Senior Lecturer in Cybersecurity job with UNIVERSITY OF GREENWICH | 231405 – Times Higher Education (THE)

School of Computing & Mathematical Sciences

Location: GreenwichSalary: 40,322 to 49,553 plus 3706 London weighting per annumContract Type: PermanentClosing Date:Thursday 26 November 2020Interview Date: To be confirmedReference:2461

The University is seeking to recruit a Senior Lecturer in Cybersecurity, who wishes to embark on an academic career conducting quality research and lecturing on postgraduate and undergraduate programmes. Candidates will have a background that would complement our existing activities (IoT security, Cryptography, mobile systems). Outstanding candidates in other areas of Cybersecurity will also be considered.

The successful candidate will work closely with departmental academic teams and be expected to contribute to existing teaching and research. The role has a strong emphasis on, and support for, research and enterprise activity, including participation in projects jointly launched by other members of the Department and Faculty. Candidates will be expected to join our Internet of Things and Security Research Centre, which is host to a number of H2020 and EPSRC projects.

You will be able to demonstrate a strong teaching and research profile, and some experience of project management and grant applications would be desirable. You will have a good first degree (1stor 2:1) in a relevant subject together with a PhD.

Should you have any queries please contact the HR Recruitment Team on HR-Recruitment@gre.ac.uk

We are looking for people who can help us deliver our mission of transforming lives through inspired teaching and research, through ourvalues.

Read this article:
Senior Lecturer in Cybersecurity job with UNIVERSITY OF GREENWICH | 231405 - Times Higher Education (THE)

When Encryption Was a Crime: The 1990s Battle for Free Speech in Software – Reason

This is the third installment in Reason's four-part documentary series titled "Cypherpunks Write Code." Watch part 1 and part 2.

In 1977, a team of cryptographers at MIT made an astonishing discovery: a mathematical system for encrypting secret messages so powerful that it had the potential to make government spying effectively impossible.

Before the MIT team could publish a description of how this system worked, the National Security Agency (NSA) made it known that doing so could be considered a federal crime. The 1976 Arms Export Control Act (AECA) made it illegal to distribute munitions in other countries without a license, including cryptography. The penalty for violating AECA was up to 10 years in prison or a fine of up to one million dollars.

It was the beginning of the "crypto wars"the legal and public relations battle between the intelligence community and privacy activists over the rights of citizens to use end-to-end encryption. Many of those who were involved in the crypto wars were associated with the "cypherpunk movement," a community of hackers, hobbyists, and computer scientists, which the mathematician Eric Hughes once described as "cryptography activists."

The crypto wars continue to this day: On October 11, 2020, U.S. Attorney General William P. Barr issued a joint statement with officials from six other countries that implored tech companies not to use strong end-to-end encryption in their products so that law enforcement agencies can access the communications of their customers.

The government's stance traces back to World War II, when Allied code-breakers helped secure victory by deciphering secret messages sent by the Axis powers. "And that is the origin of the regulations that said, 'This is munition, this is an item of war,'" civil liberties activist John Gilmore told Reason. "And the problem was that they didn't really take freedom of speech, freedom of inquiry, academic freedom, into account in that."

In 1977, the Institute of Electrical and Electronics Engineers, which was planning to hold a conference on cryptography at Cornell University, received a letter from an NSA employee posing as a concerned citizen, who wrote that the U.S. government considered these mathematical systems "modern weapons technologies" and that distributing them was a federal crime. The letter caused widespread alarm in the cryptography community.

In 1977, the computer scientist Mark S. Miller was a 20-year-old student at Yale. Like many future cypherpunks, he read about the breakthrough at MITin Martin Gardner's "Mathematical Games" column published in Scientific American. The article laid out the astounding details of what"RSA," as it was called after its co-discoverers, Ron Rivest, Adi Shamir, and Leonard Adleman, made possible. Gardner omitted the technical details, but he offered his readers the opportunity to mail in a self-addressed stamped envelope to get a full description. The authors received 7,000 requests for the memo but didn't end up distributing the paper because of the NSA's threats.

"I decided quite literally that they are going to classify this over my dead body," Miller recalls. He traveled to MIT and got his hands on the unpublished paper describing how RSA worked. Then he went to "a variety of different copy shops, so I wasn't making lots of copies in any one place" and mailed them anonymously "to home and hobbyist computer organizations and magazines all across the country."

"I gave copies of the paper to some select friends of mine," Miller told Reason, "and I told them, 'if I disappear, make sure this gets out.'"

The following year, the RSA paper was published in Communications of the A.C.M. "And the world has been on a different course ever since it got published," says Miller.

But the crypto wars were just getting started. By the early 1990s, after the launch of the commercial internet and the web, RSA and public-key cryptography were no longer a rarified topic; they were privacy salvation. Internet users could use RSA to fully disguise their online activities from government spies. This sent the intelligence community once again scrambling to stop the dissemination of this powerful tool.

