Page 4,185«..1020..4,1844,1854,1864,187..4,1904,200..»

Quantum encrypted box hints at unhackable communication – Wired.co.uk

GeorgePeters/iStock

Quantum-encrypted communication and quantum computing promise to be safer and more secure ways of communicating, but a variety of challenges are keeping these goals from being achieved.

But new research has taken us an inch closer to the goal.

Quantum communication involves the sharing of quantum information over long distances. But in order to crack this, first the concept of quantum memory needs to be addressed.

Quantum memory means an interaction between light and matter that allows quantum information, stored in light, to be retrieved in a similar way to the memory in a classical computer.

Previous attempts at building a quantum memory storage system have been too big to be of use at the scale needed, the size of a computer chip.

Now researchers in China and the US have come up with quantum storage box, small enough to be used on a chip. The device is a nano-sized cavity, around one thousandth of a millimetre, filled with the element neodymium inside a crystal structure. The paper is published in the journal Science.

The photons are stored in an ensemble of rare-earth neodymium atoms, says Andrei Faraon, from the California Institute of Technology, and co-author on the paper.

Inside, the atoms are trapped in a crystal called yttrium orthovanadate (YVO4). The ensemble is small, and by itself would not be able to absorb the photons, says Faraon. This is why we make an optical cavity, or resonator, in the YVO crystal, that enhances the interaction between the atoms and the light, so the absorption of photons by the atoms becomes efficient.

Dr. Tian Zhong

To store the photons, the cavity is prepared in a special way using a sequence of laser pulses. This preparation means that after the photons are absorbed they are automatically re-emitted after a certain short amount of time, or 75 nanoseconds to be precise. To implement a quantum memory using this device, we store photons that are shaped as two pulses, early and late pulse, says Faraon.

Quantum mechanically the photon exist in a superposition of early and late. This means they exist as a combination of the two phases at the same time. After the pulses are retrieved, it closely resembles the stored pulses, meaning the memory works.

Faraon hopes this new device, which is much smaller than anything made previously, will help us to crack quantum communication. In the future it could be used to transfer information at the quantum level at long distances via optical fibres, Faraon says. A quantum memory is essential in most schemes to transfer quantum information at long distances.

Quantum-encrypted communication would be much more secure than the mathematical algorithms used currently. This is because of the properties of quantum mechanics called Heisenbergs uncertainty principle.

Currently, information can be encrypted with techniques based on mathematical algorithms. It is difficult to figure out the exact algorithm used to encrypt a piece of data, making the approach largely safe for now.

However, experts anticipate computers powerful enough to crack the codes will surface in the next 10 to 20 years. This development would mean current encryption methods would be redundant as they could easily be broken.

Last year, researchers at Chatham House's International Security Department said satellites and other space communications technology are at significant risk from hackers and cyber attacks.

But there is a potential solution and this is where quantum mechanics comes into it. Heisenbergs uncertainty principle means the act of observing a particle creates certain changes in its behaviour.

Specifically, it means we cannot know both the momentum and position of a particle to the same degree of certainty at once. Quantum encryption uses this to create encoded data in the form of light that, if intercepted, will change its behaviour. This can alert the people communicating that the security key is not safe to use.

Continued here:
Quantum encrypted box hints at unhackable communication - Wired.co.uk

Read More..

Quantum Computer Programming: What You Need to Learn to Get … – TrendinTech

Quantum computers, at long last, finally seem to be coming into their own with the promise of being far superior from its competition by years end. But this leads to one big problem, very few people actually know how to work them, let alone program them. So what is quantum programming anyhow? Quantum programming is a set of programming languages that express quantum algorithms using high-level constructs. It is through these complex algorithms, that conventional computers arent capable of handling, that set apart quantum computers from the rest. A normal computer is based on bits, which are variables that just have two possible values (0 or 1/true or false), where as quantum computers are also based on these two variables, but where it differs is that they are also based on qubits. These qubits mean that between these two variables there can exist many other variables which we call superposition states.

These states can be summed up as values that exist part way between. After Google unveiled a new quantum chip design, the bold claim of quantum computers achieving quantum supremacy was born. This phrase, summed up, means to perform tasks and calculations that are physically impossible for a normal computer to achieve. There is a lot of conventional belief that quantum programming is a drastically complex process, that very few scientists are able to understand. But with companies such as IBM and Google already having created quantum devices, the time to start looking into quantum programming as a mainstream action is now.

