Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Cryptography. Show all posts

Why Policy-Driven Cryptography Matters in the AI Era

 



In this modern-day digital world, companies are under constant pressure to keep their networks secure. Traditionally, encryption systems were deeply built into applications and devices, making them hard to change or update. When a flaw was found, either in the encryption method itself or because hackers became smarter, fixing it took time, effort, and risk. Most companies chose to live with the risk because they didn’t have an easy way to fix the problem or even fully understand where it existed.

Now, with data moving across various platforms, for instance cloud servers, edge devices, and personal gadgets — it’s no longer practical to depend on rigid security setups. Businesses need flexible systems that can quickly respond to new threats, government rules, and technological changes.

According to the IBM X‑Force 2025 Threat Intelligence Index, nearly one-third (30 %) of all intrusions in 2024 began with valid account credential abuse, making identity theft a top pathway for attackers.

This is where policy-driven cryptography comes in.


What Is Policy-Driven Crypto Agility?

It means building systems where encryption tools and rules can be easily updated or swapped out based on pre-defined policies, rather than making changes manually in every application or device. Think of it like setting rules in a central dashboard: when updates are needed, the changes apply across the network with a few clicks.

This method helps businesses react quickly to new security threats without affecting ongoing services. It also supports easier compliance with laws like GDPR, HIPAA, or PCI DSS, as rules can be built directly into the system and leave behind an audit trail for review.


Why Is This Important Today?

Artificial intelligence is making cyber threats more powerful. AI tools can now scan massive amounts of encrypted data, detect patterns, and even speed up the process of cracking codes. At the same time, quantum computing; a new kind of computing still in development, may soon be able to break the encryption methods we rely on today.

If organizations start preparing now by using policy-based encryption systems, they’ll be better positioned to add future-proof encryption methods like post-quantum cryptography without having to rebuild everything from scratch.


How Can Organizations Start?

To make this work, businesses need a strong key management system: one that handles the creation, rotation, and deactivation of encryption keys. On top of that, there must be a smart control layer that reads the rules (policies) and makes changes across the network automatically.

Policies should reflect real needs, such as what kind of data is being protected, where it’s going, and what device is using it. Teams across IT, security, and compliance must work together to keep these rules updated. Developers and staff should also be trained to understand how the system works.

As more companies shift toward cloud-based networks and edge computing, policy-driven cryptography offers a smarter, faster, and safer way to manage security. It reduces the chance of human error, keeps up with fast-moving threats, and ensures compliance with strict data regulations.

In a time when hackers use AI and quantum computing is fast approaching, flexible and policy-based encryption may be the key to keeping tomorrow’s networks safe.

Core Cryptographic Technique Compromised Putting Blockchain Security at Risk

 


The concept of randomness is often regarded as a cornerstone of fairness, security, and predictability in both physical and digital environments. Randomness must be used to ensure impartiality, protect sensitive information, and ensure integrity, whether it is determining which team kicks off a match by coin toss or securely securing billions of online transactions with cryptographic keys. 

However, in the digital age, it is often very challenging and resource-consuming to generate true randomness. Because of this limitation, computer scientists and engineers have turned to hash functions as a tool to solve this problem. 

Hash functions are mathematical algorithms that mix input data in an unpredictable fashion, yielding fixed-length outputs. Although these outputs are not truly random, they are designed to mimic randomness as closely as possible. 

Historically, this practical substitution has been based on the widely accepted theoretical assumption of a random oracle model, which holds that the outputs of well-designed hash functions are indistinguishable from genuine randomness. As a result of this model, numerous cryptographic protocols have been designed and analysed, enabling secure communication, digital signatures, and consensus mechanisms, which have established it as a foundational pillar in cryptographic research. 

Despite this, as this assumption has been increasingly relied upon, so too has the scrutiny of its limits become more critical, raising serious questions about the long-term resilience of systems built on a system that may only be an illusion of randomness based on it. By enabling transparent, tamper-evident, and trustless transactions, blockchain technology is transforming a wide range of industries, ranging from finance and logistics to health care and legal systems. 

In light of the increasing popularity of the technology, it has become increasingly crucial for companies to secure digital assets, safeguard sensitive information, and ensure the integrity of their transactions in order to scale their adoption effectively. Organisations must have a deep understanding of how to implement and maintain strong security protocols across the blockchain ecosystem to ensure the effectiveness of enterprise adoption. 

In order to secure blockchain networks, there must be a variety of critical issues addressed, such as verifying transactions, verifying identities, controlling access to the blockchain, and preventing unauthorised data manipulation. Blockchain's trust model is based on robust cryptographic techniques that form the foundation of these security measures. 

An example of symmetric encryption utilises the same secret key for both encryption and decryption; an example of asymmetric encryption is establishing secure communication channels and verifying digital signatures through the use of a public-private key pair; and another example is cryptographic hash functions that generate fixed-length, irreversible representations of data and thus ensure integrity and non-repudiation of data. Several of these cryptographic methods are crucial to maintaining the security and resilience of blockchain systems, each playing a distinct and vital role. As a general rule, symmetric encryption is usually used in secure data exchange between trusted nodes, whereas asymmetric encryption is commonly used in identifying and signing transactions. Hash functions, on the other hand, are essential to the core blockchain functions of block creation, consensus mechanisms, and proof-of-work algorithms. 

By using these techniques, blockchain networks are able to provide a secure, transparent and tamper-resistant platform that can meet the ever-growing demands of modern digital infrastructure, while simultaneously offering a secure, transparent, and tamper-resistant platform. In the broader world of cybersecurity, cryptography serves as a foundational technology for protecting digital systems, communication channels, and data.

In addition to maintaining confidentiality, making sure sensitive data is protected from unauthorised access, and ensuring data integrity by detecting tampering or unauthorised modifications, it is an essential part of maintaining data integrity. As well as protecting data, cryptography also enables authentication, using mechanisms such as digital certificates and cryptographic signatures, which enable organisations to verify the identity of their users, devices, and systems in a high-assurance manner. 

The adoption of cryptographic controls is explicitly required by many data protection and privacy regulations, including the GDPR, HIPAA, and PCI-DSS, placing cryptography as an essential tool in ensuring regulatory compliance across many industries. With the development of more sophisticated cybersecurity strategies, cryptography will become increasingly important as it is integrated into emerging frameworks like the Zero Trust architecture and defence-in-depth models in order to respond to increasingly sophisticated threats. 

As the ultimate safeguard in multi-layered security strategies, cryptography plays a crucial role—a resilient barrier that is able to protect data even when a system compromise takes place. Despite the fact that attackers may penetrate outer security layers, strong encryption ensures that critical information will remain unable to be accessed and understood without the right cryptographic key if they manage to penetrate outer security layers. 

