Quantum internet: the next global network is already being laid – The Conversation UK

Google reported a remarkable breakthrough towards the end of 2019. The company claimed to have achieved something called quantum supremacy, using a new type of quantum computer to perform a benchmark test in 200 seconds. This was in stark contrast to the 10,000 years that would supposedly have been needed by a state-of-the-art conventional supercomputer to complete the same test.

Despite IBMs claim that its supercomputer, with a little optimisation, could solve the task in a matter of days, Googles announcement made it clear that we are entering a new era of incredible computational power.

Yet with much less fanfare, there has also been rapid progress in the development of quantum communication networks, and a master network to unite them all called the quantum internet. Just as the internet as we know it followed the development of computers, we can expect the quantum computer to be accompanied by the safer, better synchronised quantum internet.

Like quantum computing, quantum communication records information in what are known as qubits, similar to the way digital systems use bits and bytes. Whereas a bit can only take the value of zero or one, a qubit can also use the principles of quantum physics to take the value of zero and one at the same time. This is what allows quantum computers to perform certain computations very quickly. Instead of solving several variants of a problem one by one, the quantum computer can handle them all at the same time.

These qubits are central to the quantum internet because of a property called entanglement. If two entangled qubits are geographically separated (for instance, one qubit in Dublin and the other in New York), measurements of both would yield the same result. This would enable the ultimate in secret communications, a shared knowledge between two parties that cannot be discovered by a third. The resulting ability to code and decode messages would be one of the most powerful features of the quantum internet.

There will be no shortage of commercial applications for these advanced cryptographic mechanisms. The world of finance, in particular, looks set to benefit as the quantum internet will lead to enhanced privacy for online transactions and stronger proof of the funds used in the transaction.

Recently, at the CONNECT Centre in Trinity College Dublin, we successfully implemented an algorithm that could achieve this level of security. That this took place during a hackathon a sort of competition for computer programmers shows that even enthusiasts without detailed knowledge of quantum physics can create some of the building blocks that will be needed for the quantum internet. This technology wont be confined to specialist university departments, just as the original internet soon outgrew its origins as a way to connect academics around the world.

But how could this quantum internet be built anytime soon when we currently can only build very limited quantum computers? Well, the devices in the quantum internet dont have to be completely quantum in nature, and the network wont require massive quantum machines to handle the communication protocols.

One qubit here and there is all a quantum communication network needs to function. Instead of replacing the current infrastructure of optical fibres, data centres and base stations, the quantum internet will build on top of and make maximum use of the existing, classical internet.

With such rapid progress being made, quantum internet technology is set to shape the business plans of telecom companies in the near future. Financial institutions are already using quantum communication networks to make inter-bank transactions safer. And quantum communication satellites are up and running as the first step to extending these networks to a global scale.

The pipes of the quantum internet are effectively being laid as you read this. When a big quantum computer is finally built, it can be plugged into this network and accessed on the cloud, with all the privacy guarantees of quantum cryptography.

What will the ordinary user notice when the enhanced cryptography of the quantum internet becomes available? Very little, in all likelihood. Cryptography is like waste management: if everything works well, the customer doesnt even notice.

In the constant race of the codemakers and codebreakers, the quantum internet wont just prevent the codebreakers taking the lead. It will move the race track into another world altogether, with a significant head start for the codemakers. With data becoming the currency of our times, the quantum internet will provide stronger security for a new valuable commodity.

Continued here:
Quantum internet: the next global network is already being laid - The Conversation UK

Robots, clocks and computers: How Ancient Greeks got there first – WHBL News

Tuesday, February 18, 2020 8:07 a.m. CST by Thomson Reuters

By George Georgiopoulos and Deborah Kyvrikosaios

ATHENS (Reuters) - A humanoid figure dressed as a maid holds a jug in its right hand and, as hidden gears click and whirr, lifts it and pours wine into a cup a bystander has placed into the palm of its left.

The robot is a recreation of the automatic servant of Philon, designed more than 2,200 years ago by a Greek engineer and operating though a complex mechanism of springs, weights and air pressure that also allowed it to dilute the alcohol with water.

It is the focal point of an exhibition of more than 100 inventions that highlight the vast extent of Ancient Greece's technological legacy and also features an analogue computer, an alarm clock and automatic fire doors.

"By just opening up the hood of a modern car, you will see bolts and nuts, screws, automatic pilots. All of these were just some of the inventions (pioneered)... by the ancient Greeks that were the building blocks of complex technology," said exhibition director Panagiotis Kotsanas.

