Tag Archive for: algorithms

US Government Picks Quantum-Resistant Encryption Algorithms


Cyberwarfare / Nation-State Attacks
,
Encryption & Key Management
,
Fraud Management & Cybercrime

Quantum Computers That Use Atom-Level States of Uncertainty Are a Matter of Time

US Government Picks Quantum-Resistant Encryption Algorithms

The American government agency that’s also a global trendsetter for cryptographic standards today selected four algorithms designed to withstand a decryption attack mounted by a quantum computer.

See Also: Fireside Chat | Zero Tolerance: Controlling The Landscape Where You’ll Meet Your Adversaries

The selection caps a six-year effort initiated when the National Institute of Standards and Technology in 2016 solicited proposals for post-quantum computing encryption models.

The four algorithms will be a part of NIST’s post-quantum cryptographic standard, which the agency expects to finalize in about two years. Four additional algorithms remain under active consideration.

Superfast computers that use atom-level states of uncertainty are likely a matter of time, leading to worries that today’s encryption standards are destined for obsolescence. Some scientists predict a quantum computer by 2030 capable of breaking within hours the encryption of a 2,000-bit RSA key.

That poses problems for the future of online transactions, which depend on strong encryption to secure data such as financial information as it flows across the internet. It’s also a problem for national security, said Matt Scholl, chief of NIST’s Computer Security Division, in an earlier online Q&A.

Bank accounts will be safe at first, he said. But quantum computing fundamentally changes today’s cryptographic landscape in…

Source…

The NSA wants its algorithms to be a global IoT standard. But they’re simply not trusted

Nsa iot The NSA wants its algorithms to be a global IoT standard. But they're simply not trusted

Part of the concern is that the Simon and Speck algorithms might contain encryption backdoors that would be abused by US authorities.

Read more in my article on the Bitdefender Box blog.

Graham Cluley

Again, Algorithms Suck At Determining ‘Bad’ Content, Often To Hilarious Degrees

A few weeks back, Mike wrote a post detailing how absolutely shitty algorithms can be at determining what is “bad” or “offensive” or otherwise “undesirable” content. While his post detailed failings in algorithms judging such weighty content as war-crime investigations versus terrorist propaganda, and Nazi hate-speech versus legitimate news reporting, the central thesis in all of this is that relying on platforms to host our speech and content when those platforms employ very, very imperfect algorithms as gatekeepers is a terrible idea. And it leads to undesirable outcomes at levels far below those of Nazis and terrorism.

Take Supper Mario Broth, for instance. SMB is a site dedicated to fun and interesting information about Nintendo and its history. It’s a place that fans go to learn more weird and wonderful information about the gaming company they love. The site also has a Twitter account, which was recently flagged for posting the following tweet.

For the sin of tweeting that image out, the site’s entire account was flagged as “sensitive”, which means anyone visiting the account was greeted with a warning about how filthy it is. What Twitter’s systems thought was offensive about the image, which comes from another video from a costume company that works with Nintendo, is literally anyone’s guess. Nobody seems to be able to figure it out. My working theory is that the Princess Peach’s lips resemble too closely a more private part of the female anatomy and, when coupled with the flesh-colored face surrounding it sent Twitter’s algorithm screaming “Aaah! Vagina!” leading to the flagging of the account. But this is just a guess, because although the “sensitive” flag was eventually removed, SMB never got any response or explanation from Twitter at all.

SMB went as far as to test through dummy accounts whether the image was the entire problem. It was. After posting the image several times from other accounts, each account was flagged within minutes of the posting. It’s an algorithm doing this, in other words, and one which seems ill-suited to its task.

What we have here is two related problems. We have a company designed to let speakers speak employing an algorithm to flag offensive content, which it is doing very, very badly. We also have a company with a staff insufficiently capable to correct the errors of its incapable algorithm. This would be annoying in any context other than current reality, which sees rising calls for internet sites to automagically block “bad” content and do so with literally inhuman speed.

That means algorithms. But the algorithms can’t do the job. And with sites erring on the side of over-blocking to avoid scrutiny from both the public and governments, that means open communication is the loser in all of this. It’s hard to imagine an outcome more anathema to services like Twitter than that.

Permalink | Comments | Email This Story

Techdirt.

10 amazing algorithms

Figuring out mysteries
algorithms 1

Image by Flickr

Cyber technology couldn’t get by without algorithms to encrypt, analyze metadata and find traffic anomalies, but they are used more and more widely in other fields. Here are 10 algorithms that perform functions as varied as scanning for disease genes, catching classroom cheats and figuring out murder mysteries as well as Agatha Christie’s heroine Miss Marple.

To read this article in full or to leave a comment, please click here

Network World Tim Greene