In 1991, a software developer named Phil Zimmermann released the first relatively easy-to-use, messaging system with end-to-end encryption, which was called Pretty Good Privacy, or PGP. So the U.S. Justice Department launched a three-year criminal investigation of Zimmermann on the grounds that by making his software accessible outside the country, he could be guilty of exporting weapons.

The NSA made the public case that Zimmermann's software would be used by child molesters and criminals. "PGP, they say, is out there to protect freedom fighters in Latvia," Stewart A. Baker, the NSA's general counsel, remarked during a panel discussion at the 1994 Conference on Computers, Freedom, and Privacy. "But the fact is, the only use that has come to the attention of law enforcement agencies is a guy who was using PGP so the police could not tell what little boys he had seduced over the 'net."

"Child pornographers, terrorists, money launderers, take your pickthese are the people who will be invoked as the bringers of death and destruction," Tim May, a former Intel physicist and co-founder of the cypherpunk movement, told Reason. "It's true" that these individuals would make use of end-to-end encryption, May conceded, "but all technologies have had bad effects. Telephones led to extortion, death threats, bomb threats, kidnapping cases. Uncontrolled publishing of books could allow satanic books to appear."

In his 1994 essay "The Cyphernomicon," May referred to terrorists, pedophiles, drug dealers, and money launderers as "The Four Horsemen of the Infocalypse." This fearmongering was the government's main playbook for how "privacy and anonymity [could] be attacked."

The cypherpunks argued that although PGP was encryption software, it was protected by the First Amendment because under the hood it was just a written series of instructions to be carried out by a machine.

The economist and entrepreneur Phil Salin was one of the first to argue this point in an influential 1991 essay titled "Freedom of Speech in Software." Salin wrote that "[r]estraint on freedom of expression of software writers is anathema in a free society and a violation of the First Amendment."

"Encryption can't be controlled whether or not it's powerful or has impacts on the government because it's free speech," says Gilmore, a co-founder of both the cypherpunk movement and the Electronic Frontier Foundation. In the 1990s, he risked going to jail in his campaign to force the government to acknowledge that regulating encryption violated the First Amendment.

"We basically had a community of a thousand people scattered around who were all trying different ideas on how to get around the government to get encryption to the masses," Gilmore recalls.

The Clinton administration noted in a 1995 background congressional briefing that "Americans have no constitutional right to choose their own method of encryption" and pushed for legislation that would require companies to build in a mechanism for law enforcement agencies to break in.

"We're in favor of strong encryption, robust encryption," then FBI DirectorLouis J. Freeh said at a May 11, 1995, Senate hearing. "We just want to make sure we have a trap door and a key under some judge's authority where we can get there if somebody is planning a crime."

The cypherpunks looked for ways to undercut the government's case by pointing out the similarities between encryption software and other forms of protected speech. While under federal investigation for making his software available for download outside the U.S., to prove a point Zimmermann convinced MIT press to mirror his action in the analog world, by printing out the PGP source code, adding a binding, and shipping it to European bookstores.

"MIT was at that time like three times as old as NSA, and it's at least as large a player in the national security community," says the cryptographer Whitfield Diffie, who co-discovered the concept of public-key cryptography on which RSA is based. 'It's one thing to try to go and step on little Phil Zimmermann; it's quite another thing to go after MIT."

"The government knew if they went to court to suppress the publication of a book from a university that they would lose and they would lose in a hurry," Gilmore recalls.

"There were people who actually got encryption code tattooed on their bodies and then started asking, 'Can I go to a foreign country?,'" Gilmore says. "We printed up T-shirts that had encryption code on them and submitted them to the government office of munitions control'Can we publish this T-shirt?' Ultimately, they never answered that query because they realized to say 'no' would be to invite a lawsuit they would lose and so the best answer was no answer at all."

In 1996, the Justice Department announced that it wouldn't pursue criminal charges against Phil Zimmermann and major legal victories came in two separate federal court decisions, which found that encryption is protected by the First Amendment.

"The crypto wars is still ongoing," says Gilmore. "What we won in the first rounds was the right to publish it and the right to put it in mass-market software, but what we didn't actually do is deploy it in mass-market software. Now there are major companies building serious encryption into their products, and we're getting a lot of pushback from the government about this."

In the early 90s, at the same time that Gilmore was fighting his legal battle for freedom of speech in software, the cypherpunks were exploring cryptography's potential in the context of collapsing political borders and the rise of liberal democracy. Part four in Reason's series, "Cypherpunks Write Code," will look at how those dreams turned to disillusionment, and the rebirth of the cypherpunk movement after the invention of bitcoin.

Written, shot, edited, narrated, and graphics by Jim Epstein; opening and closing graphics and Mark S. Miller/RSA graphics by Lex Villena; audio production by Ian Keyser; archival research by Regan Taylor; feature image by Lex Villena.

Music: "Crossing the ThresholdGhostpocalypse" and "Darkest Child"byKevin MacLeodis licensed under aCreative Commons Attribution license; "High Flight" by Michele Nobler licensed from Artlist; "modum" by Kai Engel used under Creative Commons.