The exhibits are explained with audio-visual material and detailed diagrams, and many are interactive.

The automatic doors of Heron of Alexandria were considered a miracle of the gods. Installed in a temple, they opened when a fire burned on its altar, to the awe of those spectating.

Viewed as a precursor of the computer, the 2,000-year-old Antikythera mechanism forecast astronomical and calendar events using gears and dials.

The philosopher Plato's alarm clock used a hydraulic system of ceramic jugs filled with water to 'ring' with a chirping sound at the desired time.

Other recreations include Polybolos, a repeating catapult capable of launching arrows in succession, examples of cryptography to send coded messages in times of war, and the Pyoulkos, a syringe used for injections and to remove pus.

The exhibition is on permanent display at the Kotsanas Museum of Ancient Greek Technology in central Athens.

(Reporting by George Georgiopoulos; writing and editing by John Stonestreet)

Follow this link:
Robots, clocks and computers: How Ancient Greeks got there first - WHBL News

The Top 7 Network Security Books You Need to Read in 2020 – Solutions Review

For network engineers and administrators thatfocus on network security, books are an excellent resource for learning how to effectively design and operate network security solutions. To that end, weve listed the top seven network security books that you should add to your reading list below. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in building and running wireless networks.

If youre looking for resources to help you evaluate network performance monitoring (NPM) solutions, our freeNetwork Monitoring Buyers Guidehas you covered! It contains profiles on the top network monitoring providers in the market today, including descriptions of the tools they offer and noteworthy features of each. The guide also features 10 questions you should ask prospective vendors and yourself before buying a network monitoring solution. You can check out that guidehere.

by Chris Sanders and Jason Smith

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network.

by William Stallings

StallingsCryptography and Network Security, Seventh Edition,introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security.

by Amanda Berlin and Lee Brotherston

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations dont have the budget to establish or outsource an information security program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

by Ed Wilson

Ever wonder whats actually happening inside your network? Why multi-tier applications suddenly slow down, print jobs fail, network elements suddenly disappear? [] Thats where Ed Wilsons Network Monitoring and Analysis comes in. Its your complete, hands-on guide to monitoring and analyzing Windows NT-based networks-and using the information to maximize performance, plan for growth-even identify intruders!

by William Stallings

Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

by Robert Collins

The author begins by explaining some of the basics of computer networking and the basic tools which can be used for monitoring a computer network. The process of capturing and analyzing the packets of a network is discussed in detail. This is a good technique which can help network security experts identify anomalies or malicious attacks on the packets transmitted over a network. You are also guided on how to monitor the network traffic for the Heartbleed bug, which is very vulnerable to network attackers.

by Manuj Aggarwal

While connected to the internet, youre a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or shield) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the worlds most trusted open source network security solution.

Looking for a solution to help you improve your network performance? OurNetwork Monitoring Buyers Guidecontains profiles on the top network performance monitor vendors, as well as questions you should ask providers and yourself before buying.

Check us out onTwitterfor the latest in Network Monitoring news and developments!

Dan is a tech writer who writes about Enterprise Cloud Strategy and Network Monitoring for Solutions Review. He graduated from Fitchburg State University with a Bachelor's in Professional Writing. You can reach him at dhein@solutionsreview.com

Original post:
The Top 7 Network Security Books You Need to Read in 2020 - Solutions Review

Cryptographic tag of everything could protect the supply chain – MIT News

To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag thats small enough to fit on virtually any product and verify its authenticity.

A 2018 report from the Organization for Economic Co-operation and Development estimates about $2 trillion worth of counterfeit goodswill be sold worldwide in 2020. Thats bad news for consumers and companies that order parts from different sources worldwide to build products.

Counterfeiters tend to use complex routes that include many checkpoints, making it challenging to verifying their origins and authenticity. Consequently, companies can end up with imitation parts. Wireless ID tags are becoming increasingly popular for authenticating assets as they change hands at each checkpoint. But these tags come with various size, cost, energy, and security tradeoffs that limit their potential.

Popular radio-frequency identification (RFID) tags, for instance, are too large to fit on tiny objects such as medical and industrial components, automotive parts, or silicon chips. RFID tags also contain no tough security measures. Some tags are built with encryption schemes to protect against cloning and ward off hackers, but theyre large and power hungry. Shrinking the tags means giving up both the antenna package which enables radio-frequency communication and the ability to run strong encryption.