Using the Zero Trust paradigm, which assumes that there should be no inherently trustworthy user or device, cryptography enables secure access by enforcing granular authentication, encryption of data, and policy-driven access controls as well. The software secures data both in transit and at rest, reducing the risk of lateral movement, insider threats, and compromised credentials. 

A cyberattack is becoming increasingly targeted at core infrastructures as well as high-value data, and cryptographic technologies can provide enduring protection, ensuring confidentiality, integrity, and availability, no matter what environment a computer or network is in. The development of secure, resilient, and trustworthy digital ecosystems relies on cryptography more than any other technical component. 

A groundbreaking new study has challenged a central assumption in modern cryptography - that the random oracle model can be trusted - as well as challenged a fundamental part of cryptography's reliability. An effective technique has been developed to deceive a widely used, commercially available cryptographic proof system into validating false statements, revealing a method that is new to the world of cryptographic proof. 

In light of the fact that the system in question has long been considered secure, the random oracle model has long assumed that its outputs mimic genuine randomness. This revelation is particularly alarming. According to the researchers, the vulnerability they discovered raises significant concerns for blockchain ecosystems, especially those in which proof protocols play a key role in validating off-chain computations and protecting transaction records, especially those within blockchain ecosystems. 

The vulnerability carries significant repercussions for the blockchain and cryptocurrency industries, where the stakes are extremely high. According to the researcher Eylon Yogev from Bar-Ilan University in Israel, "there is quite a bit of money being made with these kinds of things." Given the substantial incentives for adversaries to exploit cryptographic vulnerabilities, malicious actors have a strong chance of undermining the integrity of blockchains. 

In the paper, Dmitry Khovratovich, a member of the Ethereum Foundation, Ron Rothblum, a member of the Technion–Israel Institute of Technology and zero-knowledge proof firm Succinct and Lev Soukhanov of the blockchain-focused startup [[alloc] init] all point out that the attacks are not restricted to any particular hash function. 

As a matter of fact, it exposes a more fundamental problem: it enables the fabrication of convincing, yet false, proofs regardless of the specific hash function used to simulate randomness within the system. This discovery fundamentally challenges the notion that hash-based randomness in cryptographic applications can always replace the real-world unpredictable nature of cryptography. 

A growing number of blockchain technologies are being developed and scaled, so the findings make it clear that we need more robust, formally verifiable security models—ones that are not based on idealised assumptions alone—as the technology continues to grow and grow. Encryption backdoors are deliberately designed, concealed vulnerabilities within cryptographic systems that allow unauthorised access to encrypted data despite standard authentication or decryption procedures being bypassed. 

This type of hidden mechanism can be embedded within a wide variety of digital technologies — from secure messaging platforms to cloud storage to virtual private networks and communication protocols, to name but a few. As encryption is intended to keep data secure, so only those with the intent to access it can do so, a backdoor undermines this principle effectively by providing a secret entry point that is usually known to the creators or designated third parties only. 

As an example, imagine encrypted data being stored in a highly secure digital vault, where access is restricted only to those with special cryptographic keys that they have, along with the recipient of the data, which can only be accessed by them. It is often said that backdoors are like concealed second keyholes — one undocumented and deliberately concealed — which can be used by selected entities without the user's knowledge or consent to unlock the vault. 

It is clear that proponents of such mechanisms contend that they are essential to national security and critical law enforcement operations, but this viewpoint remains very contentious among cybersecurity professionals and privacy advocates. Regardless of the purpose of the intentional vulnerability, it erodes the overall security posture of any system when included. 

There is a single point of failure with backdoors; if they are discovered or exploited by malicious actors such as hackers, foreign intelligence services, or insider threats, they have the ability to compromise a large amount of sensitive data. Having a backdoor negates the very nature of encryption, and turns robust digital fortresses into potentially leaky structures by the very nature of their existence. 

This implies that the debate over backdoors lies at an intersection of information privacy, trust, and security, and, in doing so, raises profound questions regarding whether the pursuit of surveillance should be made at the expense of an adequate level of digital security for every person.

Orion Brings Fully Homomorphic Encryption to Deep Learning for AI Privacy

 

As data privacy becomes an increasing concern, a new artificial intelligence (AI) encryption breakthrough could transform how sensitive information is handled. Researchers Austin Ebel, Karthik Garimella, and Assistant Professor Brandon Reagen have developed Orion, a framework that integrates fully homomorphic encryption (FHE) into deep learning. 

This advancement allows AI systems to analyze encrypted data without decrypting it, ensuring privacy throughout the process. FHE has long been considered a major breakthrough in cryptography because it enables computations on encrypted information while keeping it secure. However, applying this method to deep learning has been challenging due to the heavy computational requirements and technical constraints. Orion addresses these challenges by automating the conversion of deep learning models into FHE-compatible formats. 

The researchers’ study, recently published on arXiv and set to be presented at the 2025 ACM International Conference on Architectural Support for Programming Languages and Operating Systems, highlights Orion’s ability to make privacy-focused AI more practical. One of the biggest concerns in AI today is that machine learning models require direct access to user data, raising serious privacy risks. Orion eliminates this issue by allowing AI to function without exposing sensitive information. The framework is built to work with PyTorch, a widely used machine learning library, making it easier for developers to integrate FHE into existing models. 

Orion also introduces optimization techniques that reduce computational burdens, making privacy-preserving AI more efficient and scalable. Orion has demonstrated notable performance improvements, achieving speeds 2.38 times faster than previous FHE deep learning methods. The researchers successfully implemented high-resolution object detection using the YOLO-v1 model, which contains 139 million parameters—a scale previously considered impractical for FHE. This progress suggests Orion could enable encrypted AI applications in sectors like healthcare, finance, and cybersecurity, where protecting user data is essential. 

A key advantage of Orion is its accessibility. Traditional FHE implementations require specialized knowledge, making them difficult to adopt. Orion simplifies the process, allowing more developers to use the technology without extensive training. By open-sourcing the framework, the research team hopes to encourage further innovation and adoption. As AI continues to expand into everyday life, advancements like Orion could help ensure that technological progress does not come at the cost of privacy and security.

Microsoft and Amazon’s Quantum Progress Poses New Risks for Encryption

 


Microsoft, Amazon, and Google have all announced recent advances in quantum computing that are likely to accelerate the timeline for the possible obsolescence of current encryption standards. These developments indicate that it will become increasingly important to address the vulnerabilities posed by quantum computing to existing cryptographic protocols shortly. Those who are leading the way in the technological race are those who are advancing quantum computing technology, which is the most powerful technology that will be able to easily decrypt the encryption mechanisms that safeguard the internet's security and data privacy. 

