Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health – DocWire News

This article was originally published here

Comput Intell Neurosci. 2022 Apr 25;2022:7016554. doi: 10.1155/2022/7016554. eCollection 2022.

ABSTRACT

Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way. Health services data must therefore be kept as safe and secure as possible because the release of this data could have serious consequences for patients. A framework for security and privacy must be employed to store and manage extremely sensitive data. Patients confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue. The medical system has been designed as a standard, access of records, and effective use by medical practitioners as required. In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography. The comparison of the proposed and existing techniques has been carried out in terms of time taken for encryption and decryption, energy, and power. Decryption time has been decreased up to 50% with the proposed method of cryptography. As it will take less time for decryption, less power is consumed for doing the cryptography operations.

PMID:35510050 | PMC:PMC9061039 | DOI:10.1155/2022/7016554

View post:
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health - DocWire News

What is a `cryptographic token? Why have Microsoft, Apple, Google announced passwordless sign-in – The – The Kashmir Monitor

Microsoft, Apple, and Google have announced to implement passwordless sign-in across all mobile, desktop, and browser platforms.

Passwordless authentication will be coming this year to all main platforms including Android and iOS mobile operating systems; Chrome, Edge, and Safari browsers; and the Windows and macOS desktop.

Senior director of platform product marketing at Apple, Kurt Knight said, Just as we design our products to be intuitive and capable, we also design them to be private and secure. Working with the industry to establish new, more secure sign-in methods that offer better protection and eliminate the vulnerabilities of passwords is central to our commitment to building products that offer maximum security and a transparent user experience all to keep users personal information safe.

A report by The Verge reveals that a passwordless login process will allow users to choose their phones as the main authentication device for all apps, websites, and other digital services.

Google detailed in a blog post that unlocking the phone with just the default action would be enough to sign in to web services. Using a unique cryptographic token called a passkey shared between phone and website, sign-ins will be possible without the need to enter a password.

A passwordless system will make user sign-in simple, offering security and making it more difficult for hackers to compromise login details.

Microsofts vice president for security, compliance, identity, and privacy, Vasu Jakkal, stated in an email, With passkeys on your mobile device, youre able to sign in to an app or service on nearly any device, regardless of the platform or browser the device is running. For example, users can sign in on a Google Chrome browser thats running on Microsoft Windowsusing a passkey on an Apple device.

The new feature will be possible using a standard called FIDO which uses the principles of public-key cryptography to enable passwordless authentication and multi-factor authentication. A phone can store a unique FIDO-compliant passkey which can be shared with a website for authentication when the phone is unlocked.

Product management director for secure authentication at Google and president of the FIDO Alliance, Sampath Srinivas, made a statement to The Verge, This extended FIDO support being announced today will make it possible for websites to implement, for the first time, an end-to-end passwordless experience with phishing-resistant security, said Srinivas. This includes both the first sign-in to a website and repeat logins. When passkey support becomes available across the industry in 2022 and 2023, well finally have the internet platform for a truly passwordless future.

Apple, Google, and Microsoft aim to introduce the feature this year even though the new passwordless sign-in capabilities had been in the works for a while.

Read this article:
What is a `cryptographic token? Why have Microsoft, Apple, Google announced passwordless sign-in - The - The Kashmir Monitor

Jagran Trending: What is Cryptocurrency and how does it work? – Jagran English

New Delhi | Aalok Sensharma: Cryptocurrencies have become hot cakes across the world, especially since the outbreak of the COVID-19 pandemic, with many investors showing interest in them. Several countries are also mulling launching their own cryptocurrency and making them a legal tender, while others like China have imposed a complete ban on them.

Several experts have also favoured a ban on cryptocurrencies while many feel that governments across the world should impose some kind of restrictions on them. Amid this ongoing debate, several people are still unaware of what is a cryptocurrency and how it works. So, we at English Jagran have decided to make our readers aware of cryptocurrencies and everything they need to know about them.

What is a cryptocurrency?

