ForgotPassword?
Sign Up
Search this Topic:
Posts: 27156
Aug 27 15 9:15 PM
Experts at the National Security Agency are deeply worried that the current security cryptography used to protect almost all electronic data over the past 50 years will easily be unravelled by hackers once quantum computers become a reality.Public-key cryptography systems are currently used to protect everything from emails to online payment transactions, as well as confidential health and financial records. These systems offer end-to-end encryption using two separate keys, one private and one public, that are linked mathematically by complex algorithms that are difficult for computers today to solve.Although quantum computers are still only a concept, many computer scientists believe that the super-powerful computers will be available within the next 50 years, and that they will be able to solve extremely large numbers quickly, such as seen in recent demonstrations of Shor's algorithm.Since complex mathematical problems like integer factorisation, discrete logarithm mod primes and elliptic curve discrete logs are essential to public key encryption systems, quantum computing puts them at risk.Focus on quantum-resistant encryptionThe NSA, which developed the Digital Signature Algorithm (DSA) standard in the 1970s, has long been advising US firms and agencies to use Suite B cryptographic algorithms, which include 3072 bit RSA encryption, Advanced Encryption Standard (AES) 256 bit keys and Elliptic Curve P-384 to secure their computer systems.However, now the NSA is advising companies and government agencies that haven't yet invested in these protections to consider focusing instead on quantum-resistant algorithms. "Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, which has made it clear that elliptic curve cryptography is not the long-term solution many once hoped it would be. Thus, we have been obligated to update our strategy," the NSA said in its release."It is important to note that we aren't asking vendors to stop implementing the Suite B algorithms and we aren't asking our national security customers to stop using these algorithms. Rather, we want to give more flexibility to vendors and our customers in the present as we prepare for a quantum safe future."NSA seriously worried about quantum computersThe NSA states that companies, particularly those using layered commercial solutions to protect classified national security information, should start implementing key agreement schemes that use large symmetric pre-shared keys – currently the only way to make confidential information quantum-resistant.Of course, the NSA's reputation hasn't been great with the public since Edward Snowden's revelations, and even before that, the US agency alienated cryptographers when it was discovered in 2013 that its Dual_EC_DRBG standard contained a backdoor allowing NSA to decrypt data.And yet, the NSA seems to be genuinely worried about what quantum computers could do in the wrong hands. "Our ultimate goal is to provide cost effective security against a potential quantum computer," stressed the NSA."We are working with partners across the USG, vendors, and standards bodies to ensure there is a clear plan for getting a new suite of algorithms that are developed in an open and transparent manner that will form the foundation of our next Suite of cryptographic algorithms."
Experts at the National Security Agency are deeply worried that the current security cryptography used to protect almost all electronic data over the past 50 years will easily be unravelled by hackers once quantum computers become a reality.
Public-key cryptography systems are currently used to protect everything from emails to online payment transactions, as well as confidential health and financial records. These systems offer end-to-end encryption using two separate keys, one private and one public, that are linked mathematically by complex algorithms that are difficult for computers today to solve.
Although quantum computers are still only a concept, many computer scientists believe that the super-powerful computers will be available within the next 50 years, and that they will be able to solve extremely large numbers quickly, such as seen in recent demonstrations of Shor's algorithm.
Since complex mathematical problems like integer factorisation, discrete logarithm mod primes and elliptic curve discrete logs are essential to public key encryption systems, quantum computing puts them at risk.
The NSA, which developed the Digital Signature Algorithm (DSA) standard in the 1970s, has long been advising US firms and agencies to use Suite B cryptographic algorithms, which include 3072 bit RSA encryption, Advanced Encryption Standard (AES) 256 bit keys and Elliptic Curve P-384 to secure their computer systems.
However, now the NSA is advising companies and government agencies that haven't yet invested in these protections to consider focusing instead on quantum-resistant algorithms. "Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, which has made it clear that elliptic curve cryptography is not the long-term solution many once hoped it would be. Thus, we have been obligated to update our strategy," the NSA said in its release.