In a paper presented yesterday at the IEEE International Solid-State Circuits Conference (ISSCC), the researchers describe an ID chip that navigates all those tradeoffs. Its millimeter-sized and runs on relatively low levels of power supplied by photovoltaic diodes. It also transmits data at far ranges, using a power-free backscatter technique that operates at a frequency hundreds of times higher than RFIDs. Algorithm optimization techniques also enable the chip to run a popular cryptography scheme that guarantees secure communications using extremely low energy.

We call it the tag of everything. And everything should mean everything, says co-author Ruonan Han, an associate professor in the Department of Electrical Engineering and Computer Science and head of the Terahertz Integrated Electronics Group in the Microsystems Technology Laboratories (MTL). If I want to track the logistics of, say, a single bolt or tooth implant or silicon chip, current RFID tags dont enable that. We built a low-cost, tiny chip without packaging, batteries, or other external components, that stores and transmits sensitive data.

Joining Han on the paper are: graduate students Mohamed I. Ibrahim and Muhammad Ibrahim Wasiq Khan, and former graduate student Chiraag S. Juvekar; former postdoc associate Wanyeong Jung; former postdoc Rabia Tugce Yazicigil, who is currently an assistant professor at Boston University and a visiting scholar at MIT; and Anantha P. Chandrakasan, who is the dean of the MIT School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science.

System integration

The work began as a means of creating better RFID tags. The team wanted to do away with packaging, which makes the tags bulky and increases manufacturing cost. They also wanted communication in the high terahertz frequency between microwave and infrared radiation around 100 gigahertz and 10 terahertz that enables chip integration of an antenna array and wireless communications at greater reader distances. Finally, they wanted cryptographic protocols because RFID tags can be scanned by essentially any reader and transmit their data indiscriminately.

But including all those functions would normally require building a fairly large chip. Instead, the researchers came up with a pretty big system integration, Ibrahim says, that enabled putting everything on a monolithic meaning, not layered silicon chip that was only about 1.6 square millimeters.

One innovation is an array of small antennas that transmit data back and forth via backscattering between the tag and reader. Backscatter, used commonly in RFID technologies, happens when a tag reflects an input signal back to a reader with slight modulations that correspond to data transmitted. In the researchers system, the antennas use some signal splitting and mixing techniques to backscatter signals in the terahertz range. Those signals first connect with the reader and then send data for encryption.

Implemented into the antenna array is a beam steeringfunction, where the antennas focus signals toward a reader, making them more efficient, increasing signal strength and range, and reducing interference. This is the first demonstration of beam steering by a backscattering tag, according to the researchers.

Tiny holes in the antennas allow light from the reader to pass through to photodiodes underneath that convert the light into about 1 volt of electricity. That powers up the chips processor, which runs the chips elliptic-curve-cryptography (ECC) scheme. ECC uses a combination of private keys (known only to a user)and public keys (disseminated widely) to keep communications private. In the researchers system, the tag uses a private key and a readers public key to identify itself only to valid readers. That means any eavesdropper who doesnt possess the readers private key should not be able to identify which tag is part of the protocol by monitoring just the wireless link.

Optimizing the cryptographic code and hardware lets the scheme run on an energy-efficient and small processor, Yazicigil says. Its always a tradeoff, she says. If you tolerate a higher-power budget and larger size, you can include cryptography. But the challenge is having security in such a small tag with a low-power budget.

Pushing the limits

Currently, the signal range sits around 5 centimeters, which is considered a far-field range and allows for convenient use of a portable tag scanner. Next, the researchers hope to push the limits of the range even further, Ibrahim says. Eventually, theyd like many of the tags to ping one reader positioned somewhere far away in, say, a receiving room at a supply chain checkpoint. Many assets could then be verified rapidly.

We think we can have a reader as a central hub that doesnt have to come close to the tag, and all these chips can beam steer their signals to talk to that one reader, Ibrahim says.

The researchers also hope to fully power the chip through the terahertz signals themselves, eliminating any need for photodiodes.

The chips are so small, easy to make, and inexpensive that they can also be embedded into larger silicon computer chips, which are especially popular targets for counterfeiting.

The U.S. semiconductor industry suffered $7 billion to $10 billion in losses annually because of counterfeit chips, Wasiq Khan says. Our chip can be seamlessly integrated into other electronic chips for security purposes, so it could have huge impact on industry. Our chips cost a few cents each, but the technology is priceless, he quipped.

