Bitcoin Climbs as Much as 40% Over The Weekend – ETF Trends

Bitcoin kicked off the weekend with a bang for the bulls, rising as much as 40% within a 24-hour period. The leading cryptocurrency hit a low of $7,300 prior to the weekend before surging just over $10,000, which signaled its largest price move since April.

Bitcoin got a boost from China President Xi Jinping saying that the country should seize the opportunity of cryptocurrencys blockchain technology. Since the trade war with the U.S., China has been making moves to bolster its technology sector and blockchain could be one of the key areas where it has a competitive advantage over the U.S.

We must take the blockchain as an important breakthrough for independent innovation of core technologies, Xi said at the 18th collective study of the Political Bureau of the Central Committee in Beijing.

We must clarify the main direction, increase investment, focus on a number of key core technologies, and accelerate the development of blockchain technology and industrial innovation, Xi said.

The second largest economy is already taking the first steps to ease restrictions on cryptocurrencies and blockchainits underlying technology. Per a MarketWatch report, The Standing Committee of the 13th National Peoples Congress in China has passed a new law regulating cryptography on Oct. 26 that will take effect on Jan. 1, 2020, Chinas CCTV reported.

The new regulatory framework aims to set standards for the application of cryptography and the management of passwords and establishes the role of a central cryptographic agency meant to lead public cryptographic work, creating guidelines and policies for the industry, the report noted.

Chinas moves to further blockchain technology could open up pathways for other countries to follow suit. Cryptocurrencies like Bitcoin has been associated with fraud and money laundering schemes, which has prevented nations from embracing the technology wholeheartedly.

Its bullish for the entire crypto industry, in general, when you have the leader of one of the worlds largest economies coming to embrace blockchain technology like this, eToro senior market analyst Mati Greenspan said.

While the Securities and Exchange Commission (SEC) is still keeping a cryptocurrency-based exchange-traded fund (ETF) from debuting on a major U.S. exchange, China is looking to launch its own global cryptocurrency. The news comes amid social media giant Facebook facing numerous obstacles trying to launch its own cryptocurrency project, dubbed Lira, in the U.S.

According to a CNBC report earlier this month, the second largest economy announced earlier this year that it was working on a digital currency backed by the yuan, reportedlyinspiredby Facebooks announcement. Analysts and crypto industry leaders are highlighting geopolitical implications of China launching a digital currency first especially if libra hits a brick wall with U.S. regulators.

For more market trends, visit ETF Trends.

See original here:
Bitcoin Climbs as Much as 40% Over The Weekend - ETF Trends

Chinas Xi Jinping App Reportedly Recommends Course on Blockchain, Bitcoin, Ethereum and Crypto – The Daily Hodl

Chinas most popular app, Xuexi Qiangguo, is promoting a course on blockchain technology that contains lessons on Bitcoin, Ethereum and cryptocurrency, reports crypto news source cnLedger.

The app has already spawned a number of monikers since its release on January 1, 2019 by Chinas tech giant Alibaba.

Billed as a fun educational tool, the app is also called Study Xi, Strong Nation, Study the Powerful Nation and the Xi Ping Thought app for espousing the views of President Xi Ping and Chinas Communist Party.

President Xi recently announced his support for the developmentof blockchain technology, which underpins popular cryptocurrencies such as Bitcoin.

China has also passed a cryptography law aimed at facilitating the development of the cryptography business and ensuring the security of cyberspace and information. It will take effect on January 1, 2020.

2/ Chinas most popular app, Xuexi Qiangguo (study for becoming powerful nation) now has a recommended course focusing entirely on blockchain, which contains Bitcoin & Ethereum lessons. The app released by CPC to help ppl learn about its political doctrines like Xi's thoughts. pic.twitter.com/nRdCntNRAA

cnLedger (@cnLedger) October 28, 2019

According to a report by the US governments Open Technology Fund, the app will also start administering a test for journalists to prove their comprehension of Xi Pinjing Thought as well as their loyalty to the Communist Party. In order to renew their credentials, theyll have to pass.

Open Technology Fund also detected a backdoor in the apps code, allowing the collection of detailed daily log reports containing user data and app activity.

The researchers report,

The packages that contain the backdoor code are all in the package namespace containing the values aliyun and alibaba, suggesting that these packages were created and are maintained by Alibaba or Alibaba Cloud.