On the other hand, there are researchers and cybersecurity experts who are working on the development of post-quantum cryptography (PQC) - a new generation of encryption technologies that can handle quantum system computational power with ease. A quantum-resistant encryption system must be prioritized by organisations and governments to ensure long-term security of their data and digital communications, especially as the quantum era has come closer than anticipated to being realized. 

Even though quantum decryption and quantum-resistant encryption are competing more than ever, the race for global cybersecurity infrastructure requires strategic investment and proactive measures. There has been an important advancement in quantum computing in the field, with Amazon Web Services (AWS) announcing the inaugural quantum computing chip called Ocelot, which represents a significant step in the pursuit of practical quantum computing. 

One of the most critical challenges in the field is error correction. Using Ocelot, Amazon Web Services claims that it may be possible to drastically reduce the cost of quantum error correction by as much as 90 percent, thus speeding up the process toward fault-tolerant quantum systems being realized. In the future, error correction will continue to be an important barrier to quantum computing. This is because quantum systems are inherently fragile, as well as highly susceptible to environmental disturbances, such as fluctuating temperatures, electromagnetic interference, and vibrations from the environment.

As a result of these external factors, quantum operations are exposed to a substantial amount of computational errors, which make it extremely challenging to maintain their stability and reliability. Research in quantum computing is progressing rapidly, which means innovations like Ocelot could play a crucial role in helping mitigate these challenges, paving the way for more robust and scalable quantum computing in the future. 

If a sufficiently advanced quantum computer has access to Shor's algorithm or any potential enhancements to it, it will be possible for it to decrypt existing public key encryption protocols, such as RSA 2048, within 24 hours by leveraging Shor's algorithm. With the advent of quantum computing, modern cybersecurity frameworks are going to be fundamentally disrupted, rendering current cryptographic mechanisms ineffective. 

The encryption of any encrypted data that has been unauthorizedly acquired and stored under the "harvest now, decrypt later" strategy will become fully available to those who have such quantum computing capabilities. A severe breach of internet communications, digital signatures, and financial transactions would result in severe breaches of trust in the digital ecosystem, resulting in serious losses in trust. The inevitability of this threat does not depend on the specific way by which PKE is broken, but rather on the certainty that a quantum system with sufficient power will be able to achieve this result in the first place. 

Consequently, the National Institute of Standards and Technology (NIST) has been the frontrunner in developing advanced encryption protocols designed to withstand quantum-based attacks in response to these threats. Post-quantum cryptography (PQC) is an initiative that is based on mathematical structures that are believed to be immune from quantum computational attacks, and is a product of this effort. To ensure the long-term security of digital infrastructure, PKE must be replaced with PQC. There is, however, still a limited amount of awareness of the urgency of the situation, and many stakeholders are still unaware of quantum computing's potential impact on cybersecurity, and are therefore unaware of its potential. 

As the development of quantum-resistant encryption technologies through 2025 becomes increasingly important, it will play an increasingly important role in improving our understanding of these methodologies, accelerating their adoption, and making sure our global cybersecurity standards will remain safe. For a cryptographic method to be effective, it must have computationally infeasible algorithms that cannot be broken within a reasonable period. These methods allow for secure encryption and decryption, which ensures that data is kept confidential for authorized parties. However, no encryption is completely impervious indefinitely. 

A sufficiently powerful computing machine will eventually compromise any encryption protocol. Because of this reality, cryptographic standards have continuously evolved over the past three decades, as advances in computing have rendered many previous encryption methods obsolete. For example, in the "crypto wars" of the 1990s, the 1024-bit key encryption that was at the center of the debate has long been retired and is no longer deemed adequate due to modern computational power. Nowadays, it is hardly difficult for a computer to break through that level of encryption. 

In recent years, major technology companies have announced that the ability to break encryption is poised to take a leap forward that has never been seen before. Amazon Web Services, Google, and Microsoft have announced dramatic increases in computational power facilitated by quantum computing technology. Google introduced "Willow" in December and Microsoft announced "Majorana 1" in February, which signals a dramatic rise in computational power. A few days later, Amazon announced the "Ocelot" quantum computing machine. Each of these breakthroughs represents an important and distinct step forward in the evolution of quantum computing technology, a technology that has fundamentally redefined the way that processors are designed. 

In contrast to traditional computing systems, quantum systems are based on entirely different principles, so their efficiency is exponentially higher. It is evident that advances in quantum computing are accelerating an era that will have a profound effect on encryption security and that cybersecurity practices need to be adjusted urgently to cope with these advances. In recent years, quantum computing has made tremendous strides in computing power. It has led to an extraordinary leap in computational power unmatched by any other technology. In the same manner as with any technological breakthrough that has an impact on our world, it is uncertain what it may mean. 

However, there is one aspect that is becoming increasingly clear: the computational barriers that define what is currently infeasible will be reduced to problems that can be solved in seconds, as stated by statements from Google and Microsoft. In terms of data security, this change has profound implications. It will be very easy for quantum computers to unlock encrypted information once they become widely accessible, thus making it difficult to decrypt encrypted data today. Having the capability to break modern encryption protocols within a matter of seconds poses a serious threat to digital privacy and security across industries. 

The development of quantum-resistant cryptographic solutions has been undertaken in anticipation of this eventuality. A key aspect of the Post-Quantum Cryptography (PQC) initiative has been the leadership role that NIST has been assuming since 2016, as it has played a historical role in establishing encryption standards over the years. NIST released a key milestone in global cybersecurity efforts in August when it released its first three finalized post-quantum encryption standards. 

Major technology companies, including Microsoft, Amazon Web Services (AWS), and Google, are not only contributing to the advancement of quantum computing but are also actively participating in the development of PQC solutions as well. Google has been working with NIST on developing encryption methods that can withstand quantum-based attacks. These organizations have been working together with NIST to develop encryption methods that can withstand quantum attacks. During August, Microsoft provided an update on their PQC efforts, followed by AWS and Microsoft. 

The initiatives have been in place long before the latest quantum hardware advances, yet they are a strong reminder that addressing the challenges posed by quantum computing requires a comprehensive and sustained commitment. However, establishing encryption standards does not guarantee widespread adoption, as it does not equate to widespread deployment. As part of the transition, there will be a considerable amount of time and effort involved, particularly in ensuring that it integrates smoothly into everyday applications, such as online banking and secure communications, thereby making the process more complex and time consuming. 

Because of the challenges associated with implementing and deploying new encryption technologies on a large scale, the adoption of new encryption technologies has historically spanned several years. Due to this fact, it cannot be overemphasized how urgent it is for us to prepare for a quantum era. A company's strategic planning and system design must take into account PQC considerations proactively and proactively. It has become increasingly clear that all organizations must address the issue of PQC rather than delay it. The fundamental principle remains that if the user breaks encryption, they are much more likely to break it than if they construct secure systems. 