More:
Cryptographic tag of everything could protect the supply chain - MIT News

Quantum Cryptography Market 2020: Trends, Segment and Evolution Rate by Type and Application Forecast to 2026 – Keep Reading

Our latest research report entitle Global Quantum Cryptography Market provides comprehensive and deep insights into the market dynamics and growth of Global Quantum Cryptography Industry. Latest information on market risks, industry chain structure, Quantum Cryptography cost structure and opportunities are offered in this report. The entire industry is fragmented based on geographical regions, a wide range of applications and Global Quantum Cryptography Market types. The past, present and forecast market information will lead to investment feasibility by studying the crucial Global Quantum Cryptography Industry growth factors.

Get FREE Sample Report Copy @ https://www.globalmarketers.biz/report/business-services/2018-global-quantum-cryptography-industry-research-report/118256 #request_sample

Global Quantum Cryptography Market Analysis By Major Players:

HP Development CompanyID QuantiqueIBMNokia

Global Quantum Cryptography Market Analysis By Geographical Zones:

Europe Market (Germany, France, Italy, Russia and UK)

North America Market (Canada, USA and Mexico)

Latin America Market (Middle and Africa).

Quantum Cryptography Market in Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

Asia-Pacific Market (South-east Asia, China, India, Korea and Japan).

Global Quantum Cryptography Market news, plans & policies, market drivers, analysis of upstream raw material suppliers and downstream buyers of Quantum Cryptography is carried out in this report. Global Quantum Cryptography Industry forecast study enlists the market value (in USD) and volume forecast for each region, product type, and applications.

Types Of Global Quantum Cryptography Market:

DesignStudy

Applications Of Global Quantum Cryptography Market:

Governing and regulatory bodiesLarge enterprisesSMEs

Inquiry Here For Detail Report @ https://www.globalmarketers.biz/report/business-services/2018-global-quantum-cryptography-industry-research-report/118256 #inquiry_before_buying

To Provide A Clear Global Quantum Cryptography Market Structure The Report Is Divided Into 12 Chapters As Follows:

Explore Full Report With Detailed TOC Here @ https://www.globalmarketers.biz/report/business-services/2018-global-quantum-cryptography-industry-research-report/118256 #table_of_contents

Major points from Table of Contents for Global Quantum Cryptography Industry 2020 Market Research Report include:

1 Market Overview

2 Global Quantum Cryptography Market Competition by Manufacturers

3 Global Quantum Cryptography Capacity, Production, Revenue (Value) by Region (2020-2026)

4 Global Quantum Cryptography Industry Supply (Production), Consumption, Export, Import by Region (2020-2026)

5 Global Quantum Cryptography Production, Revenue (Value), Price Trend by Type

6 Global Quantum Cryptography Market Analysis by Application

7 Global Quantum Cryptography Industry Manufacturers Profiles/Analysis

8. Quantum Cryptography Manufacturing Cost Analysis

9 Industrial Chain, Sourcing Strategy and Downstream Buyers

10 Marketing Strategy Analysis, Distributors/Traders

11 Market Effect Factors Analysis

12 Global Quantum Cryptography Market Forecast (2020-2026)

13 Research Findings and Conclusion

14 Appendix

Explore Full Report With Detailed TOC Here @ https://www.globalmarketers.biz/report/business-services/2018-global-quantum-cryptography-industry-research-report/118256 #table_of_contents

Read the rest here:
Quantum Cryptography Market 2020: Trends, Segment and Evolution Rate by Type and Application Forecast to 2026 - Keep Reading

Quantum Internet: The Technology That Could Change Everything? – The National Interest Online

Google reported a remarkable breakthrough towards the end of 2019. The company claimed to have achieved something called quantum supremacy, using a new type of quantum computer to perform a benchmark test in 200 seconds. This was in stark contrast to the 10,000 years that would supposedly have been needed by a state-of-the-art conventional supercomputer to complete the same test.

Despite IBMs claim that its supercomputer, with a little optimisation, could solve the task in a matter of days, Googles announcement made it clear that we are entering a new era of incredible computational power.

Yet with much less fanfare, there has also been rapid progress in the development of quantum communication networks, and a master network to unite them all called the quantum internet. Just as the internet as we know it followed the development of computers, we can expect the quantum computer to be accompanied by the safer, better synchronised quantum internet.

