The Zcash Privacy Tech Underlying Ethereums Transition to Eth 2.0 – Yahoo Finance

Ethereums consensus algorithm is not the only thing changing with the launch of Eth 2.0. The underlying cryptography itself is getting an overhaul based on leading research out of the Electric Coin Company.

Called BLS12-381, the new elliptic pairing curve will securely coordinate transactions on the proof-of-stake (PoS) Eth 2.0 network, while opening up opportunities for data savings and privacy-tech solutions.

Currently, the ins and outs of that curve are being baked into the network with Ethereum Improvement Proposal 2537. That EIP is slated for delivery with the protocols 10th hard fork, Berlin, tentatively scheduled for July.

Related: Money Reimagined: Ethereums Renaissance Creates an Opportunity And a Major Test

As a hard fork, Berlin will add up to four backwards-incompatible upgrades, two of which continue to be vetted and may ultimately not be included (all though that remains unlikely given all four EIPs are being implemented on various levels by each Ethereum client).

A test net, Yolo, conducting dry runs without applications, is currently underway for EIP 2537 and one other proposal, EIP 2315, which will add simple subroutines to the Ethereum Virtual Machine (EVM).

For Eth 2.0, EIP 2537 is an introduction into the interesting cryptography work underpinning the new network while answering a question Ethereum co-founder Vitalik Buterin has been pondering since the networks early days.

In order to launch Eth 2.0, a technical bridge must exist between Ethereums existing Eth 1.x and Eth 2.0.

Related: OpenZeppelin Discloses 'High Severity Vulnerability' in DeFi Wallet Argent

BLS12-381 undergirds one such option by building an Eth 2.0 lite client inside the current Ethereum network, according to an April Medium article by Ethereum developer Alex Stokes.

In short, Eth 2.0 will roll out in steps, beginning with Phase 0 in Q3 2020. Phase 0 will begin with the beacon chain, a coordination mechanism for investors staking funds. In PoS networks like Tron or EOS, staked funds operate as a voting mechanism and incentive to partake in verifying transactions.

Read more: Vitalik Buterin Clarifies Remarks on Expected Launch Date of Eth 2.0

Eth 1.x operates on the Proof-of-Work (PoW) algorithm and has a wholly separate cryptographic schematic called Elliptic Curve Digital Signature Algorithm (ECDSA), also employed by Bitcoin and other cryptocurrencies.

But in order to bridge the PoW and PoS networks a common tongue is needed.

Thats what EIP 2537 does by providing a cryptographic translator between the two networks in what is called a precompile of the underlying primitives of Eth 2.0. This precompile makes a lite client possible.

In practice, a lite client would be built as a smart contract inside the EVM. Its main purpose, given the clients limited functionality, would be to port ether (ETH) over to the new chain, a prerequisite for boarding people onto the new network.

Additionally, Layer 2 (L2) solutions for scaling Ethereum and Eth 2.0 could be built on the lite client, Ethereum co-founder Vitalik Buterin said in an April Ethereum Magicians post.

If we have that, then an eth2-in-eth1 client is actually not that hard, which opens the door to applications that use eth2 as an availability engine (ie. things like Plasma but waaay more powerful), Buterin wrote.

The next iteration of Ethereum has far larger ambitions than the ECDSA can handle. Luckily, 10 years of cryptocurrency research has borne fruit in at least one subject: cryptography itself, Cloudflare cryptographer Nick Sullivan said in an interview with CoinDesk. New curves such as BLS12-381 prove as much.

Elliptic curves have been around since the mid-1980s, Sullivan said. The problem is that theyre somewhat limited in what they can do. They can do effectively classical public-key operations: digital signatures, encryption and key agreement.

Alternatively, pairing friendly curves invented in the early 2000s provide alternative security measures that aptly apply to blockchains, Sullivan said.

Invented in 2017, Electric Coin Company cryptographer Sean Bowes BLS12-381, a variant of the BLS curve invented by three cryptographic pioneers in 2003, is perhaps the most consequential for most coins today. His curve, and others like it, are the reason blockchains can scale.

Story continues

BLS12-381 is a special kind of elliptic curve (a pairing-friendly curve) which enables cryptographic primitives like SNARKs and vector commitment schemes, Bowe said in an email. These primitives are very useful for improving scalability and privacy in blockchain projects.

For Eth 2.0, the advantage can be cut into three parts: data savings, privacy and interoperability.

First, BLS-styled signatures keep the necessary computation light by batching cryptographic signatures that verify transactions, according to Ethereum researcher Carl Beekhuizen in an Ethereum Foundation blog post.

Beekhuizen wrote:

If 10% of all ETH ends up staked, then there will be ~350,000 validators on eth2. This means that an epochs worth of signatures would be 33.6 megabytes which comes to ~7.6 gigabytes per day. In this case, all of the false claims about the eth1 state-size reaching 1TB back in 2018 would be true in eth2s case in fewer than 133 days (based on signatures alone).

(For reference, thats equivalent to nearly three times the weight of the current Bitcoin blockchain.)

