New iOS app secures IM traffic with ‘post quantum’ encryption scheme

A new instant messaging application for the iPhone uses an advanced, "post quantum" encryption scheme to scramble one-on-one chats. It's intended as a bullet-proof secure alternative to WhatsApp's addictive message interface and to mobile carrier's primitive and (outside the U.S.) pricey SMS texting services.

The app's encryption randomizes the message output before transmission, so each message is unique without detectable patterns that an attacker could exploit. And PQChat keeps minimal personal information about the sender: it stores a one-way encrypted value of the user's phone number, an encrypted user-supplied nickname, and a pseudo ID image.

The free version of PQChat, from SDR Wireless Ltd., is aimed at consumers. The paid version is licensed to enterprises and offers additional features, such as QR code authentication, enterprise key management, a full audit trail of all messages, message backup and in the future secure voice and video calls.

PQChat is the first SDR product to make use of the vendor's Never-the-Same (NTS) encryption. NTS itself is based on the asymmetric encryption algorithm developed in 1978 by Robert McEliece. According to SDR, McEliece's encryption scheme has so far not been broken, even using the emerging techniques of quantum computing. As a result the McEliece algorithm is considered a "post quantum" (the "PQ" in PQChat) encryption scheme.

Without going into the mathematical depths of McEliece's work, he figured out a way to create a public/private encryption key system that is prohibitively costly - in computational time - to break. Despite that, its encryption and decryption are faster than that of algorithms such as RSA. But one major drawback is that McEliece's public and private keys are very large, so large that they've been rarely used commercially.

SRD Wireless has at least two patents for improving McEliece's system, including one that makes these keys smaller without compromising security.

PQChat uses the XMPP protocol, originally designed for desktop IM, transmitted via VoIP, to improve message reliability and handling, says Andersen Cheng, SRD's CEO. The McEliece-based NTS encryption scrambles the message contents on the device, using the recipient's public key, which is available from the PQChat server. But the server has no knowledge of what's being sent, and can't unscramble the contents. The message is deleted after delivery to the recipient, who is the only person who can decipher, using his private key.

PQChat uses unique form of authentication, which the vendor dubs "man-at-the-end" or MATE. MATE generates a unique cryptographic representation a number -- of a user's public key. Then a user records a video of himself, reciting that number. According to SRD, this approach does away with the need for a third-party Certificate Authority.

PQChat is available now via the Apple App Store, and will release an Android version shortly. More information is available at the PQChat website.

John Cox covers wireless networking and mobile computing for Network World.Twitter: http://twitter.com/johnwcoxnwwEmail: john_cox@nww.com

Link:
New iOS app secures IM traffic with 'post quantum' encryption scheme

Denis Zagumennov: "Cryptography: History of Information Security – Then and Now" – Video


Denis Zagumennov: "Cryptography: History of Information Security - Then and Now"
2014 - English Language Conference at the Faculty of Mathematics, Mechanics Computer Science (SFedU). Best presenters among 29 speakers at four sessions.

By: English classes that inspire

More:
Denis Zagumennov: "Cryptography: History of Information Security - Then and Now" - Video

Compact Network Storage System suits Big Data applications.

May 21, 2014 - Consisting of network file server inconduction-cooled ATR chassis, Model CNS4 is suited for SWaP-constrained military applications that require cryptography to ensure integrity of critical data-at-rest. System can support 4 FSM-C memory modules, each with 2 TB capacity, for total capacity of 8 TB. To support avionics and sensor management systems, CNS4 offers 1 GbE or 10 GbE Ethernet connectivity. Chassis also accommodates 3U VPX inline media encryptor certified for SABI in attended systems. Curtiss-Wright Corp. 1200 Wall St. W Lyndhurst, NJ, 07071 USA Press release date: May 13, 2014

New scalable Compact Network Storage (CNS4) system doubles storage capacity with four removable memory modules, supports variety of encryption levels, and provides flexible I/O front-end