Like quantum computing, quantum communication records information in what are known as qubits, similar to the way digital systems use bits and bytes. Whereas a bit can only take the value of zero or one, a qubit can also use the principles of quantum physics to take the value of zero and one at the same time. This is what allows quantum computers to perform certain computations very quickly. Instead of solving several variants of a problem one by one, the quantum computer can handle them all at the same time.

These qubits are central to the quantum internet because of a property called entanglement. If two entangled qubits are geographically separated (for instance, one qubit in Dublin and the other in New York), measurements of both would yield the same result. This would enable the ultimate in secret communications, a shared knowledge between two parties that cannot be discovered by a third. The resulting ability to code and decode messages would be one of the most powerful features of the quantum internet.

Commercial applications

There will be no shortage of commercial applications for these advanced cryptographic mechanisms. The world of finance, in particular, looks set to benefit as the quantum internet will lead to enhanced privacy for online transactions and stronger proof of the funds used in the transaction.

Recently, at the CONNECT Centre in Trinity College Dublin, we successfully implemented an algorithm that could achieve this level of security. That this took place during a hackathon a sort of competition for computer programmers shows that even enthusiasts without detailed knowledge of quantum physics can create some of the building blocks that will be needed for the quantum internet. This technology wont be confined to specialist university departments, just as the original internet soon outgrew its origins as a way to connect academics around the world.

But how could this quantum internet be built anytime soon when we currently can only build very limited quantum computers? Well, the devices in the quantum internet dont have to be completely quantum in nature, and the network wont require massive quantum machines to handle the communication protocols.

One qubit here and there is all a quantum communication network needs to function. Instead of replacing the current infrastructure of optical fibres, data centres and base stations, the quantum internet will build on top of and make maximum use of the existing, classical internet.

With such rapid progress being made, quantum internet technology is set to shape the business plans of telecom companies in the near future. Financial institutions are already using quantum communication networks to make inter-bank transactions safer. And quantum communication satellites are up and running as the first step to extending these networks to a global scale.

The pipes of the quantum internet are effectively being laid as you read this. When a big quantum computer is finally built, it can be plugged into this network and accessed on the cloud, with all the privacy guarantees of quantum cryptography.

What will the ordinary user notice when the enhanced cryptography of the quantum internet becomes available? Very little, in all likelihood. Cryptography is like waste management: if everything works well, the customer doesnt even notice.

In the constant race of the codemakers and codebreakers, the quantum internet wont just prevent the codebreakers taking the lead. It will move the race track into another world altogether, with a significant head start for the codemakers. With data becoming the currency of our times, the quantum internet will provide stronger security for a new valuable commodity.

Harun iljak, Postdoctoral Research Fellow in Complex Systems Science for Telecommunications, Trinity College Dublin

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Image: Reuters

Read the rest here:
Quantum Internet: The Technology That Could Change Everything? - The National Interest Online

IOHK, Cardanos Official Partner, Donates $500,000 in ADA to University of Wyoming to Drive Blockchain Adoptions – NewsLogical

IOHK, Cardano Foundations official partner, has revealed that it donated $500,000 in ADA cryptocurrency to the Unversity of Wyomings (UW) Blockchain Research and Development Lab in Laramie, to drive blockchain application in smart contracts, cryptography and supply chain management.

According to a release sent to NewsLogical, the IOHKs donation is centered on driving innovative blockchain application.

IOHK, which donated the huge fund, was founded by the co-founder of Ethereum and Cardano, Charles Hoskinson.

The scientist made the announcement, saying the donation of $500,000 was made in ADA cryptocurrency.

Wyoming is the only state in the US legislating in support of blockchain technology. The state has enacted around 13 blockchain-enabling laws to drive cryptocurrency adoption across the US state.

Wyoming offers comprehensive, welcoming legal framework that increases the adoption of blockchain technology in the state.

The said donation will support UWs faculty and graduate students, charging them to develop application in the blockchain space for real-world use cases.

IOHK is a research and development company and industry leader in the fields of cryptography and distributed systems founded in 2014, has championed different blockchain research and advanced industry knowledge employing the services of its global team of cryptographers and researchers.

The real-world applications of Blockchain are limitless and IOHKs donation of $500,000 in ADA, the native cryptocurrency of our cardano blockchain platform to the University of Wyomings Blockchain Research and Development Lab will go some way toward realising that potential and will help to bolster Wyomings burgeoning blockchain revolution, says IOHK CEO, Charles Hoskinson.