Moreover, cryptographic implementation is a complex and error-prone process in and of itself. For the cybersecurity landscape to be successful at defending against quantum-based threats, a concerted, sustained effort must be made across all aspects. There is a lot of excitement on the horizon for encryption, both rapidly and very challenging. As quantum computing emerges, current encryption protocols face an existential threat, which means that organizations that fail to react quickly and decisively will suffer severe security vulnerabilities, so ensuring the future of digital security is imperative.

Bitcoin Security Concerns Amid Quantum Computing Advancements

 

Chamath Palihapitiya, CEO of Social Capital, has raised alarms over Bitcoin’s future security, cautioning that its SHA-256 encryption may become vulnerable within the next two to five years. Speaking on the All-In Podcast, he highlighted rapid advancements in quantum computing, particularly Google’s unveiling of the Willow quantum chip featuring 105 qubits. Palihapitiya estimates that 8,000 such chips could potentially breach SHA-256 encryption, underscoring the pressing need for blockchain networks to adapt.

Quantum Computing's Impact on Cryptography

While acknowledging the infancy of quantum computing, Palihapitiya pointed to Google’s Willow chip as a pivotal development that could accelerate breakthroughs in cryptography. Despite scalability challenges, he remains optimistic that the cryptocurrency sector will evolve to develop quantum-resistant encryption methods.

Not all experts share his concerns, however. Ki Young Ju, founder of CryptoQuant, has expressed confidence that Bitcoin’s encryption is unlikely to face quantum threats within this decade.

Satoshi Nakamoto’s Early Solutions

Bitcoin’s pseudonymous creator, Satoshi Nakamoto, had anticipated such scenarios. In 2010, Satoshi proposed that the Bitcoin community could agree on the last valid blockchain snapshot and transition to a new cryptographic framework if SHA-256 were compromised. However, these early solutions are not without controversy.

Emin Gün Sirer, founder of Avalanche, has warned that some of Satoshi’s early-mined coins used an outdated Pay-To-Public-Key (P2PK) format, which exposes public keys and increases the risk of exploitation. Sirer suggested the Bitcoin community should consider freezing these coins or setting a sunset date for outdated transactions to mitigate risks.

Recent advancements in quantum computing, including Google’s Willow chip, briefly unsettled the cryptocurrency market. A sudden wave of liquidations resulted in $1.6 billion being wiped out within 24 hours. However, Bitcoin demonstrated resilience, reclaiming the $100,000 resistance level and achieving a 4.6% weekly gain.

Proactive Measures for Long-Term Security

Experts widely agree that proactive steps, such as transitioning to quantum-resistant cryptographic frameworks, will be essential for ensuring Bitcoin’s long-term security. As the quantum era approaches, collaboration and innovation within the cryptocurrency community will be pivotal in maintaining its robustness against emerging threats.

The ongoing advancements in quantum computing present both challenges and opportunities. While they highlight vulnerabilities in existing systems, they also drive the cryptocurrency sector toward innovative solutions that will likely define the next chapter in its evolution.

Raman Research Institute’s Breakthrough in Quantum Cybersecurity

 

Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most pressing challenges in data security today. Traditional encryption methods depend on algorithms and computational complexity to protect data. 
However, with the rise of cyber threats and the imminent advent of quantum computing, there is an increasing demand for more robust and reliable encryption techniques. Quantum computing, in particular, poses a threat to conventional encryption methods as it has the potential to break these systems with ease. Thus, the need for advanced cryptographic solutions has never been more urgent. The team at the Raman Research Institute has created a user-friendly approach to generate random numbers that are genuinely unpredictable. 

This is a critical component for secure encryption because predictable random numbers can compromise the integrity of cryptographic systems. By ensuring that these numbers are entirely random, the new method significantly enhances the security of data transmissions. The unpredictability of these random numbers makes it exponentially harder for potential attackers to predict encryption keys, thereby fortifying data protection. Quantum communication, which relies on the principles of quantum mechanics, offers unparalleled security by making it theoretically impossible for an eavesdropper to intercept and read the transmitted data without being detected. 

However, the effectiveness of quantum communication systems hinges on the quality of the random numbers used in encryption. The breakthrough achieved by the Raman Research Institute addresses this need by providing a reliable source of high-quality random numbers. This advancement not only bolsters current encryption standards but also paves the way for more secure quantum communication networks. 

As cyber threats continue to evolve, the ability to generate truly random numbers will play a crucial role in maintaining the integrity and security of digital communications. This development is particularly significant for industries that rely heavily on data security, such as finance, healthcare, and government sectors. The method developed by the scientists is not only efficient but also practical for real-world applications. It can be integrated into existing systems with minimal modifications, ensuring that organizations can enhance their security measures without significant overhauls. The research team at Raman Research Institute is optimistic that this innovation will set a new standard in cryptographic practices and inspire further advancements in the field. 

The Raman Research Institute’s new method for generating truly unpredictable random numbers marks a significant step forward in cybersecurity. This breakthrough is vital for the development of stronger encryption techniques, particularly in the realm of quantum communications, ensuring that data remains secure in an increasingly digital world. As we move towards more interconnected and data-driven societies, such advancements in cybersecurity are essential to protect sensitive information from sophisticated cyber threats.

New Rules for Quantum Encryption Unveiled by Cryptographers

 

Cryptographers are making significant strides in the field of quantum encryption, developing new rules that promise to enhance data security in the quantum computing age. As quantum computers advance, they pose a threat to current encryption methods, which rely on complex mathematical problems that quantum machines could potentially solve with ease. 

This has driven researchers to explore quantum encryption, which leverages the principles of quantum mechanics to create theoretically unbreakable security protocols. Quantum encryption primarily focuses on two main concepts: quantum key distribution (QKD) and post-quantum cryptography (PQC). QKD uses the properties of quantum particles to securely exchange cryptographic keys between parties. 

Any attempt to intercept these keys would alter the quantum states, alerting the parties to the presence of an eavesdropper. PQC, on the other hand, involves developing new cryptographic algorithms that can withstand attacks from both classical and quantum computers. Recent research has introduced innovative approaches to quantum encryption, addressing the challenges of scalability and practical implementation. 

These advancements aim to make quantum encryption more accessible and reliable, ensuring that data remains secure even in a future dominated by quantum computing. One of the most promising developments is the establishment of quantum-resistant algorithms, which can be integrated into existing digital infrastructures. These algorithms are designed to be robust against quantum attacks while maintaining compatibility with current systems. This dual approach ensures a smoother transition from classical to quantum-secure encryption.  