"It is important to note that we aren't asking vendors to stop implementing the Suite B algorithms and we aren't asking our national security customers to stop using these algorithms. Rather, we want to give more flexibility to vendors and our customers in the present as we prepare for a quantum safe future."
The NSA states that companies, particularly those using layered commercial solutions to protect classified national security information, should start implementing key agreement schemes that use large symmetric pre-shared keys – currently the only way to make confidential information quantum-resistant.
Of course, the NSA's reputation hasn't been great with the public since Edward Snowden's revelations, and even before that, the US agency alienated cryptographers when it was discovered in 2013 that its Dual_EC_DRBG standard contained a backdoor allowing NSA to decrypt data.
And yet, the NSA seems to be genuinely worried about what quantum computers could do in the wrong hands. "Our ultimate goal is to provide cost effective security against a potential quantum computer," stressed the NSA.
"We are working with partners across the USG, vendors, and standards bodies to ensure there is a clear plan for getting a new suite of algorithms that are developed in an open and transparent manner that will form the foundation of our next Suite of cryptographic algorithms."
Read more @ http://www.ibtimes.co.uk/nsa-worried-that-quantum-computing-will-foil-cryptography-protecting-all-data-date-1516795
Microsoft is pushing KB3075249 and KB3080149 updates for Windows 7/8/8.1 users which can spy on you Windows 10 has been launched and already installed by more than 50 million users worldwide. It is now a known fact that Windows 10 user data is being reported back to Microsoft servers back in Redmond. The jury is still out whether this a good or bad practice but many of Windows 10 Apps like Cortana depend on getting your preferences correct to serve you better. This being the case, many Windows users who are not happy with Windows 10 spying ways and have preferred to stay on with Windows 7/Windows 8 and Window 8.1 as the case might be. For these Windows 7/8/8.1 users there are a few updates which Microsoft has been pushing through last few days. Namely, KB3075249 and KB3080149, if installed are known to report your data back to Microsoft servers. KB3075249 update adds telemetry points to consent.exe in Windows 8.1 and Windows 7. The Microsoft support page gives following description for them : KB3075249 “Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7 ” http://support.microsoft.com/kb/3075249 KB3080149 “This update aligns down-level devices on the same UTC binary that’s released in Windows 10. This update would enable all the down-level devices to receive the software updates, design updates, and additional power and performance tuning.” http://support.microsoft.com/kb/3080149 In simple words, both these updates, if downloaded and installed will snoop on you and report back certain data to the Microsoft servers.
Windows 10 has been launched and already installed by more than 50 million users worldwide. It is now a known fact that Windows 10 user data is being reported back to Microsoft servers back in Redmond. The jury is still out whether this a good or bad practice but many of Windows 10 Apps like Cortana depend on getting your preferences correct to serve you better.
This being the case, many Windows users who are not happy with Windows 10 spying ways and have preferred to stay on with Windows 7/Windows 8 and Window 8.1 as the case might be. For these Windows 7/8/8.1 users there are a few updates which Microsoft has been pushing through last few days.
Namely, KB3075249 and KB3080149, if installed are known to report your data back to Microsoft servers.
KB3075249 update adds telemetry points to consent.exe in Windows 8.1 and Windows 7. The Microsoft support page gives following description for them :
KB3075249 “Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7 ” http://support.microsoft.com/kb/3075249
KB3080149 “This update aligns down-level devices on the same UTC binary that’s released in Windows 10. This update would enable all the down-level devices to receive the software updates, design updates, and additional power and performance tuning.” http://support.microsoft.com/kb/3080149
In simple words, both these updates, if downloaded and installed will snoop on you and report back certain data to the Microsoft servers.
Read more @ http://www.techworm.net/2015/08/new-windows-788-1-updates-spy-on-you-just-like-windows-10.html
"What lies behind us and what lies before us are small matters compared to what lies within us." ~ Ralph Waldo Emerson ~
Interact