So where to begin looking if you are interested or curious about learning quantum programming? Well for starters it may be relieving to learn that you do not need a quantum computer in order to begin learning quantum programming. Simple quantum programs can easily be simulated on a normal computer. QISKit offers developers a way to explore IBMs Quantum Experience. It uses a Python interface which enables a user to experiment with and work with quantum circuits.

One of the main reasons that are stopping the growth of quantum programmers is the lack of accessibility to quantum computers. Where as you can start on a normal computer with APIs offered through different sites, quantum computers are likely to behave quite different than normal computers. This is a problem facing quantum programming since until there are tangible incentives for someone to learn the skill and until the software to run it is more widely available, it is hard to convince programmers to invest time and their skills into learning quantum programming especially since, unlike other programming languages, a knowledge in quantum programming doesnt necessarily transfer over to other programming languages where most programming languages have significant overlap amongst each other.

Also, with all these advancements and leading edge technologies that exist within quantum programming, its not a surprising fact that programming a quantum computer is much harder than that of conventional computers. To start, building a quantum algorithm is far more complex than what most programmers are used to seeing, which means an understanding of quantum physics, which is what will give qubits their properties, is recommended. While it is not a requirement to have a degree in the field, a basic understanding will definitely help since it is a far departure from that of normal computer programming.

These are some of the problems that the companies building these machines have recognized, which is why we have recently started seeing services offered where anyone can go and start using quantum computing through APIs and other programs. Also, these companies are really investing a lot of effort into making the programming framework in a way that will allow programmers to use them efficiently. Where as, just like any new technology, there are risks involved into dedicating time and effort into learning quantum programming, the potential pay off in being on the cutting edge in the next major evolution of programming offers huge incentives. Even if quantum computers only perform at a marginally faster speed than a normal computer, it will be enough of an incentive for most companies and users to switch to quantum computing in the future. Though if early indications are reliable, quantum computing should far surpass that of its predecessors. The opportunity to learn quantum programming now, and get a head start on other programmers, is not only a great opportunity but the tools necessary to help you get started are already readily available to you.

More News to Read

comments

Read more:
Quantum Computer Programming: What You Need to Learn to Get ... - TrendinTech

Read More..

3 No-Brainer Stocks to Buy in Cloud Computing – Motley Fool

The global cloud services market is expected to grow from 18% annually to $246.8 billion this year, according toGartner's latest estimates. Wikibon expects enterprise cloud spending to grow at a compound annual growth run rate of 16% between 2016 and 2026.

Those figures make the cloud computing market a lucrative one for tech investors, but it's tough to narrow down the best buys in the industry. Today, I'll focus on three "no brainer" stocks in that market, which will benefit from the growth of the cloud computing market over the next few years.

Source: Getty Images.

Amazon (NASDAQ:AMZN) is the 800-pound gorilla of cloud computing, since its AWS (Amazon Web Services) platform is the biggest cloud infrastructure service in the world. AWS stores data and hosts content for companies, and its tools enable developers to create and run cloud-based apps. It added over 400 new tools to AWS in the last quarter alone.

During thatquarter, AWS' revenue rose 42% annually to $4.1 billion and accounted for 11% of Amazon's top line. That gives the segment a run rate of $14.5 billion over the past four quarters. Wikibon expects AWS to generate $43 billion in annual revenues by fiscal 2022 -- which would account for 8.2% of all cloud spending worldwide.

AWS' operating profit rose 28% to $916 million last quarter, compared to just $628 million in operating income for the entire company. Therefore, the growth of the higher-margin AWS unit easily offsets bottom line declines at its North American and International marketplace businesses -- which are using low-margin and loss-leading strategies to lock in customers. That virtuous cycle enables Amazon to continue dominating both the cloud computing and e-commerce markets.

Microsoft (NASDAQ:MSFT) rules the software-as-a-service market with consumer-facing products like Office 365, Dynamics CRM (customer relationship management), and Skype. Its cloud platform, Azure, is the second largest cloud infrastructure platform in the world after AWS. Microsoft reported that all these services generated a "commercial cloud" annualized run rate of$18.9 billion last quarter.