Also known as crypto, a cryptocurrency is a digital or virtual currency that acts as a medium of exchange through a computer network. A cryptocurrency, which is secured by cryptography, is not reliant on a bank or a government of a country.

A cryptocurrency, which cannot be touched, is deposited in an online wallet, which is known as a digital cash system. This system is based on computer algorithms, and thus a cryptocurrency is not limited to the border of a country.

How does cryptocurrency work?

A cryptocurrency is generated through a process known as 'mining'. Mining is the process by which crypto miners validate a cryptocurrency transaction with help of coding and data, and earn a crypto "as compensation for their work".

Crypto mining is carried out in a decentralised system using a computer. People, irrespective of where they live, can be a part of this decentralised system or recordkeeping that is needed for a transaction. This record, which is available publicly, is known as a 'ledger' or 'blockchain'.

All people who are involved in this network are responsible for "verifying and validating" the transactions and thus it is called a "distributed network". Crypto miners continuously verify these blocks of data and add them to the blockchain.

This is a lengthy and complicated task and miners must guess the correct codes associated with the data to allow other miners on the network to continue this process. It should be noted that the new block contains a link to the previous block.

What are some of the famous cryptocurrencies?

Some of the famous cryptocurrencies that are currently available in the world are Bitcoin, Altcoin, Ethereum, XRP, Tether, Cardano, Polkadot, Stellar, and USD Coin.

Posted By: Subhasish Dutta

View post:
Jagran Trending: What is Cryptocurrency and how does it work? - Jagran English

Want to invest in cryptocurrency? Here are some pros and cons – Free Press Journal

Cryptocurrency has been in the limelight since its inception in 2009 with the creation of the Bitcoin blockchain. The term cryptocurrency has become a global phenomenon and it is gaining popularity in India as well, with India being ranked second in terms of cryptocurrency adoption according to the 2021 Global Crypto Adoption Index. Additionally, there are an estimated 15 to 20 million crypto investors in India with a total holding of approximately Rs 400 billion ($ 5.37 billion). Now, there has to be some sort of positives behind these incredible numbers. Let us look at some of the key benefits of investing in cryptocurrency:

Transaction costs

Cryptocurrency transaction costs are way too low when compared to different financial services. Cryptocurrency transactions are less expensive. In fact, a wire transfer at banks can cost substantially more than the cryptocurrency transaction cost. However, this comes with a caveat that demand on the blockchain may increase the transaction cost.

Transparency and security

Cryptocurrencies are primarily based on cryptography and blockchain security and the distributed network of computers verifying transactions resulting in more security. So, unless and until someone has the access to the private key of your crypto wallet, they will be unable to sign transactions or access funds. Majority of the incidents related to hacking involves exchanges being hacked and also due to individual errors.

Ease of transactions

One of the key advantages which cryptocurrency possesses is the ease of transaction and this has also resulted in high demand. By just using a simple smartphone app, hardware wallet, or exchange wallet, anyone can send and receive a variety of cryptocurrencies. Infact, some types of cryptocurrencies, including Bitcoin, Litecoin, and Ethereum, can be bought with cash at a Bitcoin ATM.

Risk diversification/Portfolio diversification

Diversification is a must when it comes to asset creation and cryptocurrency is one such asset class which offers investors diversification from traditional financial assets. However, investments in cryptocurrency includes risks as well given the volatility observe in this asset class. It has been seen that investors having an ideal combination of these two asset classes is expected to generate steady returns.

Rise in acceptance

Over the past few years, there has been a rise in cryptocurrencies and also in the acceptance level from investors. The underlying utility/value of these cryptocurrencies is one of the key investment criteria. For e.g. NFTs or non-fungible tokens, have been gaining popularity recently, and they are secured by the Ethereum network. These utilities incentivize the investors and acts as a buying proposition. However, not all cryptocurrencies are the same as there are some crypto which offers no utility and are merely piggyback on internet meme culture.