AUVSI (Booth #653), ORLANDO, Fla. Curtiss-Wright Corporation (NYSE: CW) today announced that its Defense Solutions division has introduced the new rugged CNS4 Compact Network Storage subsystem, a conduction-cooled, high-performance network file server (NFS) with scalable storage, flexible IO, and encryption options. This rugged, high-capacity storage solution was designed for size, weight and power (SWaP) constrained military applications that require cryptography to ensure the integrity of critical data-at-rest in demanding military environments such as those endured by transports, helicopters, UAVs and mobile radar systems. The CNS4, with its high-density storage capacity, broad support for multiple network protocols and expansion, and flexible encryption capabilities, enables system designers to address all their data, audio and video storage requirements with a single solution, eliminating the need for multiple dedicated data recorders. Able to support up to 8TB of Type 1 encrypted storage, CNS4 provides Ethernet connectivity for maximum network-agility. It also supports a wide variety of industry standard protocols, including CIFS, NFS, HTTP, FTP, and PXE, making it ideal for sharing critical data in network centric architectures. The modular CNS4 supports a variety of encryption levels and can be configured with up to four (4) Curtiss-Wright Flash Storage Modules (FSM-C) in a fully rugged, conduction-cooled ATR chassis, doubling the storage capacity available with the original CNS. The CNS4 features 100,000 insertion cycle connectors which are critical for mobile applications such as Mission Recorders, Unmanned Vehicle Data Loader, Mobile ISR Systems and Ground Vehicles.

Curtiss-Wright is proud to support our warfighters by offering the industrys leading rugged storage solution for mobile applications that require NSA Type 1 encrypted data-at-rest, said Lynn Bamford, Senior Vice President & General Manager, Curtiss-Wright Defense Solutions division. Built to meet evolving storage, protocol and encryption requirements, this data recorder provides future-proofing to ensure that your data recorder keeps pace with your applications expanding needs.

Scalable Storage Up To 8TB The CNS4 can support 4 FSM-C memory modules, each with a current capacity of 2TB, for a total storage capacity of 8TB. With NAND Flash density doubling every 18 to 24 months, a 16TB capacity for the CNS4 is expected to be available in 2016. The FSM-C modules plug into the CNS4 backplane and are located behind an easy-to-open access door. They are easily removed from the CNS4 chassis with tool-less wedge-locks. With 100,000 insertion cycle connectors, FSM-C can be used in mobile applications for many years.

Flexible I/O To support modern avionics and sensor management systems, the CNS4 is designed with 1GbE or 10GbE Ethernet connectivity. In addition to its four (4) built-in 1GbE ports, CNS4 also provides a 3U VPX slot for additional I/O. For example, using a VPX carrier card, the CNS4 can host a 10GbE XMC I/O card to provide connection to any 10GbE network to support very high-speed file server applications.

The CNS4 also supports a Universal Capture Card that enables the system to record Serial FPDP data as well as act like a networked attached storage (NAS) device.

Data Protection with Type 1 Encryption In addition to its VPX I/O slot, the CNS4 chassis also accommodates a 3U VPX inline media encryptor (IME) certified for Secret and Below Information (SABI) in attended systems. A Crypto Ignition Key (CIK) is mounted on the CNS4 front panel when this IME is used. By the end of 2014, the IME is expected to support Pre-Placed Keys (PPK) and 4 SATA lanes. Via a DS101 key-fill port, the PPKs can be loaded so the IME can be left in place.

Additional Information Please contact the factory for additional information and availability. Click here for more information on the CNS4.

Sales inquiries: Please forward all Sales and reader service inquiries to Kavita Williams, Curtiss-Wright Defense Solutions, Tel: (661) 705-1142; Fax: (661) 705-1206; email: defensesales@curtisswright.com.

See original here:
Compact Network Storage System suits Big Data applications.

M.I.A. wants Julian Assange hologram

Outspoken rapper M.I.A. wants to include a hologram projection of controversial WikiLeaks founder Julian Assange in her upcoming live shows.

The music star previously teamed up with Assange by arranging for him to introduce her via video link at a concert in New York City late last year, and she also named a 2011 mixtape Vicki Leekx in reference to his whistle-blowing website.

She now has an idea to feature him in her planned shows for this summer.

When asked whether she would consider letting other musicians share the stage with her, the 'Paper Planes' hitmaker tells Britain's Time Out magazine she would prefer to feature Assange in hologram form.