Furthermore, the discovery of new mathematical structures and protocols has opened up possibilities for more efficient and effective quantum encryption methods. These breakthroughs are crucial for protecting sensitive information, from financial transactions to personal communications, in a quantum computing world. The ongoing research in quantum encryption is a testament to the proactive efforts of cryptographers to anticipate and counter the potential threats posed by quantum computers. 

By staying ahead of these challenges, they are laying the groundwork for a future where data security is not only preserved but significantly strengthened. As the field of quantum encryption continues to evolve, it will play a pivotal role in safeguarding digital information against emerging threats. The innovative rules and protocols being developed today will shape the future of cybersecurity, ensuring that privacy and data integrity are maintained in an increasingly interconnected world.

Quantum Technology: Implications for Digital Security

 


In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum mechanics to perform calculations at unprecedented speeds. While this promises advancements in various fields, it also poses a formidable challenge to cybersecurity.

The Vulnerability of Current Encryption Methods

At the heart of digital security lies encryption, a complex process that transforms sensitive information into indecipherable code. Traditional encryption algorithms, such as those based on factoring large numbers, are effective against classical computers but vulnerable to quantum attacks. Quantum computers, with their ability to perform vast numbers of calculations simultaneously, could render conventional encryption obsolete, posing a grave risk to sensitive data.

The Hunt for Quantum-Resistant Encryption

Recognising the imminent threat posed by quantum computing, researchers are tirelessly working to develop encryption methods resistant to quantum attacks. The US National Institute of Standards and Technology has been at the forefront of this effort, soliciting proposals for "quantum-proof" encryption algorithms. However, progress has been incremental, with few algorithms proving robust under rigorous scrutiny.

Lattice-Based Cryptography: A Promising Solution

Among the promising avenues for quantum-resistant encryption is lattice-based cryptography. Imagine lattices as grids or matrices in a multidimensional space. These structures offer a unique framework for securing data by hiding secret information within them. Picture it like a complex maze where the secret lies concealed within the intricate lattice structure. Even with the formidable processing power of quantum computers, navigating through these lattices to uncover the hidden secrets is a challenging task. This approach provides a robust defence against potential quantum attacks, offering hope for the future of digital security.

Challenges and Controversies

Recent research by cryptographer Yilei Chen has put weight on potential vulnerabilities in lattice-based encryption. Chen's findings suggested that quantum computers might exploit certain weaknesses in lattice-based algorithms, raising concerns within the cryptographic community. However, subsequent analysis revealed flaws in Chen's work, highlighting the complexity of developing quantum-resistant encryption.

The Critical Role of Mathematics

As the race to reinforce digital security against quantum threats intensifies, the role of mathematics cannot be overstated. Countries investing in quantum technology, such as Australia, must prioritise mathematical research to complement advancements in quantum computing. Only by understanding the intricate mathematical principles underlying encryption can we hope to safeguard sensitive data in an increasingly quantum-powered world.

Conclusion

In the face of rapidly advancing quantum technology, securing our digital infrastructure has never been more critical. By fostering innovation, embracing mathematical rigour, and continually refining encryption methods, we can navigate the perplexing questions posed by quantum computing and safeguard the integrity of our digital ecosystem.


Cryptographers Groundbreaking Discovery Enables Private Internet Searches

 

The desire for private internet searches has long been a cryptographic challenge. Historically, getting information from a public database without disclosing what was accessed (known as private information retrieval) has been a difficult task, particularly for large databases. The perfection of a private Google search, in which users can browse through material anonymously, has remained elusive due to the computational demands of such operations. 

However, a new study by three pioneering researchers has made tremendous progress in this field. They developed an innovative version of private information retrieval and expanded it to create a larger privacy method. This technique has been recognised for its pioneering potential, with plaudits expected at the annual Symposium on Theory of Computing in June 2023. 

Breaking barriers in cryptography

This development is based on a new way for discretely pulling information from huge datasets. It addresses the significant challenges of doing private searches across large databases without requiring a corresponding increase in computational effort. This technology is game-changing because it streamlines the process of conducting private searches, making them more viable and efficient. 

The strategy involves creating the database and encoding the entire dataset into a unique structure. This allows inquiries to be answered using only a small section of the structure. This novel approach indicates that a single server can host the information and do the preprocessing independently, enabling future users to retrieve data securely without incurring additional computing costs.

The future of online privacy 

While this breakthrough is noteworthy, practical applications are still being developed. The preprocessing method, as it stands, is most beneficial for extremely big databases and may not be realistic for everyday use due to existing processing performance and storage restrictions. 

Nonetheless, the research community remains optimistic. The history of cryptography reveals a similar pattern of optimising initially difficult outcomes into feasible ones. If the trend continues, private lookups from huge databases could become a reality, drastically changing our connection with the internet and significantly improving user privacy. 

A theoretical breakthrough

The new technique, invented by three cryptographers, employs a sophisticated kind of private information retrieval. It tackles the difficulty of executing private searches across large data sets without requiring additional computer resources. This concept is a major change from standard procedures, which frequently necessitate scanning whole databases to ensure secrecy. 

In a nutshell recent developments in cryptography are an important step towards enabling completely secure internet searches. This advancement has the potential to revolutionise how we access and interact with information online, putting user privacy and security first in an increasingly digital environment.

Revolutionizing Security: Passkeys by Google and Apple

Online security has grown to be of utmost importance in a digital environment that is always changing. Passkeys, a cutting-edge authentication system that is poised to transform how we protect our accounts, are being pushed for by Google and Apple, who are leading the effort.

Passkeys, also known as cryptographic keys, are a form of authentication that rely on public-key cryptography. Unlike traditional passwords, which can be vulnerable to hacking and phishing attacks, passkeys offer a more robust and secure method of verifying user identity. By generating a unique pair of keys – one public and one private – passkeys establish a highly secure connection between the user and the platform.

One of the key advantages of passkeys is that they eliminate the need for users to remember complex passwords or go through the hassle of resetting them. Instead, users can rely on their devices to generate and manage these cryptographic keys. This not only simplifies the login process but also reduces the risk of human error, a common factor in security breaches.

Google and Apple have been at the forefront of this innovation, integrating passkey technology into their platforms. Apple, for instance, has introduced the Passkeys API in iOS, making it easier for developers to implement this secure authentication method in their apps. This move signifies a significant shift towards a more secure and user-friendly digital landscape.

Moreover, passkeys can play a pivotal role in thwarting phishing attacks, which remain a prevalent threat in the online realm. Since passkeys are tied to specific devices, even if a user inadvertently falls victim to a phishing scam, the attacker would be unable to gain access without the physical device.

While passkeys offer a promising solution to enhance online security, it's important to acknowledge potential challenges. For instance, the technology may face initial resistance due to a learning curve associated with its implementation. Additionally, ensuring compatibility across various platforms and devices will be crucial to its widespread adoption.