Conclusion

There are some additional benefits/advantages as well of cryptocurrencies. There are some obvious and notable disadvantages as well mainly the volatility and hence investors should do their own bit of wise research before investing. If invested in a wise manner, then you can certainly build a very strong portfolio.

(Siddharth Jaiswal is Founder, Sportzchain- a blockchain-based fan engagement platform)

(To receive our E-paper on whatsapp daily, please click here. We permit sharing of the paper's PDF on WhatsApp and other social media platforms.)

Go here to read the rest:
Want to invest in cryptocurrency? Here are some pros and cons - Free Press Journal

IKA BLOCK signed a cooperation agreement with CYBAVO, the leading blockchain information security in Asia. – GlobeNewswire

Hongkong, China , May 10, 2022 (GLOBE NEWSWIRE) -- IKA BLOCK, a hong kong blockchain developer, announced that it has signed a cooperation agreement with CYBAVO, a leading Asian blockchain information security company in Taiwan, to expand the Asian and APAC markets and provide professional security services for all Hong Kong companies planning to develop blockchain business. Ensure the security of corporate virtual currency assets.

Taiwan's blockchain security team "CYBAVO VAULT" - CYBAVO was established in 2018 by a group of senior information security experts with backgrounds in blockchain security, cryptography, computer security, malware analysis and network security. It is safe and powerful, it is a digital asset management platform that mainly assists different companies to provide the best solution for protecting assets in their cryptocurrency industry. The CYBAVO team has a lot of international experience and foresight to provide a sound password management mechanism for the information security of digital assets. In the middle of last year, CYBAVO stood out in the Pitch event held by the 2021 SelectUSA Investment Summit, the highest standard business event organized by the US Department of Commerce, and won the first place in the information security briefing competition.

IKA BLOCK, a local blockchain developer, was jointly established by several senior software engineers in 2017. It is the first hong kong blockchain technology company focusing on blockchain technology, project development, wallet security and assisting customers to promote blockchain projects. Harry Chan, director of blockchain technology of IKA BLOCK, believes that the virtual currency market has developed rapidly in the past few years, and the security protection of assets is the foundation of all development. How to balance security and convenience in Private Key management is also the most challenging problem at present. There is a lack of secure institutional-level end-to-end solutions. Due to financial security issues, such as many exchanges, wallets, and celebrity NFT projects have been hacked and stolen, many traditional companies are afraid to enter the blockchain market. Therefore, blockchain security is definitely the most important battlefield in the blockchain industry. Through cooperation with CYBAVO, IKA BLOCK is confident that it can protect the assets of more companies and witness the new era of "fiat to crypto assets" with CYBAVO .

More info:

https://ikablock.com/2022/05/03/cybavo-announces-partnership-with-ika-block-to-expand-footprint-in-apac/

https://www.cybavo.com/blog/cybavo-ikablock-partnership/

CYBAVO official website: https://cybavo.com

IKA BLOCK official website: https://ikablock.com

Media Details:

Name: IKA BlockEmail:media@ikablock.comCity: HongKongCountry: HongKong

There is no offer to sell, no solicitation of an offer to buy, and no recommendation of any security or any other product or service in this article. Moreover, nothing contained in this PR should be construed as a recommendation to buy, sell, or hold any investment or security, or to engage in any investment strategy or transaction. It is your responsibility to determine whether any investment, investment strategy, security, or related transaction is appropriate for you based on your investment objectives, financial circumstances, and risk tolerance. Consult your business advisor, attorney, or tax advisor regarding your specific business, legal, or tax situation. Newsroom: abrelease.submitmypressrelease.com

Read the original post:
IKA BLOCK signed a cooperation agreement with CYBAVO, the leading blockchain information security in Asia. - GlobeNewswire

BT and Toshiba address QKD concerns with new trial – IT PRO

BT and Toshiba have officially launched the trial of their quantum-secured metro network which will protect the transmission of valuable data between multiple physical locations around London using quantum key distribution (QKD).

