{"id":27229,"date":"2014-11-07T03:46:54","date_gmt":"2014-11-07T08:46:54","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27229"},"modified":"2014-11-07T03:46:54","modified_gmt":"2014-11-07T08:46:54","slug":"spy-master-prays-for-the-return-of-alan-turing","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/spy-master-prays-for-the-return-of-alan-turing.php","title":{"rendered":"Spy master prays for the return of Alan Turing"},"content":{"rendered":"<p><p>    PUBLIC RELEASE DATE:  <\/p>\n<p>    5-Nov-2014  <\/p>\n<p>    Contact: Jason Lim, Asst Manager    <a href=\"mailto:cjlim@wspc.com.sg\">cjlim@wspc.com.sg<\/a>    646-65775 x247    World    Scientific    @worldscientific<\/p>\n<p>    It was almost unheard of to accuse US technology companies of    becoming \"the command and control networks of choice\" for    terrorists. Yet today, headlines announce that Robert Hannigan,    new director of GCHQ (Government Communications Headquarters,    UK), has been doing just that. The \"GCHQ chief accuses US tech    giants of becoming terrorists' 'networks of choice\" on his    first week of taking office -- almost 18 months on since Edward    Snowden blew the whistle on the National Security Agency (NSA)    on May 20, 2013; the U.S. intelligence agency responsible for    global monitoring, collection, decoding, translation and    analysis of information and data for foreign intelligence.  <\/p>\n<p>    According to the leaked documents unearthed by Snowden, the NSA    intercepts the communications of over a billion people    worldwide and tracks the movement of hundreds of millions of    people using location data emitted by cellphones and emails. It    has also created or maintained security vulnerabilities in most    software and encryptions, leaving the majority of the Internet    susceptible to cyber attacks from the NSA and other parties.    Domestically, it contributes to mass surveillance in the United    States by collecting and storing all phone records of all    American citizens. Internationally, in addition to the various    data sharing concerns that persist, research has pointed to the    NSA's ability to surveil the domestic internet traffic of    foreign countries through \"boomerang routing\".  <\/p>\n<p>    Internet service providers and telcos have since begun    deploying some cryptography techniques to stop spy agencies for    poking their nose into our business. These technologies are so    secure that even the boss of GCHQ is now praying for the return    of Alan Turing to assist in breaking their codes.  <\/p>\n<p>    Boris S Verkhovsky of New Jersey Institute of Technology, USA,    might just have Hannigan's answer.  <\/p>\n<p>    Prof. Verkhovsky looks into the subject of securing information    sent through Internet by examining  <\/p>\n<p>    In his book \"Integer Algorithms in Cryptology and Information    Assurance\", published recently by World Scientific. Verkhovsky    outlines various ways (algorithms and protocols) for secret and    reliable communication, presented the \"what\" and \"how\" behind    implementing the proposed cryptographic methodology    (algorithms).  <\/p>\n<p>    Prof. Boris Verkhovsky is a recipient of the USSR Ministry of    Radio-Electronics Award; the Academy of Sciences of the USSR    Award; the Alvin Johnson Award; and the Millennium Award and    the Medal of Excellence. In this book, Prof Verkhovsky,    addresses the issues of modern cryptography and cryptanalysis,    which have been graining in popularity from national,    industrial to personal security as more and more sensitive    information is transmitted over open channels.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.eurekalert.org\/pub_releases\/2014-11\/ws-smp110514.php\/RK=0\/RS=O6giXTlX6PW3fxe0_DZLzlzcxqQ-\" title=\"Spy master prays for the return of Alan Turing\">Spy master prays for the return of Alan Turing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> PUBLIC RELEASE DATE: 5-Nov-2014 Contact: Jason Lim, Asst Manager <a href=\"mailto:cjlim@wspc.com.sg\">cjlim@wspc.com.sg<\/a> 646-65775 x247 World Scientific @worldscientific It was almost unheard of to accuse US technology companies of becoming \"the command and control networks of choice\" for terrorists. Yet today, headlines announce that Robert Hannigan, new director of GCHQ (Government Communications Headquarters, UK), has been doing just that<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-27229","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27229"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27229"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27229\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}