Passkeys are a major advancement in digital authentication. Google and Apple are leading a push toward a more secure and frictionless internet experience by utilizing the power of public-key cryptography. Users might anticipate a time in the future when the laborious practice of managing passwords is a thing of the past as this technology continues to advance. Adopting passkeys is a step toward improved security as well as a step toward a more user-focused digital environment.

How to Identify and Overcome Blockchain Fatigue

 

With its plethora of uses and potential for transformation, the blockchain ecosystem has unquestionably changed how current technology and business processes are planned. Blockchain technology promised dramatic changes in data integrity, transparency, and peer-to-peer interactions because it was based on cryptographic principles and decentralised ideals. 

Its potential capabilities and the real-world difficulties associated with its execution, however, are in tension, as is the case with many innovative technologies. Blockchain Fatigue is a phenomena that the business community is coming to understand more and more as a result of this divergence. 

Defining blockchain fatigue 

At its core, Blockchain Fatigue is characterised by a mounting sense of disappointment among participants, including developers, financiers, and institutions. The market was overrun with several initiatives, many of which fell short of their lofty expectations, which is the main cause of the problem. 

Early adopters' and enthusiasts' aspirations frequently outweighed the difficulties of implementing blockchain solutions, resulting in projects that were either launched too soon or had serious flaws. 

In addition to the market's simple saturation, the reduction in investments, potential users' fading interest, and a discernible change from enthusiasm to scepticism are all contributing factors to the fatigue. This feeling manifests in practical ways; it is not only an abstract observation. 

This fatigue can be observed in the slowdown of new blockchain projects, investors' cautious attitude, and organisations' overall reluctance to use blockchain technologies. 

Key factors contributing to blockchain fatigue 

Understanding the dynamics of the blockchain sector requires a closer look at the particular factors that have led to Blockchain Fatigue. Despite their diversity, these elements combine to create a complex web of difficulties for stakeholders. 

Technology complexity: Blockchain is a complex system by its own nature. While promising flexibility and security, its decentralised nature also creates challenges, particularly when combining with currently in place centralised systems. The difficulty for organisations is not just in comprehending blockchain, but also in successfully using it in ways that are smooth, effective, and profitable. 

Unreal expectations: Inflated expectations accompanied the initial wave of interest in blockchain. Several projects had lofty goals in their marketing materials, but they lacked the solid foundation or well-defined plans to carry them out. Such overpromising has not only resulted in unsuccessful implementations but has also damaged confidence in the technology's true capabilities.

Financial Strains: Blockchain implementation needs a large financial investment for both the initial development and ongoing maintenance. Financial strain increased as investment returns started to decline as a result of the aforementioned difficulties. Maintaining operations amidst dimming financial prospects has been a challenging undertaking for startups and even established businesses. 

Overcoming challenges

The blockchain ecosystem's players must develop comprehensive strategies to revitalise the ecosystem rather than just reacting when challenges mount. This calls for a combination of reality, ongoing education, cooperation, and support for regulatory coherence. 

Setting realistic goals: In a time where high claims abound, it is crucial to get back to the fundamentals. This entails organising blockchain initiatives around specific, attainable goals. Projects can maintain their credibility and guarantee steady progress by concentrating on concrete results rather than lofty ambitions. 

Continuous learning and skill development: The dynamic nature of blockchain necessitates that professionals be lifelong learners. To stay current with technological changes, regular training sessions, workshops, and certifications are necessary. Professionals that possess up-to-date information can reduce difficulties and develop novel solutions. 

Collaboration: In the blockchain community, the adage "United we stand, divided we fall" has special meaning. Organisations can employ common resources and expertise through partnering with peers, joining consortiums, and forging partnerships. Such synergies not only encourage creativity but also reduce risks, increasing the likelihood that a project will succeed.

The Role of Cryptography in Data Safety

 

By using codes, the information security strategy of cryptography shields business data and communications from online threats. Security professionals describe it as the art of concealing information to guard against unauthorised access to your data. 

This technique employs mathematical principles and a series of calculations based on rules, known as algorithms, to alter messages in ways that are challenging to understand. It also refers to secure information and communication systems. 

Then, these algorithms are applied to the creation of cryptographic keys, digital signing, data privacy protection, internet browsing, and private email and credit card transactions. Confidentiality, integrity, authentication, and non-repudiation are only a few of the information security-related goals that are met by cryptography. In this article, we analyse what this tell us regarding cryptography. 

Safeguards data privacy 

In terms of cryptography, privacy is of utmost importance. It indicates that the transmitted information is secure from unauthorised access at all points in its lifetime and can only be accessed by those with the proper authorization. 

The privacy of individuals whose personal information is held in enterprise systems must be protected, which calls for confidentiality. Therefore, the only way to guarantee that the data is secure while it is being stored and delivered is through encryption. 

Without the proper decryption keys, encrypted data is practically useless to unauthorised individuals even when the transmission or storage media has been compromised. 

Data's integrity is ensured 

Integrity in the context of security refers to the accuracy of information systems and the data they include. Integrity refers to the ability of a system to transport and process data in a predictable manner. 

The data is unchanged even after processing. Data integrity is guaranteed by cryptography employing message digests and hashing techniques. 

The receiver is made certain that the data received has not been tampered with during transmission by supplying codes and digital keys to confirm that what is received is authentic and comes from the intended sender. 

Maintain information security using effective cryptography techniques

One of the primary concerns for firms trying to compete in the modern business environment is information security. Cryptography can help you protect your intellectual property by keeping it safe from hackers and other threat actors when used properly. 

You can also investigate additional techniques, such as online application penetration testing, internal network penetration testing, or cybersecurity awareness training, in the meantime and take preventative measures to safeguard important company resources.

Is Data Safeguarded by an Encrypted Email Service?

Email is the primary form of communication in both our personal and professional lives. Users might be surprised to hear that email was never intended to be secure due to our dependency on it. Email communication carries some risks, but you may still take precautions to protect your inbox. 

What is encryption in email?

One of the most important applications for practically any organization nowadays is email. Additionally, it's among the primary methods for malware to infect businesses.

Email encryption is the process of encrypting email communications to prevent recipients other than the intended ones from seeing the content. Authentication may be included in email encryption.

Email is vulnerable to data exposure since it is usually sent in clear text rather than encryption. Users beyond the intended receivers can read the email's contents using tools like public-key cryptography. Users can issue a public key that others can use to encrypt emails sent to them, while still holding a private key that they can use to decrypt those emails or to electronically encrypt and verify messages they send.

Impacts of an Encrypted Email Service

1. Safeguards Private Data 

It is crucial to ensure that only intended recipients view the material sent via email as it frequently contains sensitive data and business secrets. It is also vital that cyber criminals are unable to decrypt the data being transmitted between people. 