Although QKD offers unhackable encryption that is powerful enough to protect organisations from the rising threat of quantum cyber attacks, its still susceptible to man-in-the-middle (MITM) attacks, in which an exchange between two computer systems is breached by a third party.

However, Andrew Shields, head of the Quantum Technology Division at Toshiba told IT Pro that BT and Toshibas network is protected from man-in-the-middle attacks through quantum-safe conventional cryptography authentication:

When the other side receives a communication, they have to know where it's coming from and that hasn't been changed in transit and we use conventional cryptography to do that authentication, said Shields.

The cryptography is quantum-safe, meaning that it cant be broken by a quantum computer, he added.

BT's managing director for applied research Tim Whitley told IT Pro that BT had been in touch with the National Cyber Security Centre (NCSC), which previously raised the concernsof potential man-in-the-middle attacks.

They're fully aware of what we're doing in this trial and I think theyre actually very supportive of the research, he said. The NCSC wasnt immediately available to comment.

The state of brand protection 2021

A new front opens up in the war for brand safety

First announced in October 2021 and scheduled to last for three years, the trail follows a smaller-scale experiment successfully conducted last year at BTs research and engineering campus in Adastral Park, Ipswich, where researchers used a six-metre-long hollow, air-filled cable.

This time around, the fibre ring connecting the three BT core nodes has a total length of approximately 76 km, stretching from Slough to Londons West End and City, with a trial catchment area of 20km in radial distance.

Commenting on the official launch, Minister for Science, Research and Innovation George Freeman said that the trial represents significant progress towards achieving our ambition to make the UK a quantum-enabled economy.

This is the kind of innovation that helps cement the UK as a global innovation economy in the vanguard of discovering, developing and commercially adopting transformational technology with real societal benefits," he added.

Oracle analytics for dummies

Freedom from data overload

The future of restaurants

Keeping customers hungry for more

Automating the modern data warehouse

Freedom from constraints on your data

Oracles modern data platform strategy

Freedom from manual data management

Read more:
BT and Toshiba address QKD concerns with new trial - IT PRO

In praise of the Feistel network – MIT Technology Review

Given that context, the NBSs choice was perplexing. On the one hand, DES did deliver on its promise: after decades of analysis, there is still essentially no way to decrypt DES-encrypted data other than potentially trying every key, in whats called an exhaustive search. But on the other hand, one would expect that the 56-bit key would be nowhere near as strong as the 128-bit Lucifer.

Mounting an exhaustive search against DES was at the edge of possibility in 1975. Martin Hellman, a professor of computer science at Stanford University, and Whitfield Diffie 65, a researcher in Hellmans lab, estimated that for $20 million the US government could build a machine capable of trying all possible keys; adding just eight more key bits would increase the difficulty by a factor of 256, making a key search practically impossible. It was as if the proposed standard had been carefully designed so that DES-encrypted messages could be cracked by the US government but not by US corporations.

Feistel was born in Germany in 1915 into a middle-class Protestant family. His aunt married a wealthy German Jew named Franz Meyer, and the two fled Germany for Zrich, Switzerland, before 1931.

When Hitler came to power in 1933, Feistel was terrified that compulsory military service would be reinstated (which it was). So his uncle devised a plan to have Feistel attend summer school at Columbia University in 1934 to improve his English, then enroll at the Eidgenssische Technische Hochschule (ETH) in Zrich for college, and finally transfer to a university in the US to complete his studies and obtain permanent residence. The plan worked, and Feistel entered MIT in the fall of 1936. Meyer and his wife followed, moving to New York City before 1940.

Feistel graduated from MIT in 1937 with a degree in physics and continued as a graduate student until 1938, when he enrolled at Harvard. He became a US citizen on January 31, 1944. The following day, he told me, he was given a top secret clearance, recalls Diffie. Yet Feistel felt that he experienced discrimination because of his German heritage. Although he had been interested in codes and cryptography since he was a child, he couldnt work on them. He said something to someone during the war and was told that it was not the time for a German to be talking about cryptography, Diffie recalls.