That puts Microsoft on track to exceed CEO Satya Nadella's goal of hitting $20 billion in annual cloud revenues by the end of fiscal 2018. That figure would represent nearly a fifth of its projected revenue for the year, and reduce its overall dependence on traditional Windows licenses.

Microsoft missed the shift toward mobile operating systems, and itrecently killed off Windows Phone. But it's clawing its way back in the mobile market with mobile versions of its flagship apps (Office, Outlook, OneDrive, and OneNote) for iOS and Android. By tethering its cloud-based ecosystem to those two operating systems, Microsoft can remain relevant in the "mobile-first, cloud-first" market which Nadella highlighted in hisfirst email to Microsoft employees.

Salesforce (NYSE:CRM) is thelargest provider of cloud-based CRM services in the world. These services help companies retain and organize relationships with customers. Salesforce controlled 18.1% of that market in 2016, according to IDC, while its closest rivals -- Oracle and SAP-- respectively controlled just 9.4% and 7.2%.

Salesforce is still firing on all cylinders. Its revenue rose 26% to $8.39 billion last year, and analysts anticipate 24% growth this year. Its non-GAAP earnings also jumped 35% last year, and Wall Street expects 30% growth this year. However, the bears often note that Salesforce isn't consistently profitable on a GAAP basis. They also point out that Microsoft's Dynamics is gaining ground in the CRM market with the support of Outlook, Skype, Azure, LinkedIn, and other applications.

Nonetheless, Salesforce remains the go-to vendor for CRM solutions, and new features like Einstein -- which uses AI to crunch customer data into business predictions -- should further widen its moat against the competition.

Amazon, Microsoft, and Salesforce are all smart ways to invest in the growing cloud computing market, but investors shouldn't ignore the risks. Amazon and Salesforce's valuations are high relative to their peers, so a market downturn could sink both stocks. Microsoft's cloud growth is impressive, but those investments are also weighing down its bottom line growth.Investors should weigh these risks against the potential rewards to see if these cloud-oriented stocks are right for their portfolios.

Teresa Kersten is an employee of LinkedIn and is a member of The Motley Fool's board of directors. LinkedIn is owned by Microsoft. Leo Sun owns shares of Amazon. The Motley Fool owns shares of and recommends Amazon and Gartner. The Motley Fool owns shares of Oracle. The Motley Fool recommends Salesforce.com. The Motley Fool has a disclosure policy.

Follow this link:
3 No-Brainer Stocks to Buy in Cloud Computing - Motley Fool

Read More..

Telecom ponders future amid surging cloud computing popularity – TechTarget (blog)

With cloud computing popularity on the ascent, Ben Chen has to think big. Chen is president of business development at a U.S. branch of China Unicom, a state-owned telecom and the second-largest wireless carrier in the worlds most populous country. I spoke to him at the Gartner Catalyst conference in San Diego earlier this month.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Based in San Jose, Calif., Chens division helps U.S. companies moving to China get set up with telecommunications, connecting their facilities abroad with stateside headquarters. And it does the same for Chinese companies building outposts in the U.S.

With the steep and rapid increase in the number of cloud adopters, especially in the U.S., Chen wonders, how relevant will a traditional telecom remain to customers?

Maybe they will rely on more cloud services, because they have all their content on the cloud, and the cloud can be synchronized, so maybe they wont need real connectivity between China and their headquarters anymore, Chen said. So we have to think about what role we are going to play.

In China, China Unicom offers mobile and traditional voice and data services very similar to AT&T, Chen said. China Unicom, though, offers public cloud services, unlike AT&T and other U.S. telecoms, which have left the cloud market because they couldnt compete with the likes of Amazon and Microsoft.

But China Unicom also cant compete with the research-and-development power of providers like Alibaba Cloud, which are pouring money into innovative new technology and features, Chen said. Instead, it needs to find another way to take advantage of the current mass migration to the cloud.

China Unicoms big differentiator is its vast mobile infrastructure, supporting approximately 300 million mobile customers, Chen said. Many users of mobile devices in China have no landline telephones just handsets packed with mobile apps and reliant on connections to the internet and public cloud providers. Such a network can be leveraged in the face of accelerating cloud computing popularity, he said.

