{"id":32083,"date":"2017-06-08T18:46:38","date_gmt":"2017-06-08T22:46:38","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/quantum-powered-random-numbers-could-provide-key-to-better-cryptography-sc-magazine-uk.php"},"modified":"2017-06-08T18:46:38","modified_gmt":"2017-06-08T22:46:38","slug":"quantum-powered-random-numbers-could-provide-key-to-better-cryptography-sc-magazine-uk","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/quantum-powered-random-numbers-could-provide-key-to-better-cryptography-sc-magazine-uk.php","title":{"rendered":"Quantum-powered random numbers could provide key to better cryptography &#8211; SC Magazine UK"},"content":{"rendered":"<p><p>Entropy is not usually considered desirable, except in  cryptography  <\/p>\n<p>    Usually when the subject of quantum computing comes up, it's    all rather future-gazing stuff. However, during the    Infosecurity Europe 2017 show, one company launched a quantum    technology derived product that's very much here and now:    Entropy-as-a-Service.  <\/p>\n<p>    Whitewood, which is developing crypto-security    solutions based on advanced quantum technology, says that the    cloud-based service \"delivers pure quantum entropy, the    foundation of randomness, to generate truly random numbers for    creating cryptographic keys that are impossible to guess\".  <\/p>\n<p>    So how does this work, and do we actually need a quantum random    number generator anyway?  <\/p>\n<p>    The press release talks of the Whitewood Entropy Engine being    at the heart of the service, something born out a decade long    research program at Los Alamos National Laboratory. \"Random    number generation is critical for security but is often poorly    understood,\" says Richard Moulds, general manager of Whitewood,    \"and it's a point of attack and vulnerability.\"  <\/p>\n<p>    SC Media UK asked Moulds if he was saying existing random    number generators (RNG) are actually that bad, to the point of    being dangerous to use in real world scenarios?  <\/p>\n<p>    \"It's not so much that all random number generators are bad,    it's that some are bad but you can't tell which ones they are!\"    Moulds insists. \"As security applications use more and more    crypto  encryption is becoming ubiquitous and GDPR will only    accelerate this  they consume more and more keys, which    requires more and more randomness.\"  <\/p>\n<p>    The trouble being, according to Moulds, that we are    increasingly hosting our applications in places where there is    little or no randomness  the cloud or IoT devices for example.  <\/p>\n<p>    \"We've seen recent patches by Siemens of its IoT building    controllers because they had no randomness and hence were    generating the same keys,\" Moulds warns. \"Edward Snowden's    leaks indicated that a newly standardised RNG had been weakened    specifically to enable government eavesdropping. It's    effectively impossible to spot the difference between a truly    random and non-random RNG.\"  <\/p>\n<p>    SC Media put the same question to Dr Zulfikar Ramzan, CTO at    RSA. \"While research into novel sources of entropy for    cryptographic applications is interesting,\" he admitted, \"many    of the existing approaches for generating random numbers are    quite sound.\"  <\/p>\n<p>    In fact, Dr Ramzan went on to insist that when issues do    typically occur, \"they have less to do with the source of    randomness, but rather with the implementation of the approach    or when the results are used in downstream applications\".  <\/p>\n<p>    Which leads us to wonder what the real world argument for    diverting budgets, that are already squeezed, to a quantum    powered random number generator might look like?   <\/p>\n<p>    Richard Moulds responded: \"If we could test the keys that are    generated and keep the good ones and throw away the non-random    ones there would be no problem.\" But he added, \"There is no    official test or standard for doing so, although NIST is    actually working on one.\" This means efforts to ensure keys are    truly random have to be proactive not reactive.  <\/p>\n<p>    \"Randomness has to be architected into the system up front,\"    Moulds insists. \"Once a key is exposed the game is over.\"  <\/p>\n<p>    Dr Ramzan still has concerns though. \"In cryptography, novelty    is a negative,\" he explains. \"When a new idea is introduced, it    needs to withstand the test of time and be adequately analysed    before it is safe to use within commercial applications.\"  <\/p>\n<p>    He compares cryptography to baking: you not only need to ensure    that you use the right ingredients in the right ways at the    right times to prepare the batter, but you must make sure that    it is cooked for the appropriate amount of time.  <\/p>\n<p>    \"Otherwise, the results can vary from being unpredictable to    being lethal, Dr Ramzan concludes.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scmagazineuk.com\/quantum-powered-random-numbers-could-provide-key-to-better-cryptography\/article\/667181\/\" title=\"Quantum-powered random numbers could provide key to better cryptography - SC Magazine UK\">Quantum-powered random numbers could provide key to better cryptography - SC Magazine UK<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Entropy is not usually considered desirable, except in cryptography Usually when the subject of quantum computing comes up, it's all rather future-gazing stuff. However, during the Infosecurity Europe 2017 show, one company launched a quantum technology derived product that's very much here and now: Entropy-as-a-Service. Whitewood, which is developing crypto-security solutions based on advanced quantum technology, says that the cloud-based service \"delivers pure quantum entropy, the foundation of randomness, to generate truly random numbers for creating cryptographic keys that are impossible to guess\". <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32083","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32083"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32083"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32083\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}