In addition to supporting blockchain technology and using the new app to push the party doctrine, President Xi has also issued a ban on any anti-blockchain sentiment as the government gears up to launch its own state-backed digital currency. Any online content that calls out blockchain technology as a scam is being systematically scrubbed.

Since launch date, Xuexi Qiangguo has reportedly amassed more than 100 million active users, making it the most downloaded item on Apples App Store in China, outperforming social media apps on popular platforms WeChat and TikTok.

More:
Chinas Xi Jinping App Reportedly Recommends Course on Blockchain, Bitcoin, Ethereum and Crypto - The Daily Hodl

Welcome to the age of quantum computing – TechCentral

Has the era of quantum computing finally dawned? In a field long plagued by hype and hubris, theres reason for some cautious optimism.

A team of scientists at Googles research lab announced last week in the journal Nature that they had built a quantum computer that could perform calculations in about 200 seconds that would take a classical supercomputer some 10000 years to do. An age of quantum supremacy was duly declared.

Rather uncharitably, IBM researchers were quick to point out that the feat was less than advertised. They estimated that by using all of the hard disk space at the worlds most powerful classical computer, the Summit OLCF-4 at Oak Ridge National Laboratory, they could do the same calculation in 2.5 days, not 10000 years. Googles claim to have achieved quantum supremacy that is, to have accomplished a task that traditional computers cant was premature.

This was to miss the bigger picture.

A rudimentary quantum machine has improved on the fastest supercomputer ever built by a factor of 1080 an immense achievement by any measure. Although the specific problem that Googles computer solved wont have much practical significance, simply getting the technology to work was a triumph; comparisons to the Wright brothers early flights arent far off the mark.

So, is the world prepared for what comes next?

Quantum computers, to put it mildly, defy human intuition. They take advantage of the strange ways that matter behaves at the subatomic level to make calculations at extraordinary speed. In theory, they could one day lead to substantial advances in materials science, artificial intelligence, medicine, finance, communications, logistics and more. In all likelihood, no one has thought up the best uses for them yet.

They also pose some risks worth paying attention to. One is that the global race to master quantum computing is heating up, with unpredictable consequences. Last year, US President Donald Trumps administration signed a US$1.1-billion bill to prioritise the technology, which is a decent start. But the US will need to do more to retain its global leadership. Congress should fund basic research at labs and universities, ensure the US welcomes immigrants with relevant skills, invest in cutting-edge infrastructure and use the governments vast leverage as a consumer to support promising quantum technologies.

A more distant worry is that advanced quantum computers could one day threaten the public-key cryptography that protects information across the digital world. Those systems are based on hard maths problems that quantum computers might theoretically be able to crack with ease. Security researchers are well aware of the problem, and at work on creating post-quantum systems and standards. But vigilance and serious investment is nonetheless called for.

No doubt, the quantum-computing era will have its share of false starts, dashed hopes and fiendishly difficult problems to overcome. As Google is showing, though, thats how technology advances: bit by bit, into a very strange future. (c) 2019 Bloomberg LP

The rest is here:
Welcome to the age of quantum computing - TechCentral

The top FBI lawyer who tried to force Apple to backdoor its crypto now says working crypto is essential to public safety and national security – Boing…

Jim Baker served as the FBI's general counsel from 2014 until 2017, and he presided over the the FBI's attempt to force Apple to undermine its cryptography under the rubric of investigating the San Bernadino shooters; he has long been a prominent advocate for mass surveillance, but he has had a change of heart: in a long, detailed essay on Lawfare, Baker explains why he believes that governments should not seek to introduce defects into cryptographic systems.

Baker's argument is primarily instrumental: he rejects the idea that you can create cryptography that works perfectly when it's being used to protect good guys, but fails completely when bad guys try to use it. He acknowledges that any effort to ban working cryptography would simply send American criminals to offshore software repositories to get access to working crypto, and that in so doing, it would be much harder for American law enforcement to spy on its adversaries, because the metadata from their encrypted communications would be out of US law enforcement's reach.

Baker is primarily responding to Attorney General William Barr's idiotic call to ban working crypto as a matter of public safety, and he builds on the usual instrumental arguments about the limited utility of crypto bans for law enforcement with a less-often-heard argument about national security and public safety.