That can play a more important role, working with the cloud providers and the users, Chen said. This is our value now rather than the traditional phone service and the other services. We should leverage our value to create more value thorough mobile.

The internet of things (IoT) presents another market for growth, Chen said. China Unicom is working with technology vendors on smart homes, myriad smart devices, machines and vehicles; for example, it partnered with Cisco IoT division Jasper on a service to help automakers build connected cars.

Big data is a third area, Chen said. By collecting information on how its hundreds of millions of mobile customers use their devices, China Unicom can determine where service is concentrated and can put in a new cell tower, for example.

Of course, cloud adoption, especially in China, which lags a few years behind the U.S. in taking on new technology, Chen said, isnt 100%. So carriers like China Unicom that do traditional connecting with dedicated circuits arent feeling the heat of rising cloud computing popularity.

Maybe we have a few years. [Companies are] in migration not everyone has moved to cloud yet, Chen said. But we have to be ready.

To learn about what IT professionals at Gartner Catalyst said about cloud strategies at their organizations, read this SearchCIO report.

See the rest here:
Telecom ponders future amid surging cloud computing popularity - TechTarget (blog)

Read More..

Dharma wants to let anyone borrow a small amount of cryptocurrency – TechCrunch

dApps, or decentralized apps, are open-source applications built on top of a blockchain.But heres the thing users usually cant interact with these dApps unless they have tokens issued by these projects.For example, bothAugur, a decentralized prediction market and REXMLS, a free global listing network for real estate, require tokens to interact with.

But if you didnt participate in the dApps ICO, getting these tokens isnt easy.

While some tokens trade on exchanges, youd have to first buy Bitcoin or Ethereum (which still isnt necessarily easy), send it to an exchange, convert it to the token, then send to token to the dApp. Its a process, to say the least.

So, enter Dharma, a company part of this summers Y Combinator batch.

Dharma wants to let anyone get a small cryptocurrency loan in just a few minutes, so they can use a dApp without going through that long process to acquire a token.

Right now these loans are only denominated in ether (which some dApps accept), but eventually Dharma wants to be able to support the borrowing and lending of any crypto asset. All loans are denominated in USD so neither side is exposed to the volatility risk associated with cryptocurrencies.

Since Dharma is built as an open-source plugin, developers can essentially plug a line of credit directly into their dApp, so users can get tokens to use without ever leaving the platform. Dharmas protocol can also be accessed without going through a dApp at all, if someone just wanted to borrow a cryptocurrency to use for no specific purpose.

Of course its a little lotmore complicated than this on the backend.

The loans themselves are peer-to-peer, meaning Dharma isnt actually loaning you any money they are just building the open-source protocol to facilitate the borrowing and lending off cryptocurrency. And all loans are represented by Dharmas own newly issued ERC20-based token, which lives on the Ethereum blockchain.

So how does Dharma make money?

The startup is also handling the credit risk assessment / loan approval process which is the only aspect of the protocol that is not decentralized. At launch Dharma will collect basic KYC (know your customer) information from borrowers and decide if the borrower is likely to pay back the loan.

Since loans arent collateralized and there is no actual credit check, Dharma will likely limit first-time borrowers to small amounts of cryptocurrency. But over time as users generate solid repayment history they may increase the amount able to be borrowed, which is a model not so different from Affirm. In return for verifying a borrower, Dharma (the startup, not the protocol) will be allocated a certain portion of loan principal as a fee.

Right now Dharma is the only entity that is approved to decide a borrowers creditworthiness and approve a loan. But eventually they want to permission other entities to step in and approve borrowers for example, an African TelCo has a lot of information on its users that Dharma doesnt have, that could be used when deciding to approve them for a loan.

Dharma isnt totally live yet but you can try it out on Testnet, which is a faux version of Ethereums blockchain just used to test apps.On Testnet Dharma works withMetamask a chrome plugin that lets you run Ethereum dApps right in your browser and 0x a decentralized token exchange. But soon Dharma plans to launch on Ethereums live network and integrate with many more dApps.

If you want to learn more about Dharma, you can check out their White Paper right here.