The Wyoming Blockchain Taskforces supportive business environment and the excellence of the University of Wyomings science research is what led IOHK to choose to invest here. We are incorporated here as a business and are very happy to play a small part in helping embed Wyomings position at the global heart of blockchain-based innovation.

In his remark, UW Acting President Neal Theobald, says the donation makes the University of Wyoming to be proud of its role as a leader in blockchain research and education.

This support will help us continue to move forward in a very exciting and promising field of innovation and discovery, he said.

Were immensely proud of the work the Task Force has achieved in making the state of Wyoming one of the worlds most attractive destinations for businesses looking to build innovative companies, developing real-world uses for blockchain technology, adds Caitlin Long, formerly a member of the Wyoming Blockchain Task Force.

IOHKs $500,000 donation, in the native Cardano cryptocurrency, ADA, will not just fund research into real-world uses of blockchain technology, but will also develop Wyoming further methods in the world.

See the rest here:
IOHK, Cardanos Official Partner, Donates $500,000 in ADA to University of Wyoming to Drive Blockchain Adoptions - NewsLogical

Cryptography 101: What are the mechanics of information security? – Lexology

Whilst cryptography may sound like some obscure and foreign concept, we rely on it every day to ensure that our information is secure.

Cryptography refers to the field of study of a range of concepts which are used to provide secure communication, including encryption, decryption, algorithms, computer programming and transmission technology.

The Australian Government providesGuidelines for Using Cryptography(the Guidelines), stating that the purpose of cryptography is to provide:

Encryption

Encryptionis the process of encoding a message with an algorithm and is one of the aspects of cryptography.

Encryption can be used in two key ways:

Cryptographic systems

Cryptographic systems are comprised of cryptographic equipment and keying material (data). The Guidelines provide advice on the storage and transportation of Commercial Grade Cryptographic Equipment (CGCE).

High Assurance Cryptographic Equipment(HACE) is used by organisations to protect highly classified information. Due to the sensitive nature of HACE, and the limited information publicly available on it, organisations must contact the Australian Cyber Security Centre (ACSC) before using it.

Cryptographic algorithms

Algorithms are one important component of cryptography and are key to the functioning of encryption. TheAustralian Signals Directorate(ASD) provides a list of approved cryptographic algorithms which have been extensively tested for resistance to attacks.

ASD approved cryptographic algorithms (AACAs) fall into three categories: asymmetric/public key algorithms, hashing algorithms and symmetric encryption algorithms. The differences between these algorithms are highly technical.

The Guidelines also provide a number of cryptographic algorithms for the protection of highly classified information such assecret and top secret information.

Cryptographic protocols

The Guidelines provide a list of approved cryptographic protocols which can be used with cryptographic equipment and software to secure information. The ASD approved cryptographic protocols (AACPs) are:

Further information on these AACPs is provided in the Guidelines.

Read the original post:
Cryptography 101: What are the mechanics of information security? - Lexology

Robots, clocks and computers: How Ancient Greeks got there first – Midwest Communication

Tuesday, February 18, 2020 9:07 a.m. EST

By George Georgiopoulos and Deborah Kyvrikosaios

ATHENS (Reuters) - A humanoid figure dressed as a maid holds a jug in its right hand and, as hidden gears click and whirr, lifts it and pours wine into a cup a bystander has placed into the palm of its left.

The robot is a recreation of the automatic servant of Philon, designed more than 2,200 years ago by a Greek engineer and operating though a complex mechanism of springs, weights and air pressure that also allowed it to dilute the alcohol with water.

It is the focal point of an exhibition of more than 100 inventions that highlight the vast extent of Ancient Greece's technological legacy and also features an analogue computer, an alarm clock and automatic fire doors.

"By just opening up the hood of a modern car, you will see bolts and nuts, screws, automatic pilots. All of these were just some of the inventions (pioneered)... by the ancient Greeks that were the building blocks of complex technology," said exhibition director Panagiotis Kotsanas.

The exhibits are explained with audio-visual material and detailed diagrams, and many are interactive.

The automatic doors of Heron of Alexandria were considered a miracle of the gods. Installed in a temple, they opened when a fire burned on its altar, to the awe of those spectating.

Viewed as a precursor of the computer, the 2,000-year-old Antikythera mechanism forecast astronomical and calendar events using gears and dials.

The philosopher Plato's alarm clock used a hydraulic system of ceramic jugs filled with water to 'ring' with a chirping sound at the desired time.

Other recreations include Polybolos, a repeating catapult capable of launching arrows in succession, examples of cryptography to send coded messages in times of war, and the Pyoulkos, a syringe used for injections and to remove pus.

The exhibition is on permanent display at the Kotsanas Museum of Ancient Greek Technology in central Athens.

(Reporting by George Georgiopoulos; writing and editing by John Stonestreet)

Originally posted here:
Robots, clocks and computers: How Ancient Greeks got there first - Midwest Communication

Can All Of Bitcoin Be Hacked? – Forbes

$280 billion rides on the proposition that cryptocurrency is impregnable. Maybe it isnt.

Machinery in an IBM quantum computing lab (photo by Seth Wenig)

Call it the singularity. One day, maybe a decade from now, a message flashes across the internet: Elliptic curves cracked!

Elliptic curve cryptography, or ECC, is the foundation beneath bitcoin. Wouldnt the discovery of a hole in this code destroy the currencyand take down any coin exchange?

I posed the question to Brian Armstrong, who co-founded and runs Coinbase, the largest U.S. crypto exchange. He cant prove that there wont be some mathematical shortcut compromising bitcoin keys. But he considers the risk low.

Ten years in, there's a ton of people who have looked at this code, he answered, in an interview at the Coinbase headquarters in San Francisco. It's a hundred-billion-dollar bounty. So I think that scenario is very unlikely.

Bitcoin plus the lesser currencies that compete with it amount to a $280 billion asset pile, a tempting target for bad guys. From bitcoins earliest days, hacks, cracks, hijacks, phishes, vishes, and social engineering have threatened it. So far the successful assaults on this industry have been around the edges; even the big heist at Mt. Gox did not kill cryptocurrency.

But what if thieves discover a fundamental vulnerability? It might be in the way the encryption works. It might be in the global network of computer nodes that track ownership of bitcoin. It might be in some aspect of crypto that no one is thinking much about.

Crypto players offer two answers to the question about cosmic risks. One is that the system might see an asteroid coming and take defensive measures. If bitcoins 11-year-old encryption proves to have a weak spot, the nodes could move en masse to a different protocol. They might be able to do this before any coins have been stolen. Alternatively, they could hark back to an earlier version of the blockchain that was in place before a theft; this is how the Ethereum chain partly undid some skulduggery involving the DAO venture capital fund.

The other answer, not entirely reassuring, is that a lot more than bitcoin is at stake. Says Philip Martin, head of security for Coinbase: A core math problem? Were talking the collapse of the internet. Trillions of dollars course through electronic networks protected with encryption. So, for what its worth, in the digital apocalypse an implosion of bitcoin would be the least of our concerns.

Lets now consider some of the weaknesses that envelop digital currency.

Bad implementation

Once upon a time Sony used elliptic curves to protect its PlayStation. In order to run, a game would have to provide a digital signature constructed from Sonys secret key, the same kind of key that protects your bitcoin. The signature routine uses, as one of its inputs, a different randomly chosen number for each validating signature.

Sony goofed, recycling the same number. It turns out that this enabled anyone possessing two legitimate games and a knowledge of high-school algebra to compute the secret key and run pirated games. Andrea Corbellini, a cryptographer who has explained the flaw, speculates that Sony might have been inspired by this Dilbert cartoon.

You might think that all such potholes were found long ago and repaired. But no. Recently the National Security Agency reported on a flaw in a Microsoft browser that made a mistake in delivering the digital signatures that verify websites as legitimate. ECC calls for using a specific starting point. The flaw enabled a website to slip in a different point. With just the right substitute, a malicious site could have forged a signature and stolen the password for your bank account.

Microsoft quickly patched the hole. But it makes you wonder. Could there be other holes in some or all of the software used to hold and transfer virtual currencies?

Crypto managers are on guard. Says Martin, the Coinbase security guy: I am much more scared of an implementation flaw in a library than I am of a flaw in the underlying math.

Some bitcoin owners, trying to manage their own coin wallets, have made the same mistake Sony did with its game console. Writes one security expert: A lot of Russian bitcoin hackers have coded bots to automatically grab coins from vulnerable addresses. Presumably you have nothing to worry about if you hire experts to manage your wallet.

Social engineering

A crook doesnt have to know algebra to steal bitcoin. Good acting might do it.

Jamie Armistead is a vice president at Early Warning, the bank consortium that runs the Zelle payments network. Is there a risk that someone will crack the encryption that protects the money coursing through Zelle? Answers Armistead: Its not hacking that keeps him awake at night. Its phishing, like the false email to the corporate treasurer.

Vishing, a variant of phishing involving voice commands, is a security risk. So is device hijacking, in which the thief gets control of your smartphone account. So are all manner of man-in-the-middle attacks, the electronic version of a football pass interception. Cybersecurity engineers constantly update communication protocols to prevent that. They can barely keep up.

Could a hoax on a grand scale cause a majority of bitcoin nodes to simultaneously make a fatal mistake? It would have to be rather byzantine. Its conceivable.

Mathematical hacks

Encryption methods in common use look secure, because they have been studied for many years by many people. But they are not provably secure. Someone might discover a way to tunnel into them.

Encryption works by scrambling numbers. One way to do that, in the scheme named RSA (after inventors Rivest, Shamir and Adleman) that is still widely used to secure sensitive data, involves exponentiation and modular arithmetic. When you multiply 4 by itself 3 times, 3 is the exponent and you get 64. In modulo 11, you divide this by 11 and consider only the remainder 9.

With small numbers like these, this is a meaningless exercise. But cryptography uses gigantic numbers, and those numbers get shuffled into a giant mess. To get a sense of this, try out the exponentiation/modular game on our small numbers: 2 turns into 8, 3 into 5, 4 into 9 and so on. The only way to unshuffle is to know a certain secret about the modulo. This secret relates to some mathematical formulas that go back a long ways. A 17th century Frenchman named Fermat played an important role.

The other big shuffling scheme is ECC. This involves the modular multiplying of not single numbers but pairs of them. Think of the pair as the coordinates on a map. The multiplying is weird: To double a pair, you dont just move it twice as far from the corner; you bounce it off an elliptic curve. This scrambles all the points on the map. In cryptography, the starting point is not merely doubled; it is multiplied by a gigantic number. This really scrambles the map. That giant number, kept secret, is the key that unlocks a bitcoin.

RSA and ECC both have this feature: Someone who possesses the secret can prove that he possesses it without revealing it.

These two protection schemes rely on the apparent difficulty of certain arithmetic tasks. In the case of RSA, its finding the two numbers that were multiplied together to arrive at the modulo; in the case of ECC, its dividing the end point by the starting point to determine the multiplier. Difficult means taking trillions of years of guesswork on a laptop.

Unless shortcuts are found. For RSA, a well-known shortcut to factoring numbers involves a number sieve. For ECC, theres a big step, little step algorithm that dramatically reduces the computation time. At this point, these tricks go only so far. The difficulty, for a key of a given size, might be measured in billions rather than trillions of years.

For reassurance about the safety of the crypto market and of internet commerce we go back to what Brian Armstrong said: There is a large incentive to find a killer shortcut, and evidently no one has found one. But there is no way to know that no vastly better tricks are about to be discovered.

Fermat, the French mathematician, conjectured a simple fact about exponents of numbers that looked true but couldnt be proved. For three centuries people labored to prove it and failed. And then one day not too long ago a proof was discovered. It relied, in part, on elliptic curves.

Quantum computers

Computers using quantum effects could, in theory, shrink the time for decoding an encrypted message from billions of years to hours. One such theory, for cracking RSA, dates to 1994.

In October Google sent a shiver through the cryptography world by announcing quantum supremacy. An experimental quantum device, the company said, did in 200 seconds what would have taken a conventional computer 10,000 years. Thats debatable; some researchers at IBM claimed that Google overstated the time difference by six orders of magnitude. Still, quantum computing is a threat.

Not an immediate one. The task in the Google experiment was designed specifically for the limited skills of quantum computing elements. These skills are a long way from those needed to crack codes. The 1994 algorithm is not in use because the hardware for it exists only on paper.

But ten years from now? We dont know where quantum computing will be.

Back door

For an encryption routine the anonymous creator(s) of bitcoin plucked an elliptic curve off the shelf. This curve was designed by the federal government. Were the parameters devilishly selected in a way to create mathematical vulnerabilities? Does the National Security Agency have a back door to your coins? Probably not. But you cannot be sure. Governments are not in sympathy with the anarchist philosophy underlying cryptocurrency.

Since cryptos creation, thousands of coins have been pilfered in hacks, scams and Ponzi schemes. These will continue. As for the big knockover, in which the whole system is taken down, we can say that the probability is low. But it is not zero.

Related story: Guide To Cryptocurrency Tax Rules

Corbellinis primer

Read the rest here:
Can All Of Bitcoin Be Hacked? - Forbes