Photos: Photo 44356598 Konstantin KamenetskiyDreamstime.com; Photo 55458936 Jelena IvanovicDreamstime.com; Photo 21952682 Martin HaasDreamstime.com; Photo 143489196 Chalermpon PoungpethDreamstime.com; ID 118842101 Andrey Golubtsov | Dreamstime.com; Freeh and Clinton, Mark Reinstein/ZUMA Press/Newscom; Freeh and Clinton, Ron SachsCNP/Newscom; WhatsApp Founders, Peter DaSilva/Polaris/Newscom; Bill Barr and Trump: CNP/AdMedia/Newscom; MIT, DEWITT/SIPA/Newscom; John Gilmore photos by Quinn Norton, Attribution-NonCommercial-ShareAlike 2.0 Generic; Bill Clinton in Oval Office, Robert McNeely/SIPA/Newscom; Bill Clinton, White House/SIPA/Newscom; Louis J. Freeh and Bill Clinton, Ron SachsCNP/Newscom; James Comey, KEVIN DIETSCH/UPI/Newscom; Bobby Inmann, Dennis Brack / DanitaDelimont.com "Danita Delimont Photography"/Newscom; John Gilmore, Paul Kitagaki Jr./ZUMA Press/Newscom; Berlin Wall, Associated Press.

Read the original:
When Encryption Was a Crime: The 1990s Battle for Free Speech in Software - Reason

15%+ growth for Encryption Software Market by 2024, global revenue to reach $20bn – News by Decresearch

Increasing number of data breaches and cybercrimes and supportive government policies will enable encryption software market to witness a bullish growth over the coming years. This can be validated by the draft of an encryption law published by Chinas State Cryptography Administration (SCA) in November 2019. The draft was issued to bring about encryption in the private & public sectors and set guidelines on the use of cryptography for protecting national security.

Cybersecurity vendors are addressing evolving threats by offering security threats, resulting in the higher implementation of email, mobile, and disk encryption capabilities, which will spur encryption software market growth.

Get sample copy of this research report @ https://www.decresearch.com/request-sample/detail/4484

Rising instances of data breaches and cyberespionages coupled with intensifying concerns to safeguard critical data in various sectors, including BFSI, healthcare, defense, etc. is likely to drive global encryption software market outlook.

According to the Health Insurance Portability and Accountability Act Journal, the healthcare sector encounters the highest breach costs, accounting for an average mitigation cost of USD 6.45 million, globally.

Supportive government initiatives to combat the issue of cybercrime will support industry growth. For instance, in 2019, China SCA (State Cryptography Administration) published a draft of an encryption law, which will regulate encryption in the public and private sectors. The draft has also set guidelines on the usage of cryptography to safeguard national security.

Apart from the healthcare sector, the retail sector is also likely to observe heavy uptake of encryption solutions the sector extensively uses third-party services to support online transactions. This is resulting in increased number of data breaches, exploitation of sensitive customer information, such as bank account and credit card details. To keep pace the with constantly evolving cyber risks, cybersecurity vendors are implementing mobile, disk, and email encryption capabilities with their security suites. Global encryption software market is forecast to cross the USD 21 billion mark by 2026.

Increasing dependence on electronic medium as a means of communication also comes with the risk of data breaches. The most commonly utilized modern-day form of communication is e-mail. Organizations and companies of all statures rely on e-mails for communicating confidential matters, such as contract papers, personal data, business secret passwords, etc.

To secure various aspects of email systems including content, media attachments or email access, demand for email data protection software will skyrocket. The email data protection software encrypts data at rest, as well as in transit, and also supports multi-factor authentication for added security, in order to ensure that sensitive information is always protected in line with regulatory compliance.

With increasing uptake of security software to protect data from identity thefts, phishing and malware, email encryption software market is estimated hold a share of around 25% by 2026.

Growing usage of digital platforms has led to rising number of cyberattacks on critical data and secret information. According to a report published by a cybersecurity provider, Thales eSecurity, around 75% of the retailers across the U.S. have experienced data breach in 2018, much more than what is was in 2017 (52%).

Latin America encryption software market is touted to grow at 18% CAGR over 2020-2026 owing to supportive government initiatives to promote cybersecurity solutions aimed at curbing increased number of cyberattacks on the business-critical infrastructure.

The rapidly evolving threat landscape has compelled governments across the globe to promote digital security to safeguard sensitive information and to prevent theft of general publics confidential data.

The government agencies in multiple countries, including Brazil, Argentina, and Mexico are introducing cybersecurity strategies to respond to a plethora of cyberattacks. For instance, the Mexican government presented the National Cyber Security Strategy in collaboration with the CICTE (Inter-American Committee against Terrorism) in 2017. The strategy adopted by the Mexican government aims at establishing best practices to fight against cybercrimes.

Request for customization @ https://www.decresearch.com/roc/4484

In 2019, Mexican institutions, including the National Defense Ministry (Sedena), Mexico Central Bank, the House of Representatives and the Mexico Supreme Court, recorded more than 45 million attempted attacks to access databases and steal information.