Read the original post:
Dharma wants to let anyone borrow a small amount of cryptocurrency - TechCrunch

Read More..

Litecoin Prices Surge Above $70 as Crypto Market Tops $175 Billion – CoinDesk

Via CoinMarketCap

The cryptocurrency markets continued to risetoday as the asset class observed strong gains, including most notably, perhaps, litecoin.

The digital assetonce dubbed "the silver to bitcoin's gold"passed $78 to achieve a new all-time high at 06:54 UTC this morning, according to CoinMarketCap data. Standing at $75.57 at press time, litecoin has increased by 17.28percent overthe past 24 hours and an astonishing 49.37 percent overthe last week.

Long in the doldrums, litecoin has seen a resurgence since its community moved to activate Segregated Witness (SegWit) on its network early in May a scaling solution that also opens the doorto new features such as smart contracts going forward.

Once again, South Korean exchange Bithumb has seen the majority of the trading, hosting22 percent of the litecoin volumein the last 24 hours. Chinese exchanges OKCoin andHuobi are close behind, with 18 and 14 percent, respectively.

While not yet close to its record high of over $0.40 set back in May, Ripple Labs' XRP token has also seen gains rising13.51 percent over the week to $0.25 today.

Dash and monero, too, have climbedthisweek, with press time prices at$382 (21.60 percent over seven days) and $140 (46.45 percent), respectively.

Taking a wider view,the combined market capitalization of all digital currencies attaineda new record high today, and had passed$175 billion at press time. That's up from $170.8 billion just yesterday, also going by data from CoinMarketCap.

Disclaimer: CoinDesk is a subsidiary of Digital Currency Group, which has an ownership stake in Ripple.

Formation flying image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Read the rest here:
Litecoin Prices Surge Above $70 as Crypto Market Tops $175 Billion - CoinDesk

Read More..

PayThink Custom tokens are the future of cryptocurrency – PaymentsSource

At more than 850 crytpocurrencies already in less than a decade, it is no wonder that explorations are now diverting to use of custom tokens to address the immediate needs of specific industries.

Major industries are grappling with major constraints in terms of quality and efficiency, and custom tokens could offer the ultimate solutions for specified market needs and demands.

The core principle of cryptocurrencies is decentralization, eliminating the middleman and central authorities by all means. In the principles of sales and marketing, this would translate to giving more power to the end user, the customer or the client.

Major industries like the music sector, health sector, education, agriculture, and so on, have a ton of issues to deal with, hence the establishment of specific Foundations, Companies, Welfare Groups and SACCOs, to try to pull resources and bring people together. Its important to note that the modern day service industries thrive on the premise of the feedback received from loyal customers.

Listening to trustworthy feedback from key stakeholders in an industry brings invaluable contribution that no single regulatory body or central institution can afford. And talking of feedback, many institutions have over the years tried to reach out to industry players, but that is only once in a long while.

Unfortunately, such communities do not exist for most industries, and there is therefore the lack of constant feedback. These are the very issues that custom tokens seek to address, and the best way is to ensure that the custom tokens are tailored for an entire industry, with specific tools to address specific concerns. The dynamics of every industry might be very unique, but that is for the developers to customize the tools.

Every time reviews or feedback is given on social media, whether positive or negative, it is upon the service providers and their site administrators to keep or pull down the comments, especially when they think that the reviews are extremely transparent, in a negative sense. But with a determination to uphold transparency, responsibility and accountability, reviews cannot be changed or manipulated once on the blockchain.

That is to say that market research value will go up, and players in the industry will be able to regularly access up-to-date data. Such platforms, tailored for an entire industry, will simply translate to optimal speed in service delivery, and safety in handling market research data.

To continuously build strong customer relationships, there should be an incentive structure within a custom token, where quality reviews by industry players are rewarded using the tokens.

As members fill in surveys and respond to treatment quality and market research questions, smart contracts will be used to facilitate payment of rewards using the custom tokens.

Consequently, the earnings will go a long way in making further payments in partnering institutions within the industry. In other words, members will not only earning the coins, but will also be provided with an opportunity to spend the same within the entire industry.

