{"id":31357,"date":"2017-02-15T05:48:31","date_gmt":"2017-02-15T10:48:31","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/rsa-panel-covers-cryptography-trends-elections-and-more-techtarget.php"},"modified":"2017-02-15T05:48:31","modified_gmt":"2017-02-15T10:48:31","slug":"rsa-panel-covers-cryptography-trends-elections-and-more-techtarget","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/rsa-panel-covers-cryptography-trends-elections-and-more-techtarget.php","title":{"rendered":"RSA panel covers cryptography trends, elections and more &#8211; TechTarget"},"content":{"rendered":"<p><p>    SAN FRANCISCO -- Each year at RSA Conference, the world's top    cryptographers gather on stage after the show's opening    keynotes to share their views and opinions on cryptography    trends.  <\/p>\n<p>    This year, the panel was moderated for the fourth consecutive    time by     Paul Kocher, president in the cryptography research    division of Rambus. Kocher opened the session by pointing out    that with exponential growth experienced in recent years with    the internet, the internet of things and related technologies,    each doubling of growth brings about more change than in all    prior doublings -- combined.  <\/p>\n<p>    Kocher said one bright spot this year is that cryptography is    one of the few technologies that has been able to withstand    \"decades of scaling\" and exponential growth.  <\/p>\n<p>    Before diving into the latest cryptography trends, Kocher began    the session by congratulating Adi Shamir on winning the    Japan    Prize, \"a prestigious international award presented to    individuals whose original and outstanding achievements are not    only scientifically impressive, but have also served to promote    peace and prosperity for all mankind.\"  <\/p>\n<p>    Shamir, Borman Professor of Computer Science at the Weizmann    Institute in Israel, said the honor was \"much more than a    personal prize,\" because the award is granted for all areas of    science and technology, and the fact that they chose to honor    achievement in cryptography was a sign of the importance of the    field.     Last year, two panel participants -- Whitfield Diffie and    Martin E. Hellman, professor emeritus of electrical engineering    at Stanford University, received the A.M. Turing Award for    their     foundational work in developing the fundamental basis of        public-key cryptography.  <\/p>\n<p>    Kocher's first question to the panel was how artificial    intelligence would affect computer security. Ronald Rivest, a    professor in the MIT Department of Electrical Engineering and    Computer Science, opined that based on what was seen during    last year's presidential election, chatbots might dominate in    10 to 15 years.  <\/p>\n<p>    Shamir was more forceful, noting that when computers become    super-intelligent they will be likely to say, \"in order to save    the internet I have to kill it. The internet as we know it    today is beyond salvaging,\" when asked how to solve internet    security problems. He added that \"AI can be very helpful on the    defensive side,\" but he doubted it would be very helpful in    finding new     zero-days because of the need for human originality.    However, AI will be useful for finding deviations from normal    behavior that will help compare \"strange behaviors\" to identify    threats.  <\/p>\n<p>    In response to a question about whether and how long it will    take for     quantum computers to be available to threaten traditional    cryptosystems, Whitfield Diffie, cryptographer and security    expert at Cryptomathic, suggested it would not be worth    worrying about as \"we'll be dead by then.\"  <\/p>\n<p>    There's a \"higher chance\" that RSA will be broken by classical    attempts, Shamir said, though he admitted it \"could turn out    quantum computers will be able to break all the quantum proof    schemes we're working on now.\"  <\/p>\n<p>    \"We've tried to factor quickly for about two thousand years,\"    said Susan Landau, Professor of Cybersecurity Policy and    Professor of Computer Science at Worcester Polytechnic    Institute, but she's \"not seeing same level of math research    behind proposed quantum algorithms,\" which she called    \"worrying.\" Many modern     cryptosystems rely on the difficulty of factoring products    of large primes to protect encrypted data.  <\/p>\n<p>    In response to a question about controversy swirling around the    2016 election, Rivest pointed out that while allegations of    rigging are not new, \"trying to convince the winner\" that he    won is unusual. \"We should have done post-election audits    everywhere to see if there were problems.\"  <\/p>\n<p>    The Russians, Landau said, see this as \"war by other means\" and    are attacking the west this way. The techniques they use for    hacking are \"old-fashioned,\" but they are using the information    in a new way. \"We've known for 20 years that we need to protect    government data,\" Landau said, but now that smaller civic    organizations with fewer resources are being targeted, \"that's    a much broader swath of society we have to protect.\"  <\/p>\n<p>    \"The U.S. [has] done its share of similar dirty ops to    influence other country's elections,\" Shamir added. \"Using    stolen documents that are compromising is not a new invention.\"  <\/p>\n<p>    \"I'm shocked -- shocked! -- by what the Russians have been    doing, but they are not alone,\" Shamir said.  <\/p>\n<p>    Kocher asked the panel about the recent statement by Attorney    General Jeff Sessions, calling for the ability of law    enforcement to \"overcome encryption.\" Rivest said, \"overcoming    encryption, to me, means a backdoor,\" but Landau suggested    there are other ways, and that she has not found those in    Congress necessarily supporting Session's position.  <\/p>\n<p>    For U.S. companies, Shamir said that putting backdoors in their    products would be \"shooting themselves in the foot.\"  <\/p>\n<p>    Find out more about     the voter database hacks that triggered election concerns  <\/p>\n<p>    Learn about     elliptic curve cryptography in ticketing  <\/p>\n<p>    Keep up with the rest of the     RSA Conference 2017  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchsecurity.techtarget.com\/news\/450413012\/RSA-panel-covers-cryptography-trends-elections-and-more\" title=\"RSA panel covers cryptography trends, elections and more - TechTarget\">RSA panel covers cryptography trends, elections and more - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> SAN FRANCISCO -- Each year at RSA Conference, the world's top cryptographers gather on stage after the show's opening keynotes to share their views and opinions on cryptography trends. This year, the panel was moderated for the fourth consecutive time by Paul Kocher, president in the cryptography research division of Rambus. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-31357","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31357"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31357"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31357\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}