Baker discusses how Huawei (and other companies with deep ties to nations that the US considers to be its rivals) will inevitably have some of its gear within the US's communications infrastructure. Baker describes US communications networks becoming "zero trust networks," that can't be trusted to protect their users' privacy -- and he suggests that well-designed cryptographic tools are America's best defense in this zero-trust environment. If you can't stop Huawei from sending your data to the People's Liberation Army, at least you can encrypt that data so the PLA can't make sense of it.

He also discusses the national security interest in having well-secured information systems with up-to-date patches, and criticizes efforts (like the one the FBI made with Apple) to suborn companies to ship out poisoned software updates in order to introduce defects into their software so governments can spy on them. This will poison the well, making American individuals and companies reluctant to apply updates when they arrive, thus preserving security defects that America's nation-state rivals (as well as criminals, terrorists, etc) can exploit.

I've made similar instrumental arguments about the foolishness of attempting to ban working cryptography, but I think it's important to note that there's a much more important equity in the crypto wars: the right to privacy.

As Baker himself notes, cryptography does not create a "law-free zone" where cops can't execute lawful orders. No US law allows government officials to "force manufacturers and service providers to unlock devices and decrypt communicationsthat is, to rewrite software."

This is not an oversight.

The framers of the US Constitution explicitly rejected the idea that people should be forced to arrange their affairs to make life easy for law enforcement.

The existence of conversations that law enforcement can't access after the fact is not a new development: we never passed a law requiring letter-writers to use indelible ink and fireproof paper so that cops could read them later if they needed to. We never passed a law requiring every restaurant to put a hidden mic in every salt cellar so that potential lunchtime plotters could have their whispers played back after a robbery took place. You are allowed to have a murmured conversation with your spouse in bed: no law requires you to shout your communications over a megaphone so that any cops listening by the windows can hear what you're saying.

Yes, it's impossible to keep people safe while taking away their working cryptography.

But even if it wasn't impossible, it would still be wrong. Countries like Russia, China, Iran, Australia and the UK have adopted laws banning working crypto -- these are countries with very different constitutional values, ones that make allowances for forcing people to arrange their affairs to make life easier for their cops.

But both William Barr and Jim Baker are oath-bound to uphold the US Constitution and its values. The relationship of those values to the right to live your life in ways that may inconvenience law enforcement is indisputable.

Baker's willingness to admit the technical incoherence of crypto bans is great, a massive step forward, but American legal officials shouldn't even be debating whether or not it's possible to ban crypto. If Barr managed to produce a working "solution" to the problems that Baker raises, we still shouldn't use it, because Americans have the right to make choices that enhance their own security, privacy and integrity, even if that makes cops work harder.

In other words, even though Snowden opposes crypto bans and Baker opposes crypto bans, they are not talking about the same thing. Snowden is talking about upholding the Constitution; Baker is talking about the regrettable impossibility of having his security cake and eating it too.

The Defense Innovation Board discussed the fact that even if the United States and its allies keep Huawei equipment out of their domestic networks for a sustained period of timewhich increasingly will be difficult to dothey will eventually encounter it somewhere in the world. Therefore, they will need to figure out how to operate in a zero-trust interconnected world, especially after the widespread deployment of 5G networks globally, much of which (at least abroad) will include Huawei equipment. They need to think about the reality of operating in a degraded communications security environment and never trust the internet, applying the zero-trust network concept on a global scale.

This strikes me as eminently sensible. The widespread deployment of Huawei and other Chinese equipment in the backbone of the internet increasingly provides China with the technical capability (whether utilized or not) to copy, corrupt or disrupt substantial portions of data traffic transmitted on Huawei equipment. In a crisis, China could direct Huawei and other companies to degrade key network elements of its adversaries and/or render them inoperable. Huawei denies that it would cooperate with the Chinese government in such activities, and some observers question the logic of Huawei ever doing so. But from a national security perspective it is prudent to focus on the capabilities of an adversary, not just stated intent. Living in a Huawei world means there are substantial risks to the confidentiality, integrity and availability of data that is essential to our effective functioning as a society.

As mentioned above, China is not the only cyber threat actor. But China and Huawei exemplify the nature and scope of the pervasive cybersecurity risks that the United States and its allies face from many adversaries.

