Quantum Computing Challenged By Security, Error Correction


The number and volume of warnings about a post-quantum cryptography (PQC) world are rising, as governments, banks, and other entities prepare for a rash of compromised data and untrustworthy digital signatures. Exactly when this will become a genuine threat is still somewhat fuzzy, because it depends on progress in developing robust qubits. A report by McKinsey & Co. estimates that by 20... » read more

Post Quantum Cryptography Is Coming


Quantum computing has made big advances in recent years and experts agree that quantum computers capable of breaking 2048-bit RSA or 256-bit ECC will be built — it’s just a matter of time. In this white paper, we discuss the security algorithms NIST has selected for Post Quantum Cryptography (PQC) and their instantiation in Rambus security products. Download this white paper to learn: ... » read more

The Great Quantum Computing Race


Quantum computing is heating up, as a growing number of entities race to benchmark, stabilize, and ultimately commercialize this technology. As of July 2021, a group from China appears to have taken the lead in terms of raw performance, but Google, IBM, Intel and other quantum computer developers aren’t far behind. All of that could change overnight, though. At this point, it's too early t... » read more

Week In Review: Auto, Security, Pervasive Computing


AI, machine learning Cadence says it has optimized its Tensilica HiFi digital signal processor IP to efficiently execute TensorFlow Lite for Microcontrollers, which are used in Google’s machine learning platform for edge. This means developers of AI/ML on the edge systems can now put better audio processing on edge devices with ML applications like keyword detection, audio scene detection, n... » read more

Penetration Tests, Prison Security, And Mothers


There is always an interesting sounding presentation at RSA that looks like it might be a good blog post topic just based on the title. This year it was "I Had My Mom Break Into A Prison Then We Had Pie" by John Strand of Black Hills Information Security. A pen test is short for a penetration test. They can take various forms from trying to log in to a system they shouldn't, to trying to g... » read more

Week in Review – IoT, Security, Autos


Products/Services Arm and Swift Navigation will collaborate on providing technology to developers of autonomous vehicles and connected cars. San Francisco-based Swift Navigation, which offers Global Navigation Satellite System positioning technology for AVs, is teaming with the chip design company to offer Swift’s solutions as an option on Arm-based platforms, the companies say. Swift’s St... » read more

IoT Security Ratings Needed


Concerns about security have been growing alongside adoption of the IoT, and it seems to be making some headway. This is good news, if it continues, because one of the biggest concerns about buying connected devices is that they can provide inroads into personal data. Data security has been a persistent annoyance for several years. Almost anyone who travels or shops at major department store... » read more

When Cryptographers Disagree


Six of the world's leading cryptography experts sat down this week to explore the most pressing issues in security. They took up topics ranging from whether Apple should facilitate the FBI's access to a known terrorist's iPhone, to what will become the next important cryptography algorithm. Among them: Ronald Rivest, an Institute Professor at MIT; Adi Shamir, co-inventor of the RSA algorithm... » read more

What Is Cyberwarfare?


Cyberwarfare is emerging as the most sophisticated battleground of the 21st century. In fact, the military in all major countries make it a priority. Collectively they are spending tens of billions of dollars on education and building a knowledgebase of how attacks can be perpetrated and what defenses are needed. The entire effort is based on technology, both legacy and new, starting on the ... » read more

The Secret World Of Ciphers


The arena of creating secure environments in the hardware and software industries is somewhat shrouded in mystery and misunderstanding. Certainly, some types of ciphers are relatively straightforward and uncomplicated. For example, there is one called the Caesar cipher, which is one of the most prolific, and simple encryption techniques. Basically, this is simply aligning two alphabets and s... » read more

← Older posts