Security News
Amid the COVID-19 crisis, the global market for quantum cryptography estimated at $93.1 million in the year 2020, is projected to reach a revised size of $291.9 million by 2026, growing at a CAGR of 20.8% over the analysis period, according to ResearchAndMarkets. The U.S. quantum cryptography market is estimated at $40.6M in 2021.
Quantum computing is poised to transform the industry over the next decade. As this technology advances over the next decade, quantum computing is expected to expose vulnerabilities in public-key cryptography encryption algorithms within seconds.
NSS can be used to develop security-enabled client and server apps with support for SSL v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and various other security standards. "Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted," Mozilla said in a security advisory issued today.
I have long been annoyed that the word “crypto” has been co-opted by the blockchain people, and no longer refers to “cryptography.” I’m not the only one.
While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security. In a recent study published in KeAi's International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique - the first to combine genetic technology with mathematical technique.
Qrypt announced the launch of its Cloud Entropy Portal. The Cloud Entropy Portal democratizes the availability of quantum safe random numbers for any application, especially cryptographic key generation.
Encryption and verification package Pretty Good Privacy has celebrated a troubled 30 years of securing secrets and giving cypherpunks an excuse to meet in person, with original developer and security specialist Phil Zimmermann toasting a world where encryption is common but, he warns, still under threat. Following the end of the criminal investigation into Zimmermann, the PGP team set up PGP Inc. which was quickly gobbled up by security specialist Network Associates Inc. in 1997.
From siloed to unified key management: Legacy key protection and management was comprised of different solutions for different environments and business problems. From disparate to integrated key management and key protection: Legacy key protection provides only basic management and dedicated key management solutions are often not integrated with key protection.
The Republic of Korea took two bold steps into the future on Tuesday, by announcing that the last of its 2G networks will go offline in June and that it will initiate large-scale adoption of communications protected by quantum encryption. The quantum tests will build on demos conducted in 2020, but this time South Korea's government hopes to involve multiple industries and to educate them on the benefits of the tech and how to adopt it.
From the dates and the title, the George Davida patent application which NSA unsuccesfully tried to block would have been US4202051A, for a key stream generator based on a LFSR combined with a non-linear feedback circuit. "In April 1978 a patent application made by Carl Nicolai for a speech scrambling device was evaluated by the NSA using Inman's new criteria. Once again, there was disagreement between NSA directorates. Neither Research and Engineering nor COMSEC believed that Nicolai's invention should be classified. Howard Rosenblum, DDC, noted that Nicolai employed"a sophisticated use of well-known, open-source techniques" of spread spectrum technology and that "so many unclassified spread spectrum systems are already in the public domain that it is too late to try to close the door by imposing secrecy orders based solely on the fact that the system uses spread spectrum techniques.