Services for encrypted email are created in a way that protects user privacy rather than invading it. Not simply because they are run by very small teams, but also because their platforms were created with security in mind, encrypted email services are intrinsically more secure. To begin with, the majority employ zero-access encryption, which ensures that only the user has access to confidential data.

2. Cost-effective 

It is not necessary to buy additional hardware whenever the server which hosts the email service currently includes encryption. Many firms have invested in their own servers although it might not be essential.  A reliable third-party service is substantially less expensive.

3. Barrier Against Government Monitoring 

One can learn everything you need to know about Gmail and Yahoo from the fact that no major whistleblower, activist, dissident, or investigative reporter trusts them to transmit sensitive information, at least in terms of government surveillance. Google, for instance, makes it very plain on its official website that it reserves the right to accede to requests from the government and provide useful information.ProtonMail is founded in Switzerland, a country with some of the world's strongest privacy rules.

4. Prevents Spam

Spam attachments frequently contain malware, ensuring that hackers gain access. When you or another person uses encrypted email to deliver attachments, the email includes a digital signature to verify its authenticity. No individual will accept spoofed emails this way. 

Establish strong digital practices to prevent exposing oneself vulnerable. Update your hardware and software. We must improve internet security measures as our reliance on technology increases. Services for secure, encrypted email provide everything that caters to your privacy needs. 

OTPs: Researchers Rekindle One-Time Program Cryptographic Concept


Technological advances over the past decade have made it possible for academics to make progress in designing so-called OTP (one-time programs). OTPs were initially proposed by researchers Goldwasser, Kalai, and Rothblum. 

OTPs, originally presented at the Crypto’08 conference were described as a type of cryptographically obfuscated computer program that can only be run once. This significant property makes them useful for numerous applications. 

The basic concept is that "Alice" could send "Bob" a computer program that was encrypted in a way that: 

1. Bob can run the program on any computer with any valid inputs and obtain a correct result. Bob cannot rerun the program with different inputs. 

2. Bob can learn nothing about the secret program by running it. 

The run-only-once requirements encounter difficulties because it would be an easier task to install a run-once-only program on multiple virtual machines, trying different inputs on each one of them. Consequently, this would violate the entire premise of the technology. 

The original idea for thwarting this (fairly obvious) hack was to only allow the secret program to run if accompanied by a physical token that somehow enforced the one-time rule for running the copy of the secret program that Alice had sent to Bob. No such tokens were ever made, so the whole idea has lain dormant for more than a decade.  

OTP revived: 

Recently, a team of computer scientists from Johns Hopkins University and NTT Research have established the basis of how it might be possible to create one-time programs using a combination of the functionality found in the chips found in mobile phones and cloud-based services. 

They have hacked ‘counter lockbox’ technology and utilized the same for an unintended purpose. Counter lockboxes secure an encryption key under a user-specified password, administering a limited number of incorrect password guesses (usually 10) before having the protected information erased. 

The hardware security module in iPhones or Android smartphones provides the needed base functionality, but it needs to be wrapped around technology that prevents Bob from attempting to deceive the system – the focus of the research. 

Garbled circuits: 

The research works show how multiple counter lockboxes might be linked together in order to form ‘garbled circuits’, i.e. a construction that might be utilized to build OTPs. 

A paper illustrating this research, entitled ‘One-Time Programs from Commodity Hardware’ is due to be presented at the upcoming Theory of Cryptography Conference (TCC 2022). 

Hardware-route discounted: 

One alternative means of constructing one-time programs, considered in the research, is using tamper-proof hardware, although it would require a “token with a very powerful and expensive (not to mention complex) general-purpose CPU”, as explained in a blog post by cryptographer Mathew, a professor at Johns Hopkins University and one of the co-authors of the paper. 

“This would be costly and worse, [and] would embed a large attack software and hardware attack surface – something we have learned a lot about recently thanks to Intel’s SGX, which keeps getting broken by researchers,” explains Green. 

Rather than relying on hardware or the potential use of blockchain plus cryptographic tool-based technology, the Johns Hopkins’ researchers have built a form of memory device or token that spits out and erases secret keys when asked. It takes hundreds of lockboxes to make this construction – at least 256 for a 128-bit secret, a major drawback that the researchers are yet to overcome. 

A bastion against brute-force attacks: 

Harry Eldridge, from Johns Hopkins University, lead author of the paper, told The Daily Swig that one-time programs could have multiple uses. 

“The clearest application of a one-time program (OTP) is preventing brute-force attacks against passwords […] For example, rather than send someone an encrypted file, you could send them an OTP that outputs the file if given the correct password. Then, the person on the other end can input their password to the OTP and retrieve the file.” Eldridge explained. “However, because of the one-time property of the OTP, a malicious actor only gets one chance to guess the password before being locked out forever, meaning that much weaker passwords [such as a four-digit PIN] can actually be pretty secure.”

Furthermore, this could as well be applied to other forms of authentication – for instance, if you wanted to protect a file using some sort of biometric match like a fingerprint or face scan. 

‘Autonomous’ Ransomware Risk

One of the drawbacks led via the approach is that threat actors might utilize the technique to develop ‘autonomous’ ransomware. 

“Typically, ransomware needs to ‘phone home’ somehow in order to fetch the decryption keys after the bounty has been paid, which adds an element of danger to the group perpetrating the attack,” according to Eldridge. “If they were able to use one-time programs, however, they could include with the ransomware an OTP that outputs the decryption keys when given proof that an amount of bitcoin has been paid to a certain address, completely removing the need to phone home at all.” 

Although, the feedback on the work so far has been “generally positive”, according to Eldridge. “[Most agree] with the motivation that OTPs are an interesting but mostly unrealized cryptographic idea, with the most common criticism being that the number of lockboxes required by our construction is still rather high. There is possibly a way to more cleverly use lockboxes that would allow for fewer of them to be used.” 

Post-quantum Cryptography Achieves Standardization Milestone

 

The first four standardised protocols for post-quantum cryptography have been released, providing the foundation for the creation of "future-proof" apps and web services. 

Last Monday, the US federal government's National Institute of Standards and Technology (NIST) announced a quartet of recommended protocols as part of a continuing standardisation process. The chosen encryption algorithms will be included in NIST's post-quantum cryptography standard, which is scheduled to be completed within the next two years. 

Four more algorithms are currently being considered for inclusion in the standard. According to NIST, for most use cases, two basic algorithms should be implemented: CRYSTALS-KYBER (key-establishment) and CRYSTALS-Dilithium (digital signatures). 

