Guarding data with multi-party computation

The progress from on-premise to the cloud was supposed to keep sensitive data safe by storing it off site. However, businesses are now uncovering that the cloud isn’t as secure as they were led to believe. This is why many organizations have turned to encryption to help secure their data but this method is only able to secure data while it is in transit or while it’s at rest.

Image Credit: Pixabay

On one hand, placing your security in the hands of a professional cloud provider will expand your security in some respects. You have access to economies of scale in security infrastructure and expertise, which most companies can only dream about. On the other hand, you are placing your data in other companies’ computers, and perhaps in another country. This leads to potential security and legal problems.

Read more here:

Technologies That Could Generate Trillion Dollar Markets Over the Next Decade

Backtrack to the typical household in 1950, and you would see much that you would recognize: washing machines, vacuum cleaners, cars, TVs. But go back 50 years earlier, to 1900, and most of us would find a world that was utterly foreign, and exhausting. 

Photograph by Mario Tama/Getty Images

This present day, we’re on the edge of two architectures that can fill the gap. The first is quantum computing, which uses subatomic effects to create almost unimaginably large computing spaces. The second, called neuromorphic computing, mimics the design of the human brain.

Read more here:

NIST Release Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms

NIST certifies a new encryption standard based on a competition. This competition has multiple rounds where a list of candidates is created, then narrowed based on rounds of public comment and a board of experts who eliminate slower or less safe solutions. It also released their list of round-2 algorithms for Asymmetric and Hash functions that will replace RSA, Diffie-Hellman, or Elliptic Curve Diffie-Hellman, and SHA2 or SHA3.

The National Institute for Standards and Technology (NIST) has announced the round 2 candidates for post-quantum cryptography.

Now we talk about each of the candidates for asymmetric algorithms, which are used in establishing a secure connection between a client and server. Today, asymmetric handshakes are slow and asymmetric encryption is not used for doing anything but passing a secret value between a client and server. Once the shared secret value is passed, the connection switches to a much faster symmetric cipher like AES or ChaCha.

Read more here:

Quantum Computing Will Transform: From Qubits to Quantum Accelerators

Quantum computers will transform the way current computer machines work and will open a completely new paradigm of computation. By exploiting quantum phenomena, these computers will be able to solve problems that are currently intractable even for the most powerful supercomputers.

In this video from the HiPEAC 2019, Koen Bertels from Delft University of Technology introduces the audience to quantum computing, explaining the potential power of quantum and delving into the quantum computing stack developed at Delft.

Since 1982, when Richard Feyman formulated the idea of a quantum computer, a lot of progress has been made. However, we are not yet at the commercial application of such computing systems. Currently, several research groups and also some companies such as IBM, Microsoft, Intel, Alibaba and Google are very active in this domain and are in the race for achieving ‘quantum supremacy’, when quantum computers outperform classical ones. On top of that, I believe that quantum computers will be on the market like accelerator technologies, just like GPUs and FPGAs currently are.

Research Engineers develop room temperature, two-dimensional platform for quantum technology

Quantum computers promise to be a revolutionary technology because their elementary building blocks, qubits, can hold more information than the binary, 0-or-1 bits of classical computers. But to control this potential, hardware must be developed that can access, measure and manipulate individual quantum states.

Researchers at the University of Pennsylvania’s School of Engineering and Applied Science have now demonstrated a new hardware platform based on isolated electron spins in a two-dimensional material. The electrons are trapped by defects in sheets of hexagonal boron nitride, a one-atom-thick semiconductor material, and the researchers were able to optically detect the system’s quantum states. Credit: Ann Sizemore Blevins

Researchers at the University of Pennsylvania’s School of Engineering and Applied Science have now demonstrated a new hardware platform based on isolated electron spins in a two-dimensional material. The electrons are trapped by defects in sheets of hexagonal boron nitride, a one-atom-thick semiconductor material, and the researchers were able to optically detect the system’s quantum states.

Read more at:

Global quantum cryptography is set to fuel the growth of the security solutions segment with a CAGR of 37.9%

The global quantum cryptography market is expected to get bigger from USD 101 million in 2018 to USD 506 million by 2023, at a Compound Annual Growth Rate (CAGR) of 37.9% during the forecast period.

Attractive Opportunities in the Quantum Cryptography Market

Major heightening factors for the market include the growing incidents of cyber-attacks in the era of digitalization, increasing cybersecurity funding, rising demand of next-generation security solutions for cloud and IoT technologies, and evolving next-generation wireless network technologies. However, lack of expertise and high implementation cost could restrain the market growth.

Read more here:

Life on the edge in the quantum world with an electric circuit called the Transmon

Quantum physics sets the laws that dominate the universe at the very small scale. The ability to harness quantum phenomena will hopefully allow us to build machines like quantum computers, which are predicted to perform certain calculations much faster than conventional computers.

Superconducting circuits comprising a transmon device can be used for quantum state control. CREDIT Image by Dong Lan and Sorin Paraoanu

One big problem with building quantum processors is that the ability to track and control quantum systems in real-time is an overwhelmingly fragile task: if we try to manipulate these systems carelessly, significant errors get introduced in the final result.

Read the full article here:

A Guide to Post-Quantum Cryptography by Trail of Bits

Post-quantum cryptography is the study of hashtag#cryptosystems which can be run on a classical computer, but are secure even if an adversary possesses a quantum computer.

Here’s a great introduction blog post to post quantum cryptography!

In that blog, you’ll be introduced to the quantum computing primer and the different types of post quantum primitives.

Special thanks to Trail of Bits for this excellent introduction!