cryptography

A Novel Visual Cryptography Coding System for Jam Resistant Communications




cryptography

Medical Image Security Using Quantum Cryptography

Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched.




cryptography

New Cryptography Must Be Developed and Deployed Now, Even Though A Quantum Computer That Could Compromise Today’s Cryptography Is Likely At Least A Decade Away, Says New Report

Given the current state of quantum computing and the significant challenges that still need to be overcome, it is highly unlikely that a quantum computer that can compromise public-key cryptography – a basis for the security of most of today’s computers and networks – will be built within the next decade, says a new report by the National Academies of Sciences, Engineering, and Medicine.




cryptography

ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography

ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography

Sophia Antipolis, 6 October 2021

In 2016 the US National Institute of Standards and Technology (NIST) announced their intention to develop new standards for post-quantum cryptography. They subsequently initiated a competition-like standardization process with a call for proposals for quantum-safe digital signatures, public-key encryption schemes, and key encapsulation mechanisms. NIST have stated that they intend to select quantum-safe schemes for standardization at the end of the current, third round of evaluation.

Read More...




cryptography

ETSI Quantum-Safe Cryptography event: a success 10 years later!

Sophia Antipolis, 16 February 2023

The 9th face-to-face ETSI-IQC Quantum-Safe Cryptography event this week attracted a large audience of nearly 200 people from Europe, North America and Asia, bringing together industry, academia and government. The event was kicked off by ETSI Director-General Luis Jorge Romero, who gave an overview of the quantum-safe standardization journey since the first workshop in 2013 and reiterated ETSI’s continued support for this important global effort.

Read More...




cryptography

Preparing for a secure future: industry and business share plans for quantum era at 10th ETSI/IQC Quantum-Safe Cryptography Conference

Sophia Antipolis, 24 May 2024

Speakers at the 10th ETSI/IQC Quantum Safe Cryptography Conference have called on organizations to prepare their cybersecurity infrastructures to address the challenges of a post-quantum world.

Organized by ETSI and the Institute for Quantum Computing, this year’s conference was hosted from 14-16 May by the Centre for Quantum Technologies (CQT), National University of Singapore (NUS), in partnership with the Infocomm Media Development Authority (IMDA) and the Cyber Security Agency (CSA) of Singapore. The event attracted an impressive 235 onsite delegates from 27 countries, reflecting fast-growing interest worldwide in the critical importance of quantum-safe cryptography in today’s cybersecurity strategies.

Read More...




cryptography

Episode 439: JP Aumasson on Cryptography

JP Aumasson, author of Serious Cryptography, discusses cryptography, specifically how encryption and hashing work and underpin many security functions.




cryptography

SE Radio 578: Ori Mankali on Secrets Management using Distributed Fragments Cryptography

In this episode, Ori Mankali, senior VP of engineering at cloud security startup Akeyless, speaks with SE Radio’s Nikhil Krishna about secrets management and the innovative use of distributed fragment cryptography (DFC). In the context of enterprise IT, 'secrets’ are crucial for authentication in providing access to internal applications and services. Ori describes the unique challenges of managing these sensitive data, particularly given the complexities of doing so on a large scale in substantial organizations. They discuss the necessity for a secure system for managing secrets, highlighting key features such as access policies, audit capabilities, and visualization tools. Ori introduces the concept of distributed fragment cryptography, which boosts security by ensuring that the entire secret is never known to any single entity. The episode explores encryption and decryption and the importance of key rotation, as they consider the challenges and potential solutions in secrets management.





cryptography

Here’s the paper no one read before declaring the demise of modern cryptography

The advance was incremental at best. So why did so many think it was a breakthrough?




cryptography

NIST Issues Post Quantum Cryptography Standards and Calls for their Adoption

After much anticipation, the National Institute of Standards and Technology (NIST) issued its first Post Quantum Cryptography (PQC) standards today. They are intended to defeat efforts by quantum computers powerful […]

The post NIST Issues Post Quantum Cryptography Standards and Calls for their Adoption appeared first on HPCwire.




cryptography

New Cryptography Must Be Developed and Deployed Now, Even Though A Quantum Computer That Could Compromise Today’s Cryptography Is Likely At Least A Decade Away, Says New Report

Given the current state of quantum computing and the significant challenges that still need to be overcome, it is highly unlikely that a quantum computer that can compromise public-key cryptography – a basis for the security of most of today’s computers and networks – will be built within the next decade, says a new report by the National Academies of Sciences, Engineering, and Medicine.




cryptography

RSA BSAFE Crypto-J Cryptography Failure

RSA BSAFE Crypto-J versions prior to 6.2.2 suffer from improper OCSP validation and PKCS#12 timing attack vulnerabilities.




cryptography

Hub Security raises $5M Series A for its cryptography platform

Hub Security, a Tel Aviv-based startup that developed a software and hardware platform for cryptographic operations, today announced that it has raised a $5 million Series A round led by AXA Ventures. Crowdfunding platform OurCrowd also participated in this round. Like most companies at the Series A stage, the company plans to use the investment […]




cryptography

Cryptography and coding : 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, proceedings [Electronic book] / Martin Albrecht (eds.).

Cham, Switzerland : Springer, 2019.




cryptography

Encyclopedia of cryptography and security [electronic resource] / editor-in-chief, Henk C.A. van Tilborg

New York : Springer, 2005




cryptography

Security solutions and applied cryptography in smart grid communications / [edited by] Mohamed Amine Ferrag (Guelma University, Algeria), Ahmed Ahmim (University of Larbi Tebessi, Algeria)




cryptography

Discrete mathematics : graph algorithms, algebraic structures, coding theory, and cryptography / R. Balakrishnan, Sriraman Sridharan

Sridharan, Sriraman, author




cryptography

Cryptography arithmetic: algorithms and hardware architectures / Amos R. Omondi

Online Resource




cryptography

Science Podcast - Quantum cryptography, salt's role in ecosystems, and a rundown of stories from our daily news site (31 Jan 2014)

Should we worry more about quantum decryption in the future or the past, how salt's role as a micronutrient may effect the global carbon cycle, and a daily news roundup.




cryptography

Cryptography and coding [electronic resource] : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings / Nigel P. Smart (ed.)

Berlin : Springer, [2005]




cryptography

Cryptography and coding [electronic resource] : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings / Steven D. Galbraith (ed.)

Berlin ; New York : Springer, [2007]




cryptography

Embedded cryptography