Finally, he got his chance. After working at the MIT Radiation Laboratory, Feistel got a job at the Air Force Cambridge Research Center (AFCRC), which had been asked to evaluate an Identification Friend or Foe (IFF) system that aircraft used to identify themselves to radar systems so as not to be shot down.

Feistels group found a flaw with the system and developed a better approach based on cryptography. Its not clear whether it was ever deployed: within a few years, the AFCRC cryptography group was shut down, likely because the Department of Defense was centralizing cryptographic research at the NSA. But modern IFF systems do employ cryptography and a key that is changed regularly.

In November 1957 Feistel took a job at MIT Lincoln Laboratory, where he wrote a report summarizing the IFF work done at AFCRC. Whatever the particular application may be, any scheme of secret communication should be carefully analyzed and evaluated for its merits and faults, he concluded. It is better to know where one stands, than being SPOOFED into a false sense of security, through lack of knowledge or perhaps even inventors pride.

Lincoln didnt work out for Feistel, though, and neither did MITRE, the Bedford-based research firm, where he went in 1961. My father wasnt very happy there, recalls his daughter, Peggy Chester: again, Feistel thought colleagues discriminated against him because he was German. Feistel took pride in his German heritage and in German engineering, says Harold Mattson, PhD 55, who worked with Feistel at AFCRC. He adds that Feistel was also somewhat bitter about the postwar world order, describing the United Nations as a Victors Club on more than one occasion.

It may have been during his years at MITRE that Feistel developed his encryption approach. But if so, he didnt share it. He was very cautious about revealing his Lucifer code, his daughter says. He was afraid that other people would take it from him. Its also possible that cryptography work he wanted to do at MITRE was being stifled by the NSA.

In 1968, Feistel moved to IBM, which hired him specifically to work on cryptography for commercial applications. Its here that he likely perfected his encryption algorithm. On June 30, 1971, the company filed a patent application for his Block Cipher Cryptographic System. NSA reviewed the application and issued a secrecy order blocking publication of the patentbut NSAs order, dated October 17, 1973, was five months after the Scientific American article. NSAs order was rescinded on November 14, 1973, and US Patent 3,798,359 was published on March 19, 1974, with H. Feistel listed as the inventor.

Horst was key to the IBM cryptographic research effort, says Hellman, who also taught at MIT from 1969 to 1972. In 1973, when Horst published that paper, it was an eye-opener for many of us. It opened an approach to cryptography that made a lot of sense. Today the approach is so identified with Feistel that the basic design of DES and other similar algorithms is called a Feistel network.

Meanwhile, Diffie and Hellman discovered public-key cryptography in 1976. One of its primary uses is to distribute encryption keys for algorithms like DES.

Work by Don Coppersmith 72 published in the IBM Journal of Research and Development in 1994, four years after Feistels death, revealed that IBM knew by 1975 that the 128-bit Lucifer key would have been vulnerable to differential cryptanalysis, a cryptanalytic attack independently discovered by academics in the late 1980s. In the process of strengthening Lucifer, IBM shortened the key. In other words, when DES was approved for use in the 1970s, it might have been stronger than Lucifer after all.

But by the mid-1990s, computer scientists widely acknowledged that the 56-bit key was no longer secure and argued that DES should no longer be used to protect information.

To demonstrate that US policy was putting privacy at risk, in 1998 the Electronic Frontier Foundation constructed a machine called Deep Crack that cracked a DES-encrypted message in just 56 hours. The machine cost $250,000 to build, but most of that was engineering costs: EFF estimated that the second machine would cost less than $50,000.

Our research results prove that DES can be cracked quickly on a low budget, the EFF book Cracking DES concludes.

DES was replaced by a new algorithm called the Advanced Encryption Standard on May 26, 2002. As near as anyone knows, AES is still secure.

