Toggle light / dark theme

Wireless security and internet standards experts release a complete quantum resistant toolkit for commercial use.

TORONTO, Sept. 19, 2016 /CNW/ — 4TH ETSI/IQC Workshop on Quantum-Safe Cryptography – ISARA Corporation today announced the availability of its ISARA Quantum Resistant (IQR) Toolkit. The toolkit helps software and hardware solution providers build robust commercial products that protect vulnerable infrastructure against the threat quantum computing already poses to widely-used security standards.

Similar to the Y2K crisis, the technology industry is facing a ‘Y2Q’ (years to quantum) challenge that has a limited timeline and requires significant work to ensure systems and information are properly protected. The massive processing power of quantum computers is such that, without integrating quantum resistant security solutions, all security that depends on existing standards is vulnerable.

Read more

Ouch!


According to a countdown clock from Sen. Ted Cruz, there are less than three weeks until the Obama administration puts the Internet at risk from takeover and censorship by China, Russia, and Iran. This conspiratorial fearmongering is, frankly, absurd.

But just because this particular alleged conspiracy is insane doesn’t mean that there is no conspiracy. Of course authoritarian regimes want more control over the Internet, and at this very moment, they are working through the U.N. to get it. But instead of targeting the administration of the domain name system (which, thanks to the so-called “IANA transition” Sen. Cruz opposes, is nearly out of their reach), their chosen vehicle is next-generation Internet standards, particularly an arcane proposal called the Digital Object Architecture (DOA). The best way to stop authoritarian regimes and keep the Internet free is to go through with the transition.

DOA is the brainchild of the legendary Bob Kahn, co-inventor of the Internet’s TCP/IP protocol. The Internet does a great job of moving bits around the world, but it isn’t always so good at authentication, rights management, and access controls. Kahn’s idea, dating back to the early 1990s, is to bake “information management” directly into core protocols. What if every piece of data and every device that accessed the network had a permanent, trackable unique identifier? If you wanted to access information on the network, the system would decide if you were authorized to receive it and, if so, allow you to fetch it.

Read more

The Pentagon wants to fundamentally change how social science research is conducted.

The Defense Department uses principles of human behavior to make major decisions affecting national security, but social science is inherently limited, according to the Defense Advanced Research Projects Agency, mostly because social scientists “rarely, if ever, have ground truth” about “actual causes of observed behaviors in the ‘real world.’”

To help mitigate those shortcomings, DARPA is gathering information on ways, and potentially new technology, that can assess how closely social science research methods do represent the real world. Simulations, for instance, could be used to calibrate whether the inferences about human behavior social scientists make when they’re conducting an analysis are valid.

Read more

“The vast majority of space technology being developed is dual-use, and so serves Chinese security interests as well,” says Johnson-Freese, an expert on the Chinese space program and a professor at the US Naval War College. “China understands the military advantages reaped by US space capabilities for many years, and wants those same capabilities”.

Read more

Nice.


“We’ve managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially.”

Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

In The Optical Society’s journal for high impact research, Optica, the researchers report on their fully integrated device for random number generation. The new work represents a key advancement on the path to incorporating quantum-based random number generators — delivering the highest quality numbers and thus the highest level of security — into computers, tablets and mobile phones.

Read more

As I mentioned 4 months ago when an article came out stating that this type of concept of a scalable quantum chip was at least 15 years away was bunk; this is again one more example where contributors really need to do their homework and make sure they are speaking to the real folks on the frontlines of QC.


Quantum-based random number generators are now small enough that they could fit in mobile devices.

Read more

The future frontier for hackers is synthetic biology.


Landmark scientific projects such as the Human Genome Project can encourage international cooperation and bring nations together. However, when security interests and defence research align with the prestige of a landmark project—international competition is all but assured. Synthetic biology is a scientific discipline less than a decade old, and the potential defence and security applications may create a new space race, this time between the USA and China.

The larger concern is not that this race may happen, but that if it does it will politicise and militarise an ethically sensitive area of the life sciences at a time when this frontier technology is critical to maintaining a sustainable world.

The Human Genome Project (HGP) cost about US$300 million (A$394 million), involved 20 international institutions and sequenced the human genome in just over a decade. The draft sequence was published in February 2001 and has driven economic, health and social benefits the world over for the last 15 years. To a very large extent this research project underpins the modern life sciences and is the equivalent of landing on the moon.

Read more

The Gatekeeper keychain uses bluetooth 4.0 technology with an AES encryption method to automatically lock your computer when you walk away.

Every office has that one coworker—that person who sneaks on to your computer and posts absurd messages on your various social media pages. Fortunately, computers come with handy security features and are generally password protected.

“But!” you think, “what about those times that I forget to lock my computer?”

Read more