BLS12-381 also allows Eth 2.0 to implement zero-knowledge proofs more naturally: Privacy variants of ETH could be native to Eth 2.0. In fact, BLS12-381 was hard forked into the Zcash protocol with the 2018 Sapling update as a more robust cryptographic primitive.

Moreover, the use of ECC tech on Ethereum highlights the close relationship between Buterin and Zooko Wilcox, co-founder of Zcash and the CEO of ECC. Both the ECC and Zcash teams have shown past interest in bridging the two technologies.

Read more: Zcash Will Get a Gateway Into Ethereums DeFi Ecosystem

Thirdly, the proposal opens up interoperability between different chains such as Filecoin, Chia or Algorand and Eth 2.0, a longstanding promise of multiple other blockchains networks such as Polkadot, which announced the launch of its mainnet earlier this month.

Eth 2.0s ability to connect with other projects specifically non-Bitcoin ones could materialize in a few different ways: Perhaps Ethereum shares its value across different chains or perhaps it siphons tech away from other projects, taking their market caps with it.

Either way, Cloudflares Sullivan remains impressed by the math:

Its a really fascinating curve of how things happen from the mathematicians and the cryptographers writing about it in academic papers and then people in the engineering world started implementing it and testing it and then its getting introduced into projects and protocols and then being part of society. And then you end up in this position where theres so many different options that its hard to know exactly which one to pick and why.

See the rest here:
The Zcash Privacy Tech Underlying Ethereums Transition to Eth 2.0 - Yahoo Finance

Quantum Cryptography Market 2020 Analysis by Demand, Business Growth, Evolving Technologies, Emerging Trends, Key Players and Forecast to 2025 – 3rd…

Global Quantum Cryptography market covers a detailed analysis of the market appearances, segmentation, size and progress, market shares, provincial collapses, competitive background, tendencies and several growth strategies for this Quantum Cryptography market. Likewise, the market appearances section of this study describes and defines the complete overview of the Quantum Cryptography market. The global Quantum Cryptography market report extent segment offers the market revenues, covering both the momentous growth of the industry and anticipating the upcoming market revenue. In addition, global market separations break down into the key sub-areas which gives a better idea about the market size.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Get Sample Copy of this Report: https://www.adroitmarketresearch.com/contacts/request-sample/958

Various important factors such as market trends, revenue growth patterns market shares and demand and supply are included in almost all the market research report for every industry. Some of the important aspects analysed in the report includes market share, production, key regions, revenue rate as well as key players. This Quantum Cryptography market report also provides the readers with detailed figures at which the Quantum Cryptography market was valued in the historical year and its expected growth in upcoming years. Besides, analysis also forecasts the CAGR at which the keyword is expected to mount and major factors driving markets growth.

In addition, the report include deep dive analysis of the market, which is one of the most important features of the Quantum Cryptography market. Furthermore, the need for making an impact is likely to boost the demand for the experts which are working in the market. Moreover, an in depth analysis of the competitors is also done to have an estimate for the Quantum Cryptography market. Moreover, the report provides historical information with future forecast over the forecast period. Production, market share, revenue rate, key regions and major vendors are some of the vital aspects analysed in the report. This report on Quantum Cryptography market has been made in order to provide deep and simplified understanding of the market to its end users. The study on global Quantum Cryptography market, offers profound understandings about the Quantum Cryptography market covering all the essential aspects of the market.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

Based on application, the market has been segmented into:

NA

Potential consumers, market values, and the future scope for the Quantum Cryptography market are explained thoroughly to the users in this report. The key players of Quantum Cryptography industry, their product portfolio, market share, industry profiles is studied in this report. Adaptation of new ideas and accepting the latest trends are some the reasons for any markets growth. The Global Quantum Cryptography market research report gives the deep understanding about the regions where the market is impactful. It also elaborates the big and small vendors working actively all over the globe.

Quantum Cryptography market report studies the current state of the market to analyse the future opportunities and risks. Quantum Cryptography market report provides a 360-degree global market state. Potential consumers, market values, and the future scope for the Quantum Cryptography market are explained thoroughly to the users in this report.

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

Originally posted here:
Quantum Cryptography Market 2020 Analysis by Demand, Business Growth, Evolving Technologies, Emerging Trends, Key Players and Forecast to 2025 - 3rd...

Zoom to Offer End-to-End Encryption for All Users – BankInfoSecurity.com

COVID-19 , Encryption & Key Management , Governance & Risk Management

Zoom will begin beta testing an end-to-end encryption feature in July that it plans to make available at not charge to all who use the paid or free version of its teleconference platform, the company says in its latest 90-day security plan progress report.

See Also: Live Webinar | 2021: A Cybersecurity Odyssey

Zoom CEO Eric Yuan says the end-to-end encryption was developed in partnership with users, civil liberties organizations and the CISO council the company organized earlier this year.