Rethinking Encryption [Jim Baker/Lawfare]

(via Schneier)

(Image: U.S. Air Force photo by J.M. Eddins Jr)

The EFFs Panopticlick tool (previously) is now a general purpose testing suite for browser privacy, checking Do Not Track, the effectiveness of ad- and tracker-blocking, and providing details on your browsers fingerprint. [via Hacker News]

Japan's Henn na Hotel chain, owned by the HIS Group, uses "bed-facing Tapia robots" in its rooms; these robots turn out to be incredibly insecure: you can update them by pairing with them using a NFC sensor at the backs of their heads. The robots do not check the new code for cryptographic signatures, meaning []

In the wake of Berkeley joining the growing list of cities that ban the use of facial recognition by governments, RIT philosophy prof Evan Selinger and Northeastern law/comp sci prof Woodrow Hartzog make the case in the New York Times for a nationwide ban on facial recognition technology.

Want an online presence that matters? As the graveyard of fallen start-ups can attest to, having a fancy website and a sleek logo isnt worth much unless people actually start engaging with them. Even on the fast changing web, there are ironclad strategies for marketing that can adapt to any platform. The best way to []

Big things are happening in tech with AI and deep learning. Thats not exactly a news flash when you look at how often companies use algorithms to manage everything from online advertising to the songs, videos, posts, and other digital content platforms recommend for their users. Getting into the field requires a pretty broad range []

In the early days of the web, everyone wanted a .com domain for their site. As a results, all the good ones got snapped up. But .com no longer has the cachet it once did. In fact, many new business and individuals are opting for other top-level domain extensions. One of the most memorable is []

Read the original:
The top FBI lawyer who tried to force Apple to backdoor its crypto now says working crypto is essential to public safety and national security - Boing...

Primitive Ventures Dovey Wan on Significance of Chinas New Cryptography Law – Ethereum World News

On October 26, the Standing Committee of the 13th National Peoples Congress in China revealed that a new cryptography law will go into effect January 1, 2020, according to local news outlet Xinhuanet.

The announcement comes only a day after Chinese president Xi Jinping called on the citizens of the $12 trillion economy, the second-largest in the world behind only the US, to seize strategic opportunities in blockchain technology.

China is still maintaining its ban on crypto asset trading, even though Bitcoin (BTC) ownership is recognized as personal property thats entitled to protection under the nations laws. The country, which is home to nearly 1.5 billion people, is also developing a sovereign digital currency.

Cryptography, as a key underpinning of distributed ledger technology (DLT), might play a vital role in the nations push to become more competitive in the rapidly evolving, global blockchain industry.

Chinas new cryptography law has been designed to address new regulatory and legal requirements in commercial cryptography use-cases, as theyre playing an important role in supporting and improving Chinas diversified economy, according to the laws recent draft proposal.

The proposal states:

Clear guidelines and regulations are needed to evaluate commercial cryptography technologies used in the major fields related to the national interest as the current loose system is not suitable for the industry anymore.

Chinas national congress said the new law will support research and development (R&D) efforts on commercial cryptography technologies, while creating a comprehensive, standardized regulatory framework for the emerging market.

The Chinese congress prepared a draft proposal for the new law in July 2019, requesting feedback from the general public.

The proposal addresses various issues including how compatible the current industry standards should be with other similar cryptography systems throughout the world, to whether organizations should voluntarily verify commercial crypto-related use-cases with regulators.

Chinas congress says the new law may promote or help the nations educational projects, which include public exhibitions, to spread awareness about cryptography among government agencies, local firms and social groups.

Founding partner at Primitive Ventures Dovey Wan took to Twitter to explain the relevance of Chinas new cryptography law.

Wan noted that the new law is aimed at standardizing the cryptographic application and management of passwords, among other requirements.

After reviewing the draft version, which has been released before the formal version, Wan learned that Chinas central cryptographic agency (CCP) will have unified leadership over the national cryptography work, [which] formulates key guidelines and policies for national cryptography, and coordinates major [activities involving] national security.

She added that Chinas state department encourages and supports the research cryptography, protects the intellectual property rights of related technology according to law, and promotes the progress and innovation of cryptography and public/private key technology.

Furthermore, no organization or individual may steal other peoples encrypted information, illegally invade other peoples password protection system, or engage in activities that endanger national security, social public interests.