Read this article:
In praise of the Feistel network - MIT Technology Review

Cypherpunk Announces Investment of USD 500K into Cryptocurrency Hedge Fund AB Digital Strategies Managed by Isla Capital Ltd. – Yahoo Finance

Toronto, Ontario--(Newsfile Corp. - April 26, 2022) - Cypherpunk Holdings Inc. (CSE: HODL) (OTC Pink: CYFRF) ("Cypherpunk" or, the "Company"), a sector leader for blockchain, metaverse, privacy and cryptography focused investments, is pleased to announce an investment of USD 500k in the AB Digital Strategies Fund managed by UK FCA-regulated Isla Capital. The investment was made in two tranches, USD $250k on February 24, 2022 and USD $250k on April 20, 2022.

About AB Digital Strategies

AB Digital Strategies is a Cayman Islands regulated hedge fund. The Fund implements a market neutral strategy targeting meaningful absolute return, with low volatility and minimal correlation to crypto markets and mainstream asset classes. Using a disciplined investment process, the Fund combines multiple independent trading strategies across a range of liquid crypto markets (spot and derivative) and decentralised finance ecosystems. Investment decisions are research-based and driven by fundamental, quantitative and market intelligence inputs. The investment team has multiple decades' experience in quantitative portfolio management, legal and financial structuring and trading, across both traditional finance as well as crypto markets since their early inception.

About Isla Capital

Isla Capital is a London-based investment manager deploying in-house, liquid alternative strategies in digital assets.

Isla Capital Ltd. is registered with the Financial Conduct Authority in the United Kingdom (FRN: 959846) as an Appointed Representative of Odin Capital Management Ltd. (FRN: 478321) which is authorized and regulated by the Financial Conduct Authority.

Cypherpunk Holdings CEO, Jeff Gao, leads the move to diversify the company's treasury management away from passive storage and made the following comments in relation to the partnership with Isla Capital.

"The time when publicly traded companies can get by as a vehicle for passively holding crypto is behind us. What will set Cypherpunk apart from the rest of the industry is our focus on surgically targeting pockets of excess returns and alpha opportunities in crypto markets and our focus on risk-adjusted returns as a metric for treasury management excellence.

Story continues

"Going forward, Cypherpunk's strategy will include operating a diversified portfolio of niche and highly technical strategies within the nascent cryptocurrency markets, some of which will be operated by third parties. Our engagement with Isla Capital serves to work towards our plan to engage partners with extensive trading experience who can perform crypto research for the purpose of profiting off directionally neutral strategies across exchanges, instruments and other protocols.

"I've had great pleasure working with Ron Akram and William Beverley, co-founders of Isla Capital, both of whom bring considerable asset management and market experience to the table. I am looking forward to future collaborations between Cypherpunk and Isla as our company undergoes a pivotal transformation."

About Cypherpunk Holdings Inc.

Cypherpunk was established to invest in currencies, companies, technologies and protocols, which enhance or protect privacy. Its strategy is to make targeted investments in businesses and assets with strong privacy attributes, often within the blockchain ecosystem, including select cryptocurrencies. Current equity investments include Bitcoin, Ethereum, Samourai Wallet, Wasabi Wallet, Chia, NGRAVE, and Animoca Brands.

Cautionary Note Regarding Forward-Looking Information

This news release contains "forward-looking information" within the meaning of applicable securities laws. Generally, any statements that are not historical facts may contain forward-looking information, and forward-looking information can be identified by the use of forward-looking terminology such as "plans", "expects" or "does not expect", "is expected", "budget", "scheduled", "estimates", "forecasts", "intends", "anticipates" or "does not anticipate", or "believes", or variations of such words and phrases or indicates that certain actions, events or results "may", "could", "would", "might" or "will be" taken, "occur" or "be achieved". Forward-looking information includes, but is not limited to the Company's expectation or belief regarding its investment in shares of Animoca Brand and Animoca Brand's future performance or business. There is no assurance that the Company's plans or objectives will be implemented as set out herein, or at all. Forward-looking information is based on certain factors and assumptions the Company believes to be reasonable at the time such statements are made and is subject to known and unknown risks, uncertainties and other factors that may cause the actual results, level of activity, performance or achievements of the Company to be materially different from those expressed or implied by such forward-looking information. There can be no assurance that such forward-looking information will prove to be accurate, as actual results and future events could differ materially from those anticipated in such information. Accordingly, readers should not place undue reliance on forward-looking information. Forward-looking statements are made based on management's beliefs, estimates and opinions on the date that statements are made and the Company undertakes no obligation to update forward-looking statements if these beliefs, estimates and opinions or other circumstances should change, except as required by law. Investors are cautioned against attributing undue certainty to forward-looking statements.