"We are also pleased to share that we have identified a path forward that balances the legitimate right of all users to privacy and the safety of users on our platform," Yuan says. "This will enable us to offer E2EE as an advanced add-on feature for all of our users around the globe - free and paid - while maintaining the ability to prevent and fight abuse on our platform."

Users who want to implement the new encryption feature will have to participate in a one-time process that will help the company to further identify the user by verifying their phone number via text message, Yuan notes.

Zoom embarked on a 90-day security plan on April 1, promisinig to commit the resources needed to better identify, address and fix security issues.

The COVID-19 outbreak, which triggered a shift to working from home, led to a massive increase in the number of Zoom users which, in turn, resulted in security and privacy issues being exposed. This included so-called Zoom bombing hacking incidents as well as the company inadvertently sharing user's email addresses, photos and names with Facebook by default.

Several zero-day vulnerabilities were also discovered and patched.

In Zoom's first quarter financial statement, the company reported a 354% increase in the number of customers with 10 or more employees compared to the same period last year, reaching a total of more than 265,000 such customers. The increase in business resulted in net income of $27 million, up from $2.2 million a year ago.

Zoom's addition of encryption for all users was welcomed by the Electronic Frontier Foundation, which had criticized the company for not previously offering more robust privacy and security features.

Zoom attracted "new users that the company never expected and did not design for, and all the unanticipated security and privacy problems that come with that sudden growth," Gennie Gebhart, the foundation's associate director of research, notes.

End-to-end encryption is an added layer of security on top of the AES 256-bit GCM enhanced encryption that was put into place on May 30.

Under the AES 256-bit GCM encryption model, a one-time key is generated for each meeting. With E2EE, one meeting participant generates an encryption key and then uses public key cryptography to distribute this key to the other participants. This transfer takes place without the data going through Zoom's servers. The meeting data itself is still protected with AES 256-bit GCM encryption, according to Zoom.

Administrators will have the ability to disable the E2EE feature at the account and group level, and it also can be turned off for a specific meeting because E2EE can limit some meeting functionality, such as the ability to include PSTN phone lines or SIP/H.323 hardware conference room systems, Zoom notes.

In addition to enhanced encryption, Zoom is adding security protocols in the coming weeks. For example:

Zoom also announced that starting in July, it will host a series of CISO roundtables where up to 40 participants can ask questions about its cybersecurity measures.

See the article here:
Zoom to Offer End-to-End Encryption for All Users - BankInfoSecurity.com

Quantum Cryptography Market 2020 Analysis by Demand, Applications, End Users, Companies, Sales Prospects, Forthcoming Developments, Business…

Global Quantum Cryptography market covers a detailed analysis of the market appearances, segmentation, size and progress, market shares, provincial collapses, competitive background, tendencies and several growth strategies for this market. Likewise, the market appearances section of this study describes and defines the complete overview of the Quantum Cryptography market. The global market report extent segment offers the market revenues, covering both the momentous growth of the industry and anticipating the upcoming market revenue.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Get Sample Copy of this Report: https://www.adroitmarketresearch.com/contacts/request-sample/958

The global Quantum Cryptography market is likely to provide insights for the major strategies which is also estimated to have an impact on the overall growth of the market. Several strategies such as the PESTEL analysis and SWOT analysis is also being covered for the global market. These strategies have an impact on the overall market. The global Quantum Cryptography market can also be customized which is tailor made according to the needs of the clients and the consumers. The report also covers the regional segments and the market segments which is likely to have an impact on the growth of the market.

In addition, the market research provides several detailed analysis for the market which has an impact for the end user. This is beneficial for research scholars, technicians, business developers to analyze and forecast the future growth of the global Quantum Cryptography market. The global Quantum Cryptography market can be bifurcated in various segments which are determined on several factors such as technology, products, application, software and end users. The market growth plan and the growth curve is also summarized in the market report.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

Based on application, the market has been segmented into:

NA

The study covers the production, sales, and revenue of various top players in the global Quantum Cryptography market, therefore enabling customers to achieve thorough information of the competition and henceforth plan accordingly to challenge them head on and grasp the maximum market share. Moreover, increased demand for the technologies is also one of the factors, which are likely to boost the growth of the market research industry.

The regional segments are being analysed and the market is estimated for the forecast period. Regions like North America, South America, Asia Pacific, LATAM are being included to estimate the market for the forecast period. Several strategies such as expansions and innovation of new products are also being included in the report. Several factors such as increased focus on the strengths and weakness is also one of the major attributes which are being used for the growth and determination of the market.

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

See the rest here:
Quantum Cryptography Market 2020 Analysis by Demand, Applications, End Users, Companies, Sales Prospects, Forthcoming Developments, Business...

Blockchain In BFSI Market to Witness over XX% Growth ‘in Revenue During the COVID-19 Pandemic Cole Reports – Cole of Duty

Blockchain in BFSIis also called as FinTech blockchain.Wide dissemination of blockchain by financial organizations from the past years has witnessed rise in popularity of cryptocurrencies, and the initial coin offering (ICO).