According to Wan,

The key takeaway is: the development of new cryptography, hashing algorithms, [and] even the usage of the tech, will be in the official legal realm. This means you need to follow the CCP standard for all encrypted behaviors, which can be VERY broad, from mining to block propagation.

Read the original post:
Primitive Ventures Dovey Wan on Significance of Chinas New Cryptography Law - Ethereum World News

China has Passed Cryptography Law That will take Effect on Jan… – TokenHell

A local news outlet CCT reports that the National People Congress of China has passed a crypto Law.

The cryptography law is passed on 26th Oct during the 14th meeting of the Standing Committee by the Chinese National Peoples Congress. According to the report, the crypto law will be in effect on Jan 2020.

According to the report of the local news outlet, this new Chinese crypto law will aim at standardizing the application of cryptography and management of passwords.

Apart from this, it will also help to promote the development of the password industry. The cryptography law will improve and boost the different levels of password management such as scientific, standardized, and legalized level.

This news was also shared on twitter by Dovey Wan who is the founding partner of Primitive Crypto.

Dovey Wan says that this is the initial step by the Chinese government towards its national Central Bank Digital Currency (CBDC).

She then explained that the main focus of the crypto law is on the development of cryptography. While commenting on the crypto law, she further stated:

The key take away is the developing of new cryptography, hashing algo, even the usage of the tech, will be in the official legal realm. This means you need to follow the CCP standard for all encrypted behaviors, which can be VERY broad, from mining to block propagation.

The president of China Xi Jinping has recently made an announcement in which he says that the main focus of China is on becoming the global leader in the field of Blockchain technology. President Xi says that we aim to accelerate the blockchain technology in our country.

In the announcement he says:

We must take the blockchain as an important breakthrough for independent innovation of core technologies. [We must] clarify the main direction, increase investment, focus on a number of key core technologies, and accelerate the development of blockchain technology and industrial innovation.

China is rapidly adopting the blockchain technology and is developing day by day in this field. The Chinese government aims to leave the United States behind in the field of blockchain technology.

See the rest here:
China has Passed Cryptography Law That will take Effect on Jan... - TokenHell

Quantum Computing Inc plans to introduce dynamism of Quantum computing to the masses – Proactive Investors UK

() is placing a gargantuan bet on the power of quantum computers to solve the most difficult and intractable problems in the fields of portfolio management, big data and artificial intelligence.

Staffed by experts in mathematics, quantum physics, supercomputing, financing and cryptography, the Leesburg, Virginia-based company is developing an array of applications to allow companies to exploit the power of quantum computing to their advantage.

Quantum computing holds the promise of performing complex calculations in seconds that would take the most advanced computers years to complete.

While the abilities of classical computers have made considerable progress, quantum computers are necessary to address the largest and most complex computational problems.

Were at the same stage in quantum computing today, says CEO Robert Liscouski. People generally understand what quantum computing can do, but they dont understand what its really going to do.

In market terms, an investment in quantum computing today is analogous to a sage and prescient bet on Microsoft or Amazon.com 20 years ago.

This new breed of supercomputer promises to dramatically improve computing power by storing information not in bits but in subatomic particles called quantum bits or qubits which have mighty capabilities.

Using qubits in so-called superpositions, a quantum computer can find answers to computational challenges in far fewer steps than a traditional computer would require.

Set up at the beginning of 2018, Quantum bills itself as the first publicly-traded pure-play quantum computing company.

Its team of computer scientists is designing the next wave of algorithms used by high-frequency traders at hedge funds to scour the market for arbitrage opportunities and competitive investment strategies. This area represents a $1 billion market opportunity by the companys estimates. In the works, for example, is an asset allocation system with algorithms that will run on quantum and digital annealers.

As well as the algorithms for Wall Street trading programs under development, Quantums programs are also set to be used for genetic research, and by pharmaceutical companies and governments.

The potential worldwide market for quantum computing is projected to be in excess of $10 billion by 2024, according to research.

Quantum Computing CEO Robert Liscouski expects the pre-profit company, which has a market cap of $15.4 million and a share price hovering at a little over $3, to be generating revenue by the end of 2020.

At the start of this year, Liscouski estimated that Quantum is about a third of the way towards raising its target of $15 million for the runway costs to fund its business.

In its most recent reported quarter ended in June, Quantums net loss deepened to $2 million due to an increase in stock-based compensation expenses, compared to a loss of $875,209 in the year-ago quarter.