Table of Contents (ToC) of the report:

Chapter 5. Encryption Software Market, By Component

5.1. Key trends, by component

5.2. Software

5.2.1. Market estimates and forecast, 2015 2026

5.2.2. Endpoint encryption

5.2.2.1. Market estimates and forecast, 2015 2026

5.2.3. Email encryption

5.2.3.1. Market estimates and forecast, 2015 2026

5.2.4. Cloud encryption

5.2.4.1. Market estimates and forecast, 2015 2026

5.3. Service

5.3.1. Market estimates and forecast, 2015 2026

5.3.2. Training & consulting

5.3.2.1. Market estimates and forecast, 2015 2026

5.3.3. Integration & maintenance

5.3.3.1. Market estimates and forecast, 2015 2026

5.3.4. Managed service

5.3.4.1. Market estimates and forecast, 2015 2026

Chapter 6. Encryption Software Market, By Deployment Model

6.1. Key trends, by deployment model

6.2. On-premise

6.2.1. Market estimates and forecast, 2015 2026

6.3. Cloud

6.3.1. Market estimates and forecast, 2015 2026

Chapter 7. Encryption Software Market, By Application

7.1. Key trends, by application

7.2. IT & telecom

7.2.1. Market estimates and forecast, 2015 - 2026

7.3. BFSI

7.3.1. Market estimates and forecast, 2015 2026

7.4. Healthcare

7.4.1. Market estimates and forecast, 2015 - 2026

7.5. Retail

7.5.1. Market estimates and forecast, 2015 2026

7.6. Government & public sector

7.6.1. Market estimates and forecast, 2015 - 2026

7.7. Manufacturing

7.7.1. Market estimates and forecast, 2015 2026

7.8. Others

7.8.1. Market estimates and forecast, 2015 - 2026

Browse complete Table of Contents (ToC) of this research report @ https://www.decresearch.com/toc/detail/encryption-software-market

Go here to see the original:
15%+ growth for Encryption Software Market by 2024, global revenue to reach $20bn - News by Decresearch

Crypto craze may drive regulators to back their use – Mint

Central bankers globally are wary of rising interest in cryptocurrencies since Facebook decided to launch one of its own. Besides PayPal Holdings Inc. allowing its customers to use virtual currency on Wednesday has added to investor exuberance. Mint explores the issue.

View Full Image

Hows cryptocurrency trade carried out?

Cryptocurrencies, including Bitcoin, are digital currencies, wherein the transaction records are verified and maintained on a decentralized system, which uses cryptography, replacing a central authority for maintaining records. Bitcoin is one among several such products, but is one of the most widely-known and used cryptocurrencies. The technology is based on block-chain, or a distributed public ledger. There are several cryptocurrency exchanges that allow trading using actual money essentially allowing the cryptocurrency to be converted to cash.

Where do they derive their value from?

Normal currencies derive their value by fiat and are thus known as fiat currencies. That is, a 2,000 note has a nominal value of 2,000 because of the governments fiat. However, in case of Bitcoin, there is no such central authority that determines its value. The value is determined by the cryptocurrency exchanges or markets where the forces of demand and supply interact, leading to price discovery. This is one primary reason why the cryptocurrency experience is highly volatile in terms of their value, which undermines the critical function of store of value provided by fiat money.

View Full Image

What is the risk of having private cryptocurrency?

Most central bankers regulate the amount of money supply and determine interest rates to ensure price stability, but will not be able to have control over private the supply of a cryptocurrency. Besides, there are concerns over cryptocurrency use to finance illegal activities, which further makes governments wary of such private cryptocurrencies.

Will central banks look at digital currencies?

The key difference over the last few months has been in the central banks approach towards crypto-currencies. There have been talks on the possibility of central bank-backed digital currencies. The Bank of International Settlements, along with seven other central banks have published a report that lays out the norms for central bank-backed digital currencies. The key requirement is that the CBDCs must complement cash and other legal tender instead of replacing them to ensure monetary and financial stability.

How will such digital currencies benefit?

The key advantage is that it will serve as a medium of exchange, and a store of value. That will also encourage it as a means of payment and, would eventually, improve efficiency of payments. The move of interest-bearing CBDC could also be key towards improving monetary policy transmission. The benefit would be in the form of reducing transaction costs of digital transactions, which could be instrumental in financial inclusion improvement across the globe.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Go here to read the rest:
Crypto craze may drive regulators to back their use - Mint

Will technology save humanity? Researchers gather at global summit on bleeding-edge tech for good – SiliconANGLE News

Brilliant minds have shaped the course of human history. From the astrolabe to the internet, innovation has been a defining trait of our species. Now, with the Western world on the edge of what, at times, seems like an apocalyptic future, can we harness humanitys super intelligence and create tech that benefits the species as a whole rather than destroying the planet to line the pockets of a few?

Some huge, big, fundamental change has to happen to sustain our long-term development of ideas and, basically, for the sake of human beings, said Kazuhiro Gomi (pictured), president and chief executive officer of NTT Research Inc.