Officer/Director Contact:Jeffrey GaoChief Executive Officerjeff@cypherpunkholdings.comOffice: 1-647-946-1300

Investor Relations Contact: Veronika OswaldInvestor Relationsveronika@cypherpunkholdings.comOffice: 1-647-946-1300

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/121635

Read the original:
Cypherpunk Announces Investment of USD 500K into Cryptocurrency Hedge Fund AB Digital Strategies Managed by Isla Capital Ltd. - Yahoo Finance

Sequitur Labs and Lenovo join forces to secure AI models at the edge – Help Net Security

Sequitur Labs announced that it has been selected by Lenovo as the technology vendor of choice for protecting edge AI computing applications utilized as part of the Lenovo ThinkEdge SE70 platform.

ThinkEdge SE70 is a powerful and flexible AI edge platform for enterprise designed to meet the expanding intelligent transformation needs from logistics, transportation and smart cities to retail, healthcare and manufacturing. The new edge solution from Lenovo is powered by the NVIDIA Jetson Xavier NX system on module. Implementing Sequitur as the security suite better ensures that Lenovos SE70 isolates dedicated hardware running AI models and delivering inferences and relevant data thereby helping to secure AI models at the edge.

Internet of Things (IoT) deployment is a tremendous market opportunity for both solution providers and enterprises based on the ability of AI solutions at the edge to make decisions to optimize operations and support new strategies, said Blake Kerrigan, General Manager of ThinkEdge, Lenovo Intelligent Devices Group. Although these devices offer significant upside, there remains an equally great need to better secure and protect the devices and IP in deployment. Thats why we are committed to work with Sequitur Labs to develop our first appliance designed to better protect AI models at the edge.

Sequitur Labs EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount, in particular, protection of AI models at the edge. Supporting security functions for encryption, storage, data transmission and key/certificate management are delivered by EmSPARK and housed in a microprocessors secure memory partition. IoT hardware manufacturers use EmSPARK to easily implement device-level security by addressing technical, IP, supply chain and business process challenges.

Developers can easily build applications that use security enhanced resources without having to become experts in cryptography and complex chip-level security technologies. Overall, the solution reduces security development and deployment time and investment by 40 to 70 percent, significantly reduces risk, and reduces BOM costs by removing hardware dedicated-security like Trusted Platform Modules (TPMs).

Having developed a robust security suite that already integrates with cloud platforms and supports NVIDIA Jetson, our working with Lenovo to extend protection to their ThinkEdge platform was a natural extension of the EmSPARK technology, said Larry OConnell, Vice President of Marketing, Sequitur Labs. As more and more enterprises begin to incorporate IoT devices like the ThinkEdge SE70 into their overall network architecture, having an integrated security suite provides peace of mind that they are better protected from attacks throughout the life of the product. We are pleased to have been selected by Lenovo to help secure and manage AI models at the edge.

The Lenovo ThinkEdge SE70 is available in select markets worldwide.

Go here to read the rest:
Sequitur Labs and Lenovo join forces to secure AI models at the edge - Help Net Security

Pentagon’s outgoing data boss warns of quantum cyber threats – Stars and Stripes

The Pentagon in Arlington, Va., as seen on Sept. 17, 2021. (Stefani Reynolds/Bloomberg)

The U.S. Department of Defense's outgoing chief data officer called for the Pentagon to make urgent investments to defend against potential espionage from quantum computers -- nascent technology that could one day break the encryption that protects American secrets.