In the event that one or more approaches prove insecure, more than one algorithm for each use case is being sought as a backup. NIST recommends CRYSTALS-Dilithium as the principal method for digital signatures, with FALCON for applications that require smaller signatures than Dilithium can offer. SPHINCS, a third algorithm, is slower than the other two but was approved since it is based on a distinct mathematical process and so gives a possibility to increase variety. Dustin Moody of NIST discussed why another round of selection was required.

“Of the four algorithms we selected, one is for encryption and three are for digital signatures,” Moody told The Daily Swig. 

“Of the four algorithms that we will continue to study in the fourth round, all four are encryption algorithms. The primary motivation for this is to find a non-lattice-based signature scheme which is suitable for general purpose use to be a backup for our lattice-based signature algorithms we are standardizing (Dilithium and Falcon),” Moody added. 

He continued: “Our current NIST public-key standards cover encryption and signatures. So that is what our standardization process was targeted for – to replace the vulnerable cryptosystems in those standards. Other functionalities may be considered in the future.” 

The ongoing quest for next-generation cryptographic systems is required since present encryption protocols, such as RSA, rely on solving mathematical problems that are beyond the capabilities of even the most powerful conventional computers. Sufficiently powerful quantum computers, which operate on a fundamentally different paradigm than today's PCs or servers, may be capable of cracking today's public key encryption techniques. Increasing the key length alone will not suffice to counter this possible danger, necessitating the creation of post-quantum cryptography methods. 

Decrypt later, store now

Despite the fact that the present generation of quantum computers is mostly experimental and hampered by engineering hurdles, attackers may be planning for their future availability using "store-now-decrypt-later" assaults.If such attacks are effective, a rising volume of normally encrypted financial, government, commercial, and health-related data will be vulnerable to attack by suitably powerful quantum computers. 

Quantum computers handle computational tasks by relying on the features of quantum states, such as superposition, interference, or entanglement, rather than the basic binary states (0 or 1) of traditional computers. When paired with quantum algorithms, the technology might solve some mathematical problems, such as integer factorization, in a manageably short period, posing a danger to current encryption systems that rely on the current intractability of such issues. Quantum-resistant algorithms are based on arithmetic problems that both traditional and quantum computers should struggle to solve.

Half of Sites Still Using Legacy Crypto Keys

 

While the internet is growing more secure gene but slightly more than half of the websites' cryptographic keys are still generated using legacy encryption algorithms, as per the new research.

Security firm Venafi enlisted the assistance of renowned researcher Scott Helme to examine the world's top one million websites over the last 18 months. The TLS Crawler Report demonstrated some progress in a few areas. 

Nearly three-quarters of websites (72 per cent) now actively redirect traffic to HTTPS, a 15 per cent increase since March 2020. Even better, more than half of the HTTPS sites evaluated are using TLSv1.3, the most recent version of TLS. It has now surpassed TLSv1.2 as the most widely used protocol version. 

Furthermore, nearly one in five of the top one million websites now use the more secure HSTS (HTTP Strict Transport Security), which increased 44 per cent since March 2020. Even better, in the last six years of monitoring, the number of top one million sites using EV certificates has dropped to its lowest level ever. These are known for their slow, manual approval processes, which cause end users too much discomfort. 

Let's Encrypt, on the other hand, is now the most popular Certificate Authority for TLS certificates, with 28 per cent of sites using it. There is, however, still more to be done. 

According to the report, approximately 51% of sites still produce authentication keys using legacy RSA encryption techniques. These, along with TLS, help to verify and secure connections between physical, virtual, and IoT devices, APIs, applications, and clusters. 

ECDSA, a public key cryptography encryption technique with increased computational complexity and smaller authorization keys, is a far more secure alternative to RSA. As per Venafi, this implies they require less bandwidth to establish an SSL/TLS connection, making them perfect for mobile apps and IoT and embedded device support. 

Helme explained, "I would have expected that the rise in adoption of TLSv1.3 usage would have driving the ECDSA numbers up much more. One of the main reasons to keep RSA around for authentication is legacy clients that don't support ECDSA yet, but that seems at odds with the huge rise in TLSv1.3 which isn't supported by legacy clients. We also continue to see the use of RSA 3072 and RSA 4096 in numbers that are concerning.” 

“If you're using larger RSA keys for security reasons then you should absolutely be on ECDSA already which is a stronger key algorithm and offers better performance. My gut feeling here is that there's a lot of legacy stuff out there or site operators just haven't realized the advantages of switching over to ECDSA.”

Researchers Detail the New Two-Step Cryptography Technique

 

The accessibility of computer system resources on-demand, in particular data storage and computational power, without direct active user management is cloud computing. The terminology is commonly used to characterize data centers for several Internet users. Cloud computing has as its primary objective the provision of rapid, simple, cost-effective computing and data stocking services. The cloud environment, however, presents data privacy problems. 

The key method used to strengthen cloud computing security is cryptography. By encrypting the saved or sent data, this mathematical technique protects it, so that only the intended recipient can understand it. Although various encryption techniques exist, though none are properly secured and new technologies are still being sought so that the increasing risks to privacy and security in data are countered. 

With all that in mind, the most important question that arises is “How the two-step cryptography technique works?” 

A group of researchers from Indian and Yemen described the revolutionary two-step cryptographic method – the first to combine genetic technologies with mathematical techniques. This explanatory study by the researchers is published in the International Journal of Intelligent Networks in KeAi. As per the writers of the report, a highly secure and flexible encrypted environment can be created which could trigger a paradigm shift in data secrecy. 

The paper’s corresponding author, Fursan Thabit of Swami Raman and Teerth Marathwada University in India, explains: “Some existing famous ciphers use the Feistel structure for encryption and decryption. Others use the Network SP (Substitution-Permutation). The first level of our encryption uses a logical-mathematical function inspired by a combination of the two. Not only does it improve the complexity of the encryption, but it also increases energy efficiency by reducing the number of encryption rounds required.” 

The second encryption layer by the researcher is influenced by genetic technological structures based on the Central Dogma of Molecular Biology (CDMB). It models the actual genetic code operations (binary to DNA base translations), transcription (DNA to mRNA regeneration), and translation (regeneration from mRNA to protein). 

They are the first to integrate the concepts of DNA, RNA, and genetic engineering for cryptographic matters and the first to merge the genetic encrypting process with mathematics to create a complex key. 

By evaluating the encrypting time, decryption time, output, and length of the ciphertexts produced, the researchers have assessed their novel algorithm robustness. They observed that their suggested algorithm has great safety strength and is extremely versatile compared with several other genetic encryption approaches and existing symmetric key encryption techniques. It takes less time than most other procedures as well. 

However, the algorithm's obvious structure – two layers of encryption that only incorporates four coding rounds - reduces the complexity of computing and processing strength. 

Thabit explains: “That clear structure means each round requires only simple math and a genetics simulation process.”