But its management team said it is confident its financial position will improve.

Also on the agenda are partnerships with hedge funds and financial institutions as well as the licensing and commercial launch of finance and cryptography applications

Clearly, were in a position that as we demonstrate promise, we would be attractive to 'a Google,' Quantum Computing CEO Robert Liscouski has said. Im not suggesting thats our goal, but thats clearly how that works.

See more here:
Quantum Computing Inc plans to introduce dynamism of Quantum computing to the masses - Proactive Investors UK

How to Become a Cryptographer | Requirements for …

What Does a Cryptographer/Cryptanalyst Do? What is a Cryptographer/Cryptanalyst?

A Cryptographer develops algorithms, ciphers and security systems to encrypt sensitive information. A Cryptanalyst analyzes and decrypts any type of hidden information (e.g. encrypted data, cipher texts, telecommunications protocols, etc.) in cryptographic security systems. They are code makers and code breakers, professionals who ensure that private data regarding finance, national security and other important spheres are hidden from marauding cyber-terrorists.

Its a job that blends computer science, engineering and applied mathematics. As such, cryptographers and cryptanalysts often have a wide range of responsibilities, including designing codes & systems, testing & probing for vulnerabilities, and coming up with out of the box solutions. Hard skills and relevant work experience will help prepare you for many positions. But once youre there, expect the unexpected!

As the white knight of data, you may be required to:

Keep in mind that responsibilities will vary according to the job. Work for the NSA or the FBI could differ wildly from work for an insurance company. Cryptographers and cryptanalysts build successful careers throughout the public and private sectors.

Cryptographers and cryptanalysts come from all walks of life. You will often be able to begin your career straight out of university. Once you have amassed enough experience (and possibly a doctoral degree), you have the option to become a:

A Cryptographer/Cryptanalyst can also be known as a:

Since Cryptographers and Cryptanalysts are lumped with Mathematicians in the Bureau of Labor Statistics, salary numbers can be tricky to pinpoint. Here are some ballpark numbers:

Job descriptions for Cryptographers and Cryptanalysts share some common traits, especially when it comes to degrees and hard skills. A bachelors degree in a relevant field is good (e.g. math or comp sci), but an MS or PhD may be even better. For intermediate-level positions, training credentials and work experience are highly valued. But some junior-level positions may be open to new graduates. Its worth doing a little bit of career research.

You can start by talking to qualified professors and adjuncts who are involved in real-world projects. Computer science and math departments often include bios ofand contact info fortheir resident cryptography & cryptanalysis experts. These folks will often be able to point you in the right direction (e.g. how to find work in the private sector). You may also want to look into bootcamps, MOOCs, and other non-academic programs to hone your skills. In this section, weve highlighted a couple of training options where you can get your feet wet.

Employers will be looking for a bachelors degree in Mathematics, Computer Science, Computer Engineering or a related discipline. If you dont have a technical degree, you may be able to get away with extensive training and work experience. The NSA is willing to consider candidates with majors in both technical and non-technical degrees.

An MS is strongly suggested unless your bachelors degree is a double major in Mathematics and Computer Science. To expand your job opportunities, you could also consider a doctorate in Mathematics or Computer Science with a focus on cryptography.

This is a tough one to call. A job description for a Cryptographer at MIT might ask for a technical PhD or an MS with 5+ years of experience. Other employers may be satisfied with 3+ years of experience in security engineering/administration. Junior Cryptanalysts may be able to go straight into employment with no prior work experience. It will depend on the position.

Cryptography and cryptanalysis are built on the three pillars of computer science, engineering and applied mathematics. As you start your career, look at acquiring technical skills in:

Cryptographers and Cryptanalysts are intelligent, analytical and outstandingly creative. Like any great code breaker, they are willing to take on the most complex mathematical challenges. They have a strong ethical core and a passion for solving puzzles.

Above all, they are trustworthy enough to handle incredibly sensitive data. Because you will often be working with classified information, employers will also want to see evidence of your honesty and good judgment.

Unlike more established fields, cryptography and cryptanalysis are relative newcomers to the world of security accreditation. EC-Council has developed one certification that specifically deals with encryption: CES: Certified Encryption Specialist.

Link:
How to Become a Cryptographer | Requirements for ...

Cryptography | MIT News

MIT team successfully tests a new method for verification of weapons reduction.

From digital circuits to ingestible robots, the Institute has helped spearhead key innovations in the technology revolution.

Neural network that securely finds potential drugs could encourage large-scale pooling of sensitive data.

Legatum Centers award for innovation in financial inclusion plays a key role in MITs push to expand African engagement.

CSAIL system encourages government transparency using cryptography on a public log of wiretap requests.

Cryptographic system could enable crowdsourced genomics, with volunteers contributing information to privacy-protected databases.

New isotope-detection method could prove compliance but avoid divulging secrets.

A tool that would provide a secure foundation for any cryptographic system may be close at hand.

Calculating encryption schemes theoretical security guarantees eases comparison, improvement.

MIT hosts the first of three conferences on privacy policy

For 65 years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong.

A new algorithm solves a major problem with homomorphic encryption, which would let Web servers process data without decrypting it.

MIT researchers show how to secure widely used encryption schemes against attackers who have intercepted examples of successful decryption.

Interactive proofs mathematical games that underlie much modern cryptography work even if players try to use quantum information to cheat.

Awards recognize a diverse range of technologies

Savvy hackers can steal a computers secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.

A new twist on pioneering work done by MIT cryptographers almost 30 years ago could lead to better ways of structuring contracts.

A switch that lets one photon alter the quantum state of another could point the way to both practical quantum computers and a quantum Internet.

Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found.

A new system for ensuring accurate election tallies, which MIT researchers helped to develop, passed its first real-world test last Tuesday.

The rest is here:
Cryptography | MIT News

Cryptographer: Job Description, Duties and Salary Information

Cryptography requires significant formal education. Learn about the training, job duties and salary requirements to see if this is the right career for you.

Cryptographers help protect confidential information and may work to protect military, financial or political data. They may be involved in encrypting information or decrypting information. Cryptographers are required to pass a background check and possess at least a bachelor's degree in computer science, mathematics, or a related field.

Cryptographers analyze and decipher encrypted data to assist law enforcement or government agencies in solving crime, threats or security concerns. They also develop computational models that help solve problems in business, engineering, science, or other industries. A minimum of a bachelor's degree and experience in information technology is required for many jobs in cyber analysis that use cryptography. Government jobs in this field typically require a background check and security clearance.

Since much of their work is mathematics-based, cryptographers are often grouped with mathematicians for statistical purposes. According to U.S. Bureau of Labor Statistics (BLS) data, the field of mathematicians should see favorable growth rates over the next few years, but because the field is small, that won't translate into many jobs.

Source: *U.S. Bureau of Labor Statistics

In the past, cryptography was primarily used to protect military, political, financial, law-enforcement, and other confidential data through the use of a key needed unlock encrypted information. Today, digital information is also encrypted. Cryptographers write algorithms designed to mask information such as account and credit card numbers and wireless networks. Corporations, military organizations, and government agencies also use encryption to protect computers and networks from hackers and cyber-terrorists.

According to O*Net Online, cryptographers apply mathematical theories to solve problems in various industries, including engineering, business, and science. Cryptographers may analyze and decipher encryption systems as well as develop new encryption algorithms. They may develop statistical or mathematical models to analyze data and come up with methods to correct problems. They also test these models for accuracy and reliability.

Some cryptographers are specialists in cyber security. According to job postings found at CareerBuilder.com in August 2013, cyber-analysts may identify issues that make software vulnerable to hacking and help design solutions, including encryption, to prevent it. They may also test software to discover ways to penetrate and access the data. Cyber analysts may work with online services, application servers, and databases.

The BLS cited the average annual salary for mathematicians, including cryptanalysts, was $104,870 in May 2018. Those that worked in the federal executive branch had an average of $112,600. The BLS also reported that the highest-paying jobs for mathematicians were found in District of Columbia, Washington and Colorado.

Cryptographers must have a high level of analytical skill and understanding of mathematical theories in order to break encryptions to decipher coded data, or to create an encryption system to protect data. They may work with law enforcement professionals to access data relevant to crimes or with the military to protect data from being accessed by those without authorization. Job prospects are expected to be strong for cryptographers from 2018 to 2028, with a job growth rate that's much faster than average when compared to all occupations.

Read more:
Cryptographer: Job Description, Duties and Salary Information