And because of mutual interests among community members, industries will be bound to tap and harness profound knowledge from either side. While at it, this approach will not be a preserve of persons who are already familiar with the use of cryptocurrencies, but a great extension of an olive branch to newcomers in the cryptospace, who may have never had a chance to use Bitcoins or either of the hundreds of altcoins. On the other hand, the coins earned as a reward need not necessarily be used to pay for services, because they could as well be used to buy products which are connected to specific industries.

The education industry should have a custom token that is not only open to teachers and parents but also to students, while one for the health industry should accommodate both doctors and patients, and so on. If adopted for every sector, the disruption experienced in the banking industry would trickle down to all industries around the world, connecting the global community in untold measures.

Whichever way it goes, the near or distant future will experience token compensations for passive or active participations in various industries, for the public and private sectors will no longer need to use fiat currencies. The earlier industries open up to the reality of custom tokens, the better it will be for all stakeholders.

Mariam Nishanian is a representative for Dentacoin, a virtual currency for the dental industry.

Go here to see the original:
PayThink Custom tokens are the future of cryptocurrency - PaymentsSource

Read More..

Legislation to limit smartphone encryption ‘may be necessary,’ deputy AG Rosenstein says – Washington Times

Legislation may be needed to solve the Justice Departments ongoing problem with uncrackable digital encryption, Deputy Attorney General Rod Rosenstein said Wednesday.

Speaking at the 10th Annual Utah National Security and Anti-Terrorism Conference in Salt Lake City, Utah, Mr. Rosenstein called strong encryption one of the most significant and growing challenges currently faced by law enforcement and raised the possibility of passing laws limiting its use.

The use of encrypted services poses a novel threat to public safety. We can disrupt attacks only if we are able to learn about them, Mr. Rosenstein told attendees, according to remarks published by the Justice Department.

Robust, hard-to-crack encryption became a hot-button issue after a married couple killed more than a dozen people in San Bernardino, California, in Dec. 2015 and left behind a password-protected and purportedly impenetrable Apple iPhone. The Department of Justice sued Apple in federal court the following year in hopes of compelling their assistance with respect to cracking into the phone, but ultimately relented after seeking the help of an undisclosed, third-party security company at a hefty cost.

Investigators have continued to encounter issue attempting to glean evidence from safeguarded smartphones and eavesdrop on communication platforms increasingly protected with strong encryption in the wake of San Bernardino, and Mr. Rosenstein said Wednesday that lawmakers may have to intervene if their problems persist.

After a terrorist attack, obtaining stored electronic information is an effective and necessary law enforcement technique. But, as we saw after the San Bernardino attack, obtaining electronic data can be time-consuming, expensive, and uncertain if technology providers refuse to cooperate, Mr. Rosenstein said.

Unfortunately, some companies are unwilling to help enforce court orders to obtain evidence of criminal activity stored in electronic devices. I hope that technology companies will work with us to stop criminals from defeating law enforcement. Otherwise, legislation may be necessary, Mr. Rosenstein added.

Absent legislation, Mr. Rosenstein previously requested more than $20 million in federal funding back in June devoted entirely toward solving the governments inability to crack strong encryption a dilemma Washington for years has referred to as going dark.

The seriousness of this threat cannot be overstated, he testified on Capitol Hill at the time. This phenomenon is severely impairing our ability to conduct investigations and bring criminals to justice.

James Comey, the former FBI director ousted by President Trump in May, said during a congressional hearing days earlier that roughly 46 percent of the approximately 3,000 smartphones and other electronic devices seized by investigators during a recent six-month span were effectively impenetrable because of strong encryption.

That means half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique, Mr. Comey told the Senate Judiciary Committee. That is a big problem. And so the shadow continues to fall.

The Obama administration was not in a position where they were seeking legislation, Mr. Comey said at the time. I dont know yet how President Trump intends to approach this.

Tech companies including Apple and Google have previously opposed the governments attempts at weakening or bypassing strong encryptions on account of security and privacy repercussions and have fought in the past against efforts in the U.S. and abroad to outlaw encryption.

Go here to see the original:
Legislation to limit smartphone encryption 'may be necessary,' deputy AG Rosenstein says - Washington Times

Read More..