Gomi spoke with Jeff Frick, host of theCUBE, SiliconANGLE Medias livestreaming studio, during Upgrade 2020, the NTT Research Summit. They discussed basic research, NTTs operational goals, and the Upgrade 2020 summit. (* Disclosure below.)

Following in the footsteps of the venerable AT&Ts Bell Labs, NTT Research is a subsidiary of Japans Nippon Telegraph and Telephone Corp. (NTT). But the companys mission extends beyond industry to promoting positive change for humanity through technological innovation.

NTT opened a lab in Silicon Valley in 2019 to facilitate global collaboration within the basic research community. The Upgrade 2020Global Research Summit is a way for the company to demonstrate what they are doing and invite the world to add to the conversation.

For us, basic research means that we dont necessarily have a product roadmap or commercialization roadmap. We just want to look at the fundamental core technology of all things, Gomi said.

NTTs research focuses on quantum computing; cryptography and information security; and medical and health informatics. The Summits agenda reflects these areas, with day one devoted to an overview, followed by three days of deep dives into physics and informatics, cryptography and information security, and medical and health informatics.

Day one will be a great day to understand more holistically what we are doing, Gomi said. However, given the type of research topic that we are tackling, we need the deep dive conversations, very specific to each topic by the specialist and the experts in each field.

Day two kicks off with a session titled Coherent Nonlinear Dynamics and Combinatorial Optimization, given by Stanford professor of applied physicsHideo Mabuchi. Other equally in-depth discussions include research into biological digital twins. Basically, the computer system can simulate or emulate your own body, not just a generic human body, Gomi explained. If you get that precise simulation of your body, you can do a lot of things.

The ability to predict future illnesses or physical problems as a body ages is one scenario. Another is testing medicines using a medical doppelgnger to eliminate human risk. The technology is in its infancy, but the potential is definitely ground-breaking.

Its going to be a pretty long journey, Gomi stated. Were starting from trying to get the digital twin for the cardiovascular system, so basically to create your own heart.

Collaboration with professors and researchers at prestigious universities is essential for the mission of NTT, and the summit has a roster of high-level academics from MIT, UCLA, Caltech and Stanford, as well as Leicester University in the U.K. and Keio University in Tokyo.

Listening in to those sessions you will learn whats going on from the NTT [researcher]s mind or entity researchers mind to tackle each problem. But at the same time you will get to hear top-level researchers and professors in each field, Gomi said, whooffered an open invitation for anyone tojoin the summitand reach out and continue the conversation by contacting him and the other researchers at NTT.

I believe this is going to be a unique [summit] to understand whats its like in the research fields of quantum computing, encryptions, and then medical informatics of the world, Gomi concluded.

Watch the complete video interview below, and be sure to check out more of SiliconANGLEs and theCUBEs coverage of Upgrade 2020, the NTT Research Summit. (* Disclosure: TheCUBE is a paid media partner for Upgrade 2020, the NTT Research Summit. Neither NTT Research, the sponsor for theCUBEs event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

Read the rest here:
Will technology save humanity? Researchers gather at global summit on bleeding-edge tech for good - SiliconANGLE News

Quantum Cryptography Market 2020 Size, Demand, Trends and Growth by Business Opportunities, Latest Innovation, Technology Trends and Forecast 2025 -…

Quantum Cryptography Market analysis is provided for the international markets including development trends, competitive landscape analysis, geography, end-users, applications, market share, COVID-19 analysis, and forecast 2020-2025. The predictions estimated in the market report have been resulted in using proven research techniques, methodologies, and assumptions. This Quantum Cryptography market report states the market overview, historical data along with size, growth, share, demand, and revenue of the global industry.

Further, Quantum Cryptography Market report also covers the development policies and plans, manufacturing processes and cost structures, marketing strategies followed by top Quantum Cryptography players, distributors analysis, Quantum Cryptography marketing channels, potential buyers and Quantum Cryptography development history. This report also states import/export, supply and consumption figures as well as cost, price, revenue and gross margin by regions.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

In addition, the market research industry delivers the detailed analysis of the global Quantum Cryptography market for the estimated forecast period. The market research study delivers deep insights about the different market segments based on the end-use, types and geography. One of the most crucial feature of any report is its geographical segmentation of the market that consists of all the key regions. This section majorly focuses over several developments taking place in the region including substantial development and how are these developments affecting the market. Regional analysis provides a thorough knowledge about the opportunities in business, market status & forecast, possibility of generating revenue, regional market by different end users as well as types and future forecast of upcoming years.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

Leading players of the global Quantum Cryptography market are analyzed taking into account their market share, up to date developments, new product launches, partnerships, mergers or acquisitions, and markets served. We also provide a comprehensive analysis of their product portfolios to explore the products and applications they concentrate on when operating in the global Quantum Cryptography market. in addition, the report offers two separate market forecasts one for the production side and another for the consumption side of the global Quantum Cryptography market.

Based on application, the market has been segmented into:

NA

The study analyses numerous factors that are influencing the Quantum Cryptography market from supply and demand side and further evaluates market dynamics that are impelling the market growth over the prediction period. In addition to this, the Quantum Cryptography market report provides inclusive analysis of the SWOT and PEST tools for all the major regions such as North America, Europe, Asia Pacific, and the Middle East and Africa. The report offers regional expansion of the industry with their product analysis, market share, and brand specifications. Furthermore, the Quantum Cryptography market study offers an extensive analysis of the political, economic, and technological factors impelling the growth of the market across these economies.

The research provides answers to the following key questions:What is the estimated growth rate of the market for the forecast period 20192025? What will be the market size during the estimated period?What are the key driving forces responsible for shaping the fate of the Quantum Cryptography market during the forecast period?Who are the major market vendors and what are the winning strategies that have helped them occupy a strong foothold in the Quantum Cryptography market?What are the prominent market trends influencing the development of the Quantum Cryptography market across different regions?What are the major threats and challenges likely to act as a barrier in the growth of the Quantum Cryptography market?What are the major opportunities the market leaders can rely on to gain success and profitability?

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

More:
Quantum Cryptography Market 2020 Size, Demand, Trends and Growth by Business Opportunities, Latest Innovation, Technology Trends and Forecast 2025 -...

The Top Internet of Things (IoT) Authentication Methods and Options – Security Boulevard

Gartner recently labeled Internet of Things Authentication as a high benefit in 2020 Gartner Hype Cycle for IAM Technologies. This blog covers your options for Internet of Things Authentication.

Want to read the report? Skip the blog and click Download Report below.

IoT authentication is a model for building trust in the identity of IoT machines and devicesto protectdataand control access wheninformation travelsvia an unsecured network such as the Internet.

Strong IoT authentication is needed so that connected IoTdevices andmachines can be trusted to protect against control commands from unauthorized usersordevices.

Authentication also helps prevent attackers from claiming to be IoT devices in the hope of accessing data on servers such as recorded conversations, images, and other potentially sensitive information.

There are several methods by which we can achieve strong authenticationto secureIoT device communications:

The Internet of Things (IoT) is not just a single technology, but a connected environment of various machines (things) that work together independently without human interaction.

The authorization process is the tool used to validate the identity ofeach endpoint in the IoT system. The certification process is configureduponenrollment entry and informs the service provider of the method to be used when checking the systems identity during registration.

Machine Identity Management aims to build and manage confidence in a machines identity that interacts with other devices, applications, clouds, and gateways.

This may include the authentication and authorization of IoT devices such as:

Each IoTmachineneeds a unique digital identity when connecting to a gateway or a central server to prevent malicious actors from gaining control of the system.This is accomplished through binding an identity to a cryptographic key, unique per IoT device.

Machine identity management approaches are specifically responsible for discovering the credentials used by machines and the management of their life cycle.

IoT devices are often hacked remotely, involving a hacker trying to enter the device using an internet connection. If an IoT device is only allowed to communicate with an authenticated server, any outside attempts to communicate will be ignored.

According to the 2018 Symantec threat report, the number of IoT attacks increased by 600 percent between 2016 and 2017, from 6,000 to 50,000 attacks, respectively.

Therefore, when IoTdevices areimplemented within corporate networks,,security needs to be given much more attention. To address this issue, powerful but efficient cryptography solutions must be used to standardize secure communication between machines.

However, it is a tough decision to choose the right IoT authentication model for the job. Before deciding whicharchitecturemodel is ultimately the best IoT authentication, you need toconsiderseveralfactors, such as energy resources, hardware capacity, financial budgets, security expertise, security requirements, and connectivity.

The X.509 protocol (IETF RFC 5280) provides the most secure digital identity authentication type and is based on the certificate chain of trust model. The use of X.509 certificates as a certification mechanism is an excellent way to scale up production and simplify equipment delivery.

Public key infrastructure (PKI) consists of a tree-like structure of servers and devices that maintain a list of trusted root certificates. Each certificate contains the devices public key and is signed with the CA private key. A unique thumbprint provides a unique identity that can be validated by running a crypto algorithm, such as RSA.

Digital certificates are typically arranged in a chain of certificates in which each certificate is signed by the private key of another trusted certificate, and the chain must return to a globally trusted root certificate. This arrangement establishes a delegated chain of trust from the trusted root certificate authority (CA) to the final entity leaf certificate installed on the device through each intermediate CA.

It requires a lot of management control, but there are many vendor options out there.

However, X.509 certificate lifecycle management can be a challenge due to the logistical complexities involved and comes at a price, adding to the overall solution cost. For this reason, many customers rely on external vendors for certificatesand lifecycle automation.

The Hardware Security Module, or HSM, is used for secure, hardware-based device secret storage and is the safest form of secret storage. Both the X.509 certificate and the SAS token can be stored in the HSM. HSMs may be used with the two attestation mechanisms supported by the provisioning service.

Alternatively, device secrets may also be stored in software (memory) but is a less secure form of storage compared to an HSM.

It is essential to check the devices identity that communicates with the messaging gateway in IoT authentication deployments. The usual method is to generate key pairs for devices that are then used to authenticate and encrypt traffic. However, the disk-based key pairs are susceptible to tampering.

TPMs come ina number ofdifferent forms, including:

While a typical TPM has several cryptographic capabilities, three key features are relevant to IoT authentication:

Device manufacturerscannotalways have full confidence in all entities in their supply chain (for example, offshore assembly plants). Still, theycannotgive up the economic benefits of using low-cost suppliers and facilities. The TPM can be used at various points along the supply chain to verify that the device has not been incorrectly modified.

The TPMhas the capability to storethe keyssecurelyin the tamper-resistant hardware. The keys are generated within the TPM itself and are therefore protected from being retrieved by external programs. Even without harnessing the capabilities of a trusted hardware root and a secure boot, the TPM is just as valuable as a hardware key store. Private keys are protected by hardware and offer much better protection than a software key.

With TPM, you cant roll the key without destroying the identity of the chip and giving it a new one. Its like if you had a clone,yourclone would have the same physical characteristics as you, but theyre a different person in the end. Although the physical chip remains the same, your IoT solution has a new identity.

Some key differences between TPMs and symmetric keys (discussed further below) are as follows:

Symmetric Key Certification is a simple approach to authenticating a device with a Device Provisioning Service instance. This certification method is the Hello World experience for developers who are new to or do not have strict safety requirements. Device attestation using a TPM or an X.509 certificate is more secure and should be used for more stringent safety requirements.

Symmetric key enrollments also provide a great way for legacy devices with limited security features to boot into the cloud via Azure IoT.

The symmetric key attestation with the Device Provisioning Service is carried out using the same security tokens supported by IoT hubs to identify the devices. These security tokens are SAS (Shared Access Signature) tokens.

SAS tokens have a hashed signature created using a symmetric key. The signature shall be recreated by the Device Provisioning Service to verifywhether or notthe security token presented during the certification is authentic.

When the device certifies with an individual enrollment, the device uses the symmetric key defined in the individual enrollment entry to create a hashed signature for the SAS token.

Shared symmetric keys may beless secure than X.509 or TPM certificates because the same key is shared between the device and the cloud, which means that the key needs to be protected in two places.Designers usingsymmetric keyssometimeshardcode the clear (unencrypted) keys on the device, leaving the keys vulnerable, which is not a recommended practice

Properimplementation of IoT authenticationhasmany beneficial effects on IoT security. However, choosing the right method can be challenging, and the wrong choice can increase risks by tenfold.

Some riskscan be mitigated by securely storing the symmetric key on the deviceand following best practices around key storage,Its not impossible, butwhensymmetric keys areused solely,theycan beless secure then HSM, TPM, and X.509 implementations.

In the case of certificates, HSM, TPMs, and X.509applications, the main challenge is to prove possession of the key without revealing the keys private portion.

More:
The Top Internet of Things (IoT) Authentication Methods and Options - Security Boulevard

Quantum encryption the devil is in the implementation – The Daily Swig

John Leyden23 September 2020 at 13:18 UTC Updated: 23 September 2020 at 16:04 UTC

Implementation flaws in quantum key distribution systems can undermine claims of unhackable cryptographic security, one expert warns

Academics at the University of Bristol recently claimed to have made a breakthrough in making quantum key distribution (QKD) systems commercially viable at scale.

Using a technique known as multiplexing, the team has developed a prototype system that relies on fewer receiver boxes, potentially slashing the cost of building quantum key distribution systems currently used by only governments and large multinational banks.

However, following the recent publication of an article in The Daily Swig, Taylor Hornby, senior security engineer at Electric Coin Company, has been in touch to caution us that comparable systems have been broken in the past because of implementation problems.

If theyre claiming higher security than standard cryptography, they need evidence theyre less likely to have implementation flaws, Hornby told us before offering a lengthier explanation of his thinking (reproduced in full, with light editing) below.

Its technically correct that when implemented correctly, quantum key distribution leverages the laws of physics to ensure that data being transmitted cannot be intercepted and hacked.

However, that implemented correctly is a pretty big assumption. Similar systems in the past have been broken through implementation flaws, so if the researchers are claiming higher security than standard cryptography, they need evidence theyre less likely to have implementation flaws.

Everyones almost certainly better off using normal crypto thats post-quantum secure and paying (a fraction of) the 300,000 cost to people to audit it.

A common narrative in favor of QKD is that its more secure than conventional cryptography because it doesnt need to rely on computational difficulty assumptions (like factoring is hard, its hard to find SHA256 collisions, and so forth).

Its true that QKD eliminates the need to rely on those computational hardness assumptions, but that comes at an additional risk of implementation flaws.

Implementations of conventional cryptography can have implementation flaws, too (e.g. Heartbleed, Zombie Poodle, and many other examples). However theyre usually just software mistakes that can be patched, and theres an industry of cryptographers and security auditors trained to find and fix them.

Over time, the flaws get found and fixed, and the implementations become more secure.

Read more of the latest encryption news

Note that its very rare for conventional cryptography to be broken because of weaknesses in the computational hardness assumptions.

MD5 and SHA1 collisions are two examples, but consider that AES and even DES are not showing substantial signs of weakness, and even MD5 is still secure against second-preimage attacks.

Quantum systems, on the other hand, can have physical vulnerabilities that come from the fact that real single-photon detectors and other components dont behave exactly as their theoretical models predict.

In one case, researchers were able to control single-photon detectors in a QKD system by shining bright light on them (making them behave more like brightness sensors than single-photon detectors).

A defense for this attack was proposed, which was to vary the detectors efficiency randomly. The idea is that the bright light coming from an attacker will always set off the detector, but if there werent an attack, then more photons should be lost when the efficiency is low, so the recipient can tell if theyre being attacked when they dont see a higher rate of lost photons.

Researchers then worked out a way around that defense: By offsetting the timing of short pulses against the timing of a gate clock in the detector, they could trigger the detector just when the efficiency was high and not when it was low, so they could simulate the expected lost photons:

These attacks are on older QKD systems, and I havent looked into the architecture used by researchers quoted in the article, but this shows that QKD systems can have their own kinds of physical flaws, and the risk they introduce needs to be balanced against the benefits of moving away from reliance on computational hardness assumptions.

The burden is on QKD proponents to argue that their physical devices are less likely to contain vulnerabilities than software implementations of conventional cryptography systems.

A potential way to do that is to use device-independent QKD protocols protocols which are proven secure even when the attacker is allowed to have some control over the physical hardware.

Current designs for device-independent protocols are less efficient, however, and they still make assumptions about what the attacker is allowed to do.

Those assumptions need to be tested adversarially before we can be confident in the implementations security.

READ MORE Quantum leap forward in cryptography could make niche technology mainstream

Read the original post:
Quantum encryption the devil is in the implementation - The Daily Swig

Blockchain: Beyond the Basics – Security Boulevard

Beyond the basic blockchain

The core blockchain protocol implements a distributed ledger capable of performing cryptocurrency transfers. Smart contract platforms add additional functionality by running programs on top of the blockchain.

However, distributed ledger technology is not limited to the traditional blockchain or smart contract platform. Distributed ledgers can run on alternative architectures, support second-layer protocols and use advanced cryptography to provide additional functionality and guarantees.

Blockchain is the most common and widely-known architecture for implementing distributed ledgers. However, other protocols and distributed ledger architectures also exist. These alternative ledger architectures are often designed to address limitations of blockchain-based ledgers, such as limited transaction speeds and scalability.

A DAG is a graph with two main properties:

DAGs can also be used to implement a distributed ledger. An example of a leading DAG-based blockchain is IOTA and its Tangle.

Without blocks, DAG-based ledgers have to implement consensus in different ways. The security of these ledgers is heavily dependent upon the details of these consensus algorithms.

Sidechains take the blockchain as a basis and build on it. Sidechains are implemented using pegging.

Pegged sidechains are two independent blockchains that support cross-chain swaps. Users can send cryptocurrency to a set address on one chain and release cryptocurrency on the other. This provides the ability to take advantage of different features on different chains.

Sidechains are built out of completely independent blockchains that are linked in some way. Each blockchain has the same security concerns as a traditional blockchain, but (Read more...)

Continued here:
Blockchain: Beyond the Basics - Security Boulevard

Hedging Risk in DeFi Through Real Assets Is The Next Step In DeFi’s Development, According the Founder Of MakerDAO… – TheTradable

The DeFi explosion has generated various assets that can scale the collateral portfolio. All this will help to drive secure coins out and ensure strong stability costs.

Main risks of DeFi ecosystems

The main problem with DeFi is that funds don't have a real value, in terms of the fact that there is no real-world object behind them. The whole ecosystem boils down to the fact that some wrappers are changed to other more secure wrappers with more liquidity.

The founder of MakerDAO, Rune Christensen,believes that the next stage in the development of DeFi will be the introduction of real-world assets as collateral and hedging position risks.

The Advantages of such Hedging

Real estate is considered to have a more stable price model than other assets. Moreover, real estate has a clear link in space and in a materialized form. Tokenization of real-world objects will lead to faster and more flexible management of rating positions in the DeFi ecosystem.

Rune offers a broad system of real estate assets that are located in different jurisdictions. This should be created in case the government of one of the countries where the property is located imposes a moratorium on the use of real estate as collateral and tokenization.

But the tokenization of real assets in the blockchain is not a new development. Right now there is an immovable boom and in the world of cryptography, that is taking shape. The Sandbox is one of the blockchain games most exciting in the future.The Winklevoss brothers also said that it was time for DeFi to flourish.

A famous billionaire and a cryptoinvestor thinks the DeFi sector is far more developed and real than it was in 2017.

More here:
Hedging Risk in DeFi Through Real Assets Is The Next Step In DeFi's Development, According the Founder Of MakerDAO... - TheTradable