unmatched passion for educating students. Due to Alan's commitment, hard work and kindness, hundreds of thousands of students have become better cyber defenders. His legacy and lifetime dedication continue to embody the mission of the SANS Institute."

Award for Excellence in the Field of Mathematics, Co-Sponsored by IACR Each year, RSA Conference recognizes noteworthy work in cryptography and mathematics. Award recipients are determined by an esteemed judging committee who seek to recognize innovation and ongoing contributions to the industry. Dozens of nominated individuals from affiliated organizations, universities or research labs compete each year for this award.

Recipients of the RSA Conference 2022 Excellence in the Field of Mathematics award are:

Professors Cynthia Dwork and Moni Naor Cynthia Dwork, a professor of Computer Science at the John A. Paulson School of Engineering and Applied Sciences at Harvard University and a Distinguished Scientist at Microsoft Research, is known for establishing the pillars on which every fault-tolerant system has been built atop for decades. Her innovations modernized cryptography to cope with the ungoverned interactions of the internet through the development of non-malleable cryptography, formed the basis of crypto currencies through proofs of work, placed privacy-preserving data analysis on a firm mathematical foundation, and ensures statistical validity in exploratory data analysis, through differential privacy.

"RSA Conference is an important venue for the exchange of ideas in the cybersecurity ecosystem. I am deeply honored to join the ranks of past recipients of this prestigious award that recognizes foundational research," said Dwork. "The threats to privacy have never been greater, and advancements in technology means more cybersecurity risk. My research, work, students, and university will continue to play a key role in helping innovation preserve these values."

Moni Naor is a professor of Computer Science at the Weizmann Institute of Science in Israel specializing in Cryptography and Complexity. He is well known for his work connecting cryptography and data structure in adversarial environments. In 1992, he collaborated with Cynthia Dwork on "Proofs of Work" to combat denial-of-service attacks and other service abuses, such as spam, which is now famous for its use with Bitcoin and blockchain technologies. He has proposed other fundamental concepts that are at the heart of today's cryptography, including non-malleability, broadcast encryption, tracing traitors, small bias probability, and the efficiency of falsifying assumptions.

"The RSA Conference Excellence in the Field of Mathematics Awards has a long list of impressive and impactful recipients dating back to 1998 with Shafi Goldwasser receiving it. I am honored to say that I am now part of the amazing group of cryptographers who have received it," said Naor. "I strongly believe advancements in the field of cryptography will continue to prove necessary as digital communication and usage accelerates. I remain dedicated to making a lasting impact in the field."

The IACR is proud to join RSAC in co-sponsoring the Excellence in the Field of Mathematics Award. As the worldwide professional society for researchers in cryptography and cryptanalysis, we are dedicated to recognizing individuals who have excelled in our field and advancing awareness of the role cryptology plays in a modern, digitally connected life, said Michel Abdalla, President, IACR. This year we celebrate the work of Professors Dwork and Naor, and the impact they individually and collectively have had on the cryptography industry and cybersecurity at large.

RSA Conference and IACR presented the Excellence Award in the Field of Mathematics Award on Tuesday, June 7, 2022.

For more information regarding RSA Conference 2022, taking place at the Moscone Center in San Francisco from June6-9, 2022, visit http://www.rsaconference.com/usa.

About RSA Conference RSA Conference is the premier series of global events and year-round learning for the cybersecurity community. RSAC is where the security industry converges to discuss current and future concerns and have access to the experts, unbiased content and ideas that help enable individuals and companies to advance their cybersecurity posture and build stronger and smarter teams. Both in-person and online, RSAC brings the cybersecurity industry together and empowers the collective "we" to stand against cyberthreats around the world. RSAC is the ultimate marketplace for the latest technologies and hands-on educational opportunities that help industry professionals discover how to make their companies more secure while showcasing the most enterprising, influential, and thought-provoking thinkers and leaders in cybersecurity today. For the most up-to-date news pertaining to the cybersecurity industry visit http://www.rsaconference.com. Where the world talks security.

About the International Association for Cryptologic Research (IACR) The International Association for Cryptologic Research(IACR) is a non-profit organization devoted to supporting the promotion of the science of cryptology. Cryptology is the science of the making and breaking of encryption algorithms, but in the modern world it encompasses so much more. You use cryptology all the time, when banking, when using a mobile phone, when opening your car door. You are even using it now when you are reading this web page.

IACR organize aseries ofconferences and workshops. IACR publishes the Journal of Cryptology, in addition to the proceedings of its conference and workshops. IACR also maintains the Cryptology ePrint Archive, an online repository of cryptologic research papers aimed at providing rapid dissemination of results. For more information, please visit http://www.iacr.org.

SOURCE RSA Conference

Originally posted here:
RSA Conference 2022 Announces Recipients of Lifetime Achievement Award and Annual Excellence in the Field of Mathematics Award - PR Newswire