Cloud Encryption Market by Component, Service Model, Organization Size, Vertical And Region – Global Forecast to … – Markets Insider

NEW YORK, Aug. 30, 2017 /PRNewswire/ --

Stringent regulatory compliance and increasing concern for cloud data security are driving the cloud encryption marketThe cloud encryption market is expected to grow from USD 645.4 million in 2017 to USD 2,401.9 million by 2022, at a Compound Annual Growth Rate (CAGR) of 30.1%. The market is driven by factors, such as proliferation in the cloud adoption and virtualization, bigger risks on cloud environment due to big data analytics, and stringent regulations and compliances. However, the major hindrance faced by the enterprises while adopting cloud encryption are lack of budget for the adoption of best-in-class cloud encryption solution, and misbelief of performance issue caused by cloud encryption.

Read the full report: http://www.reportlinker.com/p05086553/Cloud-Encryption-Market-by-Component-Service-Model-Organization-Size-Vertical-And-Region-Global-Forecast-to.html

Software-as-a-Service model is expected to have the fastest growth rate during the forecast periodSoftware-as-a-Service (SaaS) service model in the cloud encryption market is expected to grow at the fastest rate, during the forecast period. The major reason for the high growth rate of SaaS among service models is the increased usage of the cloud-based applications from the cloud service providers. The SaaS applications might contain malicious activities that may cause significant data loss. Therefore, the cloud encryption solutions and services help in minimizing the loss of data by encrypting it and allowing only authorized a person to access the same with the help of encryption keys.

BFSI vertical is expected to have the largest market size during the forecast periodWith strict regulations governing the BFSI sector and the pressure on IT teams to address the dynamic needs of the businesses, this sector is exploring possibilities of exploiting cloud computing as a mechanism to deliver faster services to the businesses and at the same time reduce the cost of delivering such services. However, with this evolution arises the need to protect sensitive data that is being acquired and transmitted. This can be achieved using the cloud encryption technology, encrypting confidential data in transit as well as at rest.

North America is expected to hold the largest market share, whereas Asia Pacific (APAC) is expected to grow at the fastest rate during the forecast periodNorth America is the foremost potential market due to the presence of a large number of players offering the cloud encryption in this region. This region is expected to hold the largest market size during the forecast period, as organizations are more focused on securing the cloud data at rest as well as in transit. Furthermore, organizations have invested hugely in advanced technologies to gain competitive advantage and improve business operations. The APAC region is in the initial growth phase; however, it is the fastest growing region in the global cloud encryption market. The increasing adoption of cloud encryption solutions in this region is due to the wide-spread presence of SMEs that are implementing enhanced cloud encryption solutions to prevent unauthorized access to critical business data residing on the cloud and unethical use of such information.

The break-up profiles of primary participants are given below: By company: Tier 155%, Tier 220%, and Tier 325% By designation: C-level60%, Director level25%, and Others15% By region: North America15%, Europe25%, APAC30%, Latin America20%, and MEA10%

The following key cloud encryption providers are profiled in the report:1. Thales e-Security (La Defense, France) 2. Gemalto N.V. (Amsterdam, Netherlands) 3. Sophos Group plc (Abingdon, UK) 4. Symantec Corporation (California, US) 5. Skyhigh Networks (California, US) 6. Netskope Inc. (California, US) 7. CipherCloud (California, US) 8. HyTrust, Inc. (California, US) 9. Secomba GmbH (Augsburg, Germany) 10. IBM Corporation (New York, US) 11. Trend Micro Incorporated (Tokyo, Japan) 12. Vaultive, Inc. (Massachusetts, US) 13. TWD Industries AG (Unteriberg, Switzerland)

Research CoverageThe cloud encryption market has been segmented on the basis of components (solution and service), service models, organization sizes, verticals, and regions. A detailed analysis of the key industry players has been done to provide key insights into their business overviews, solutions and services, key strategies, new product launches, partnerships, agreements and collaborations, business expansions, and competitive landscape associated with the cloud encryption market.

The report will help the market leaders/new entrants in this market in the following ways: This report segments the cloud encryption market comprehensively and provides the closest approximations of the revenue numbers for the overall market and the subsegments across different regions. This report helps stakeholders understand the pulse of the market and provides them with information on key market drivers, restraints, challenges, and opportunities. This report will help stakeholders to better understand the competitors and gain