She says, "I'm really boring like that. That's an American hip-hop thing (on-stage collaborations), and I want a whole bunch of other shit. It would be nice to have a hologram of Julian Assange."

Assange would be unable to appear in person as he remains in hiding at the Ecuadorian embassy in London, where he has been given political asylum. He has been there since summer 2012 and faces arrest and extradition to Sweden on rape and sexual assault charges if he leaves the building.

WENN.com

Read more:
M.I.A. wants Julian Assange hologram

Julian Assange to chat in SA internet conference

2014-05-21 08:30

Cape Town - The fact that Julian Assange will participate in an internet forum in South Africa has more to do with his view on the web landscape than an endorsement of his views, says the event organiser.

The Ramp Foundation is hosting a Net Prophet event in Cape Town that seeks to "inspire creativity and the flow of ideas among entrepreneurs and stakeholders who operate in the internet-tech space in Africa and South Africa".

Assange, publisher of the whistleblower website WikiLeaks, is wanted by the US FBI on charges related to the release of confidential documents on the war in Iraq.

"Julian Assange is obviously a notorious public figure and is either loved or hated depending on your perspective. The organisers, sponsors and audience appreciate that he has a valuable opinion to share without anyone needing to endorse his perspective in any way," Bella Strmhielm, Ramp Foundation Manager told News24.

The event will, among other things, highlight the role that a more efficient internet can play in SA and in developing countries in general.

Mobile data traffic

The government has proposed a roadmap that promises 100% broadband coverage by 2020, despite ongoing challenges of low penetration and high cost.

"The Net Prophet conference is about inspiring tech innovators and entrepreneurs to come up with solutions that solve local problems using the internet. The name 'Net Prophet' speaks to prophesying where the internet is going as well as a play on the word profit by highlighting areas where money can be made online," said Strmhielm.

Mobile data is set to explode as more people in developing countries come online. (Duncan Alfreds, News24)

See original here:
Julian Assange to chat in SA internet conference

M.i.a. Wants Julian Assange Hologram For Live Shows

Outspoken rapper M.I.A. wants to include a hologram projection of controversial WikiLeaks founder Julian Assange in her upcoming live shows.

The music star previously teamed up with Assange by arranging for him to introduce her via video link at a concert in New York City late last year (13), and she also named a 2011 mixtape Vicki Leekx in reference to his whistle-blowing website.

She now has an idea to feature him in her planned shows for this summer (14).

When asked whether she would consider letting other musicians share the stage with her, the Paper Planes hitmaker tells Britain's Time Out magazine she would prefer to feature Assange in hologram form.

She says, "I'm really boring like that. That's an American hip-hop thing (on-stage collaborations), and I want a whole bunch of other s**t. It would be nice to have a hologram of Julian Assange."

Assange would be unable to appear in person as he remains in hiding at the Ecuadorian embassy in London, where he has been given political asylum. He has been there since summer 2012 and faces arrest and extradition to Sweden on rape and sexual assault charges if he leaves the building.

See the original post:
M.i.a. Wants Julian Assange Hologram For Live Shows

Power corrupts, warns Julian Assange

2014-05-21 14:23

Cape Town - The centralisation of power represents a major threat to democratic institutions, says Julian Assange, the publisher of whistleblower website WikiLeaks.

"We can see on the one hand a tendency toward totalising and centralisation that is represented by what is happening at the National Security Agency and by organisations - whether they like it or not, and sometimes it appears they do - that have to feed in to the National Security Agency such as Google," said Assange from the Ecuadorian embassy in London.

He was speaking at the Net Prophet event in Cape Town that seeks to "inspire creativity and the flow of ideas among entrepreneurs and stakeholders who operate in the internet-tech space in Africa and South Africa".

As the publisher of WikiLeaks, he is wanted by the US FBI on charges related to the release of confidential documents on the war in Iraq.

"That centralisation of information and centralisation of power is a pretty concerning thing," said Assange.

Sensitive communications

He compared the flow of information on the internet to roads in ancient times.

"We look back to historical analogues such as the Roman roads. When you connect together different parts of the world and different parts of the economy, what happens? Well, it means that power can flow across the connections.

"We can become sucked up into whatever the dominant power centre is," Assange added.

Go here to see the original:
Power corrupts, warns Julian Assange