In his first interview since leaving his post last month, David Spirk, who spent two years in his role, told Bloomberg News that the Pentagon needs to speed up efforts to counter adversaries who are developing military tools supported by advanced technologies such as artificial intelligence, machine learning and eventually quantum science.

Quantum computing may prove far more able than existing technology to solve mathematical problems at exponentially faster speeds. That could enable operators to unscramble the algorithms that underpin encryption protocols, unlocking an array of sensitive data.

"I don't think that there's enough senior leaders getting their heads around the implications of quantum," Spirk said. "Like AI, I think that's a new wave of compute that when it arrives is going to be a pretty shocking moment to industry and government alike."

"We have to pick up pace because we have competitors who are also attempting to accelerate," he added.

Spirk's comments come amid warnings that U.S. adversaries, particularly China, are aggressively pursuing advanced technologies that could radically accelerate the pace of modern warfare. China is investing in AI and quantum sciences as part of its plan to become an innovation superpower, according to the Pentagon's latest annual report to Congress on China's military power. China is "at or near the lead on numerous science fields," including AI and quantum, it said.

The National Security Agency, meanwhile, said last year that the adversarial use of a quantum computer "could be devastating" to the U.S. and its national security systems. The NSA said it could take 20 years or more to roll out new post-quantum cryptography that would resist such code-cracking.

Tim Gorman, a spokesperson at the Pentagon, said the Department of Defense was taking post-quantum cryptography seriously and coordinating with Congress and across government agencies. He added there was "a significant effort" underway.

A January presidential memo further charged agencies with establishing a timeline for transitioning to quantum resistant cryptography.

Among the efforts underway to bolster defenses against quantum-based attacks, the National Institute of Standards and Technology, known as NIST, is seeking to select new quantum-proof encryption algorithms from seven finalists shortly as part of a global competition.

Jonathan Katz, computer science professor at the University of Maryland who submitted a "post-quantum algorithm" to the NIST competition, said the stakes in the NIST competition were high: an algorithm that later proved vulnerable would be "a disaster." Once a choice is made, the U.S. Department of Defense faces a huge task in upgrading all its software and hardware that features algorithms, he said, adding that included not only servers and laptops but also parts of submarines, tanks, helicopters and weapons systems.

Experts generally assess large-scale quantum computing may be 15 to 20 years away if it is ever even developed, but the Pentagon's Defense Advanced Research Agency, or DARPA, launched a project this February to explore the possibility that a breakthrough could be developed "much sooner."

Joe Altepeter, who manages DARPA's new quantum project, told Bloomberg there was a lot of "hype" over industry claims about the arrival of quantum computing, with several "hardware miracles" still standing in the way. Some of the smartest physicists he knew were divided over whether useful quantum computing would ever exist, Altepeter said, adding that the risk was such that it was important to develop resilient systems.

Spirk said the Pentagon needs to start preparing "now," arguing military applications for quantum computing could be only five to 10 years away. The Pentagon needed to work at the same speed as commercial vendors that are already exploring ways to use quantum-resistant cryptography to safeguard financial and health-care sectors, he said.

If the U.S. doesn't make the right investments in defensive quantum today, "then our concepts around encryption, data security and cybersecurity will be obsolete because the computers will break our cryptography," Spirk said. He added that all the encrypted data that adversaries have already gathered would also risk exposure.

Spirk, a former U.S. Marine, became the first chief data officer at Special Operations Command before he joined the Pentagon. He said he left the chief data officer post after a two-year commitment to rejoin his family in Florida. The departure follows last year's resignation of the U.S. Air Force's first chief software officer, Nicolas Chaillan, who previously told the Financial Times that the U.S. was losing the AI race to China.

More here:
Pentagon's outgoing data boss warns of quantum cyber threats - Stars and Stripes