As well as blockchain is panacea for all fintech companies digital concerns such as security. Blockchain as a technology was developed to serve as the public transaction ledger for cryptocurrencies, which uses distributed databases and cryptography to record transactions. This characteristic of blockchain provides a high level of safety while transmitting and storing data, open and transparent network infrastructure, decentralized ledger, and low cost of operations benefits. Moreover, blockchain in FinTech anticipates in changing the paper-intensive international trade finance process to a digital decentralized ledger.

Request For Report[emailprotected]https://www.trendsmarketresearch.com/report/sample/13284

Factors such as increase in need for transactions transparency and accountability, and greater adoption in cross-border payments drive the market growth. In addition, increase in investment by banks in blockchain-based solutions across the globe is also expected to boost the market growth. Moreover, increase in demand for distributed ledger technology and rise in cryptocurrencies market cap are also some of the factors that fuel the demand for blockchain solutions and services across global banks. However, scarcity of skilled workforce is expected to impede the market growth during the forecast period.

Furthermore, growth in demand for increased scalability, transaction speed, and reduction in processing costs are expected to provide major growth opportunities for blockchain in BFSI market in the upcoming years. Also, rise in demand from developing economies for blockchain solutions is also anticipated to be opportunistic for the market growth.

The global blockchain in BFSI market is segmented based on component, application, organization size, industry vertical, and region. Based on component, the market is bifurcated into platform and services. Based on application, the market is divided into digital currency, record keeping, payments & settlement, smart contracts, compliance management, and others. Based on organization size, the market is classified into large enterprises and small & medium enterprises. Depending on industry vertical, the market is segmented into banking, insurance, and non-banking financial companies (NBFCs). Based on region, the market is analyzed across North America, Europe, Asia-Pacific, and LAMEA.

The report analyzes the profiles of key players operating in the market. These include Alphapoint, Auxesis Group, Amazon Web Services, Inc. (AWS), Bitfury Group Limited., Hewlett Packard Enterprise Development LP (HPE), International Business Machines Corporation (IBM), Infosys Limited, Microsoft Corporation, Oracle Corporation, and SAP SE.

KEY BENEFITS The report provides an in-depth analysis of the global blockchain in BFSI market, outlining current trends, key driving factors, and potential areas for product investments. Key players are analyzed with respect to their primary offerings, recent investments, and future development strategies. Porters five forces analysis illustrates the potency of buyers and suppliers operating in the industry. The quantitative analysis of the global blockchain in BFSI market from 2018 to 2026 is provided to determine the market potential.

<<< Get COVID-19 Report Analysis >>>https://www.trendsmarketresearch.com/report/covid-19-analysis/13284

KEY MARKET SEGMENTS

BY COMPONENT Platform Services

BY APPLICATION Digital Currency Record Keeping Payments & Settlement Smart Contracts Compliance Management Others

BY ORGANIZATION SIZE Large Enterprises Small & Medium Enterprises

BY END USER Banking Insurance NBFCs

BY Region North Americaor USor Canada

Europeor Germanyor Franceor UKor Rest of Europe

Asia-Pacificor Japanor Chinaor Indiaor Rest of Asia-Pacific

LAMEAo Latin Americao Middle Easto Africa

KEY MARKET PLAYERS PRofILED IN THE REPORT Alphapoint Auxesis Group Amazon Web Services, Inc. (AWS) Bitfury Group Limited. Hewlett Packard Enterprise Development LP (HPE) International Business Machines Corporation (IBM) Infosys Limited Microsoft Corporation Oracle Corporation SAP SE

See the original post here:
Blockchain In BFSI Market to Witness over XX% Growth 'in Revenue During the COVID-19 Pandemic Cole Reports - Cole of Duty

NTT Research Builds Upon its Micro Technologies and Cryptography Expertise with Distinguished New Hires – Yahoo Finance

Micro-Bio Technologies Expert Tetsuhiko Teshima Joins MEI Lab and Technical University of Munich (TUM); Cryptography Experts Vipul Goyal and Justin Holmgren Deepen CIS Labs Bench

NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Dr. Tetsuhiko Teshima as a Research Scientist in its Medical and Health Informatics (MEI) Lab. Dr. Teshima has also joined the Technical University of Munich (TUM) Neuroelectronics Group as a Visiting Researcher. NTT Research and TUM last fall entered into a joint research agreement to explore implantable electronic systems to affect the future of patient care. An expert in micro technologies, Dr. Teshima will be working full-time at TUM in the area of advanced neuroelectronics and biosensor technology. Dr. Teshima began his three-year appointment on March 1, 2020.

Dr. Teshimas research has covered a broad range of topics that overlap with the MEI Labs mission, including micro bio-nano interfaces, parasitology, soft matter, hierarchical self-assembly, thin-film manufacturing techniques, soft lithography, microfluidics, revolutionary tools for single-cell measurements, mechano-biology and three-dimensional synthetic tissue and organs. He comes to NTT Research after holding positions at NTTs Bio-medical Informatics Research Center, the National Institute of Science and Technology Policy (NISTEP) and NTTs Basic Research Laboratories. He holds a M.S. (biology) and Ph.D. (information science and technology) from the University of Tokyo, where he also held a Japan Society for the Promotion of Science (JSPS) post-doctoral fellowship for three years at the Institute of Industrial Science.

"Dr. Teshima is a top young scientist in Japan who has made a mark in various areas of micro technologies," said MEI Lab Director Hitonobu Tomoike. "I expect a good chemical reaction between him and the brilliant scientists in Munich."

NTT Research also announced that it has named Vipul Goyal as Senior Scientist in its Cryptography and Information Security (CIS) Lab. Dr. Goyal is an associate professor of computer science, Carnegie Mellon University, which he joined in 2016. Previously, he spent seven years as a researcher in the Cryptography and Complexity Group at Microsoft Research, India. He is a winner of several honors, including a 2016 Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS) test-of-time Award, a JP Morgan faculty fellowship, and a Google outstanding graduate student award. He received his Ph.D. at the University of California, Los Angeles.

Named to Forbes Magazines "30 Under 30" list of people changing science and healthcare in 2013, Dr. Goyal has published more than 80 technical papers. Broadly interested in all areas of cryptography, he has a particular focus on the foundations of the field. His current research topics include secure multi-party computation, non-malleable cryptography and foundations of blockchains.

Also joining the CIS Lab is Justin Holmgren as Scientist. Prior to his current role at NTT Research, Dr. Holmgren was a Google Research Fellow at the Simons Institute for the Theory of Computing. Dr. Holmgren was previously a post-doctoral research fellow at Princeton University and received his Ph.D. in 2018 at the Massachusetts Institute of Technology (MIT), where he was advised by Professor Shafi Goldwasser. His work, which includes 15 published papers, has notably advanced the feasibility of securely outsourcing computation, private information retrieval and software watermarking. At NTT Research, he will be studying the foundational theory of cryptography, along with its interplay with diverse areas of computer science.

"We are delighted to welcome Drs. Goyal and Holmgren on our journey to a more secure future for everyone," said CIS Lab Director Tatsuaki Okamoto. "Only by engaging the strongest and most dedicated researchers can we address the foundational research problems in cryptography, and so deliver long-term impact to the field."

In related personnel news, NTT Research last month announced the appointment of Joe Alexander (M.D., Ph.D.) as Distinguished Scientist in the MEI Lab and Hoeteck Wee as a Senior Scientist in the CIS Lab. Dr. Alexander is leading the MEI Labs bio digital twin initiative. In February, NTT Research announced that the CIS Lab had reached joint research agreements with UCLA and Georgetown University, covering theoretical aspects of cryptography and global scale blockchain testbed research, respectively. NTT Researchs Physics and Informatics (PHI) Lab last year reached joint research agreements with six universities, one government agency and one quantum computing software company.

Story continues

About NTT Research

NTT Research opened its Palo Alto offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research: the Physics and Informatics (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuro-science and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2020 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

View source version on businesswire.com: https://www.businesswire.com/news/home/20200618005173/en/

Contacts

NTT Research Contact:Chris ShawVice President, Global MarketingNTT Research +1-312-888-5412chris.shaw@ntt-research.com

Media Contact:Barrett AdairWireside Communications For NTT Ltd. & NTT Research+1-804-591-0689badair@wireside.com

Link:
NTT Research Builds Upon its Micro Technologies and Cryptography Expertise with Distinguished New Hires - Yahoo Finance

TCG addresses the rise in cybersecurity threats with critical new features to its TPM 2.0 specification – Security Boulevard

Cybersecurity is taking a huge stride forward, as the Trusted Computing Group (TCG) today released its TPM 2.0 Library specification Revision 1.59 providing necessary updates to the previously published TPM specification to combat the growing sophistication of cybersecurity threats worldwide.

The challenges facing the cybersecurity industry are unprecedented, with technological advances creating a greater risk than ever before as newer threats evolve and emerge. The NotPetya malware attack in 2017 demonstrates the severity attacks can have; global logistics and shipping firm Maersk became critically affected and worldwide damage to other organizations totaled US $10 billion. According to Gartner, global spending for protecting software and systems from attacks is forecasted to reach US $133.7 billion in 2022, highlighting the need for new ways of tackling them.

The newest version of the TPM 2.0 specification is an essential tool that developers and manufacturers can utilize in their fight against cyberthreats to safeguard devices not just from conception of the product, but throughout their lifecycle. It provides enhancements for authorization mechanisms, extends the availability of the Trusted Platform Module (TPM) to new applications allowing for more platform specifications to be built, simplifies management, supports additional cryptographic algorithms and provides additional capabilities to improve the security of TPM services.

With attacks becoming increasingly more complex in their nature and more devices getting connected, creating new vulnerabilities such as the possibility of everyday items like smart fridges becoming hacked, it is critical that the industry has an effective way of tackling them now and into the future, said Rob Spiger, Vice President of Trusted Computing Group. As technology advances, more personal data is being used and can be intercepted or accessed easily if devices are not suitably safeguarded. Our latest revision of the TPM 2.0 Library Specification, gives system engineers and software developers a brand new way to ensure the longevity of a device by utilizing technologies of the TPM in the best way possible.

One of the newest features is the Authenticated Countdown Timer (ACT) which enables a way of regaining control of a compromised machine by configuring a TPM ACT that restarts a platform when it reaches zero. This is hugely beneficial for remotely managed IoT devices with a TPM. If the device is determined as healthy by a cloud management service, the cloud can cryptographically create a ticket that adds more time to the ACT, preventing healthy systems from being restarted. However, if the device is deemed infected, it will not obey instructions to start recovery. At this point, the ACT will eventually reach zero and force a restart allowing for boot firmware to kick in with recovery.

The latest specification also includes a new x509Certify command which simplifies access to TPM functions in cryptography. This allows a TPM to use internal keys to make statements about other keys by signing x509 certificates about them. This ensures secure communications with another party and is more recognizable for people not used to working with TPMs and more used to working with x509 certificates.

In addition, an Attached Component API command facilitates the secure transferring of a TPM object to an externally attached device such as a Hardware Security Module (HSM) or self-encrypting device, providing more security. By doing this, TPM 2.0 authorization mechanisms can be combined with the performance power of an HSM. Added support for symmetric block cipher MACs and AES CMAC is also built in, aiding with integration between TPMs and low capability devices with encryption.

The release of this latest TPM 2.0 Library specification brings added security, enhancements and features that can be added to a whole range of devices with TPMs, strengthening systems against cyberattacks and securing businesses, Spiger added. We are looking forward to advancing our work further, as our TPM, Device Identifier Composition Engine (DICE) and other workgroups continue to develop standards which will continue to protect billions of systems worldwide as the expansion of IoT devices grows.

Trusted Computing Group published its initial TPM 2.0 Library Specification as an International Standard in 2015, through the International Organization for Standardization. TCG will apply for the features in this latest revision to also achieve the same status as a global standard, by starting a new submission to ISO at the end of this year.

About TCG

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information is available at the TCG website, http://www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn. The organization offers a number of resources for developers and designers at develop.trustedcomputinggroup.org.

Twitter: @TrustedComputin

LinkedIn: https://www.linkedin.com/company/trusted-computing-group/

Link:
TCG addresses the rise in cybersecurity threats with critical new features to its TPM 2.0 specification - Security Boulevard

Science.lu: A tailor-made application for the transmission of encrypted messages – RTL Today

How do you protect yourself from hackers? Ege and Prem, laureates of the national contest "Jonk Fuerscher 2020", present their application for data encryption.

Ege Karaahmet and Prem Jagadeesh had known of the national competition for young scientists for years without ever daring to participate.

This year, the two physics and mathematics enthusiasts tried their luck for the first time, and the friends successfully convinced the jury with their text encryption application, which is based on the principles of cryptography.While pursuing their project, the 17 and 16-year-old students from Lyce Michel Lucius developed an algorithm that can safely encode a text message with the help of a simple key. The preparation was with the hope to participate in Regeneron's Inernational Science and Engineering Fair (ISEF) in the United States.

Even though encryption might appear to be highly abstract and complicated at first glance, both junior scientists have mastered the fundamentals: "We conducted online research and based our design on the fundamental principles of cryptography. After getting through the basics, we started experimenting and relied on our instincts", Prem and Ege explain.

Let us have a closer look at an example from their project:

The junior scientists allocated a specific transformation to each letter and respective cypher, for instance turns to both left and right, clockwise rotations, and vertical as well as horizontal displacements. This additional process allowed them to make an even more complex conversion of the letters into coordinates.

To increase the key's safety, it needs to be built upon two separate blocks that undertake the process of calculation.

Overview of the application for text message encryption and decryption through the generation of a key. Ege Karaahmet & Prem Jagadeesh Jonk Fuerscher

Prem and Ege underline the efficiency of their method of choice: "These transformations are processed several thousand times over the course of the encryption. The text thus becomes unreadable to anyone who does not have the key, even a hacker. There are just too many possible combinations."

Apart from message encryption, the two junior scientists have a passion for science in general. For future projects they hope to combine the fields of chemistry, mathematics, and physics.

Original author: Constance Lausecker

Foto: Pixabay

Read this article:
Science.lu: A tailor-made application for the transmission of encrypted messages - RTL Today

7 Prominent LGBTQ+ Technologists, Past and Present – Dice Insights

As we celebrate Pride Month, its worth taking some time to think about some of the prominent members of the LGBTQ+ community who have not only made great strides in technology, but also advocated for recognition and equality. From the mid-20th century to today, LGBTQ+ technologists continue to push the industry forward in new and exciting ways. The following is just a small sampling of these technologists:

An English mathematician helped pioneer computer science and artificial intelligence (A.I.)., Turing is perhaps most famous for his work at Bletchley Park, the center of the U.K.s code-breaking efforts during World War II, where he figured out the statistical techniques that allowed the Allies to break Nazi cryptography.

For his wartime efforts, Turing was appointed an officer of the Order of the British Empire. Following the War, he designed an Automatic Computing Engine, basically a computer with electronic memory (a fully functioning example of the ACE wasnt actually something built in his lifetime, however). He also theorized quite a bit about artificial intelligence (one of his core concepts,the Turing test, is still regarded as a benchmark for testing a machines intelligent behavior).

Turing was prosecuted by the British government for his sexual relationship with another man, Arnold Murray. Found guilty, he was chemically castrated and stripped of his security clearance, which prevented him from working for Britains signals-intelligence efforts. A little over two years later, in 1954, he was found dead of cyanide poisoning, and whether it was suicide or an accident has preoccupied historians for decades.

In 1999,Timelisted Turing among the100 Most Important People of the 20thCentury. Five years later, the British government officially pardoned his conviction.

A technology manager for IBM as well as an LGBTQ+ activist, Edith Edie Windsor was lead plaintiff inUnited States v. Windsor(550 U.S. 744), a landmark U.S. Supreme Court case that found that a crucial portion of the Defense of Marriage Act (DOMA) violated the due process clause of the Fifth Amendment. The ruling helped legalize same-sex marriage (along with a later case,Obergefell v. Hodges).

At IBM, Windsor worked on projects related to operating systems and natural-language processing. After leaving IBM in 1975, she started a consulting firm. In 2016, Lesbians Who Tech, an organization for lesbian and queer women in tech,set up the Edie Windsor Coding Scholarship, with 40 people selected for its inaugural year of giving.

As a computer scientist at IBM in the 1960s, Lynn Conway helped make pioneering advances in computer architecture. One of her projects, ACS (Advanced Computing Systems), essentially became the foundation of the modern high-performance microprocessor. However, IBM fired her when it discovered that she was undergoing gender transition.

Undeterred, Conway moved on to Xerox PARC, where she worked on still more innovative projects, including the ability to put multiple circuit designs on one chip. She was also key in advancing chip design and fabrication. After her stint at Xerox, she moved to DARPA, and from there to the University of Michigan, where she became a professor of electrical engineering and computer science.

At the turn of the century, Conway began to work more in transgender activism. In addition coming out to friends and colleagues, she also used her webpage to describeher personal history(followed up, much later, by a memoir published in 2012). In 2014, she also successfully pushed for the prominent Institute of Electrical and Electronics (IEEE) Board of Directors toinclude trans-specific protections in its Code of Ethics.

Jon maddog Hall has been the Board Chair of the Linux Professional Institute (the certification body for free and open-source software professionals) since 2015. In addition, hes executive director of the industry group Linux International, as well as an author with Linux Pro Magazine.

In a 2012 column in Linux Magazine, Hall came out as gay, citing Alan Turing as a hero and an inspiration.In fact, computer science was a haven for homosexuals, trans-sexuals and a lot of other sexuals, mostly because the history of the science called for fairly intelligent, modern-thinking people, he wrote. Many computer companies were the first to enact diversity programs, and the USENIX organization had a special interest group that was made up of LGBT people. He also became an advocate of marriage equality.

In 2012, Leanne Pittsford founded Lesbians Who Tech, which claims its the largest LGBTQ community of technologists in the world (with 40+ city chapters and 60,000 members). Lesbians Who Tech hosts an annual San Francisco Summit attended by as many as 5,000 women and non-binary people, and it provides mentoring and leadership programs as well as the aforementioned Edie Windsor Coding Scholarship Fund.

Pittsford is also the founder of include.io, which connects underrepresented technologists with companies and technical mentors. In 2016, she also organizedthe third annual LGBTQ Tech and Innovation Summit at the White House.

The third Chief Technology Officer of the United States (U.S. CTO) under President Barack Obama, Megan Smith also served as a vice president at Google. As U.S. CTO, she spearheaded a number of initiatives, including the recruitment of tech talent for national service. She also recognized the need to build up the governments capabilities in data science, open data, and digital policy.

Smith is currently the CEO and co-founder of shift7, which works collaboratively on systemic social, environmental and economic problems. She is also a life member of the board of MIT, as well as a member of the Council on Foreign Relations and the National Academy of Engineering.

Widely considered the first chief executive officer of a Fortune 500 company to come out as gay, Apple CEO Tim Cooktold CNNback in 2014 that he went public in order to show gay children that they could be gay and still go on and do some big jobs in life.

Cook, who once said that being gay is Gods greatest gift to me, joined Apple as a senior vice president in 1998, during some of its leanest years. He quickly solidified his reputation as a peerless operations executive, refining the companys supply and manufacturing chains. As Apple rose to new corporate heights on the strength of its iPod, iPhone, and iPad sales, this supply-chain refinement ensured that millions of devices reached users hands.Cook was promoted to chief operating officer, and stepped in to temporarily head the company when CEO Steve Jobs fell sick with cancer.

Following the death of Jobs in 2011, Cook took the CEO reins and restructured the executive team, with a renewed focus on creating a culture of teamwork and collaboration. He oversaw the launch of the Apple Watch and the AirPods, moving Apple in the long-predicted direction of wearables, and began to shift the companys focus from hardware to cloud-based services such as music and gaming.

Membership has its benefits. Sign up for a free Dice profile, add your resume, discover great career insights and set your tech career in motion. Register now

More here:
7 Prominent LGBTQ+ Technologists, Past and Present - Dice Insights

The Transcendent Three: Why These Women Were Worthy Of The Prestigious Turing Award – Analytics India Magazine

Women might be fighting gender stereotypes and advocating for more inclusive policies at the workplace today, but their preoccupations were quite different decades even centuries ago. From carrying the mantle of being the worlds first programmers, to taking it forward to support lunar missions and make incredible discoveries, women have played a significant role in the advancement of technology.

For inexplicable reasons, however, they have been largely missing from awards circles. Especially, when it comes to the Turing Award popularly known by its moniker, the Nobel Prize of Computing only three women have earned the recognition. What is more astounding is the fact that the first win came 40 years after the award was first instituted in 1966.

Although this may give the impression that men alone are responsible for nearly all computing breakthroughs, the truth is that women, although underrepresented in the larger computing community, have enhanced and widened the ambit of this field.

Here, we celebrate the recipients of the prestigious Turing Award and attempt to acknowledge and understand the accomplishments that have won them this plaudit.

ALSO READ: How Covid-19 Can Be An Opportunity For Businesses To Support Women In Tech

Throughout her long and illustrious career, Frances Allen made pioneering contributions to the theory and practice of optimising compiler techniques, which in turn, laid the foundation for modern optimising compilers. She has created a name for herself with her dogged focus on making programs run efficiently by conducting sophisticated analysis and optimisation of code, and creating a series of working systems that run programs faster. In fact, programming language compilers still rely on techniques introduced by her to this day.

A strong foundation in math led her to take up a brief stint as a teacher, followed by a Masters program at the University of Michigan, where she was introduced to courses in computing. This led her to take her first steps in IBM, where she remained for the next 45 years.

She spent a bulk of this time developing cutting-edge programming language compilers for IBM Research. She was deeply involved in the development of one of the first supercomputers, Stretch. After that, she joined the Advanced Computing Systems project (ACS), which included further cutting-edge advances in computer system design.

Her last big project for IBM was the Parallel Translator (PTRAN), where she applied her experience with interprocedural flow analysis to produce new algorithms that could extract parallelism from sequential code. This paved the way for program dependence graph concept now used by many parallelising compilers.

Named an IBM Fellow in 1989 and an IEEE Fellow two years later, she continues to advise IBM on a number of projects and extensively works to promote and encourage women in computer-related fields.

After graduating in math from the University of California, Berkeley, she directly took a job where she discovered her natural ability to understand computer programming. This prompted her to pursue computer translation of human languages at Harvard to start a rich career in the field.

In a long list of accomplishments, Barbara Liskovs reputation in the MIT community for her contributions as a scholar and mentor speaks volumes about the depth of her knowledge. Cultivated over years of experience with programming languages and system design, her role in laying the practical and theoretical foundations in these fields truly make her worthy of this recognition, and more.

Barbara never left academics and went on to become the first woman in the US to be awarded a PhD in computer science. Her seminal work on the Venus Computer began right after that, following which, she took up a position at MIT in the Computer Science department.

While teaching, she led the design and implementation of the CLU programming language. This was hinged on concepts like data abstraction and polymorphism, which is incidentally the foundation of object-oriented programming used in modern computer languages. She was also involved in the creation of the Argus language, which became a big influence on other developers.

Her research has largely been anchored around creating more reliable computer systems and has covered object-oriented database systems, decentralised information flow, Byzantine fault tolerance, and more.

In 2008, she was named Institute Professor at MIT, the highest honour awarded to a faculty member there.

Sharing the honour with Silvio Micali, Shafi Goldwasser earned this recognition for her transformative work in cryptography, computational complexity and probabilistic algorithms. In fact, throughout the course of her career, she has written landmark papers that became the starting point for entire subfields in computer science.

After graduating with a mathematics degree from Carnegie Mellon University, she soon gravitated towards programming and computer science at University of California, Berkeley, where she developed an interest in theoretical areas.

Thereafter, she came in contact with a research group with similar interests and collectively explored several ideas with them can the notion of a pseudorandom number generator be generalised to generate exponentially many bits pseudorandomly? Is there an interactive process to determine if a prover can convince a probabilistic verifier of the correctness of a mathematical proposition if the proposition is correct?

Interactive proofs have also played significant roles in her recent studies, most of which have emerged as important research areas in cryptography. In recent weeks, Shafi has been deeply involved in researches that seek to better understand Covid-19 statistics. Her latest study delved into how technology can use data to arrive at conclusions without actually reading or sharing the information.

comments

Link:
The Transcendent Three: Why These Women Were Worthy Of The Prestigious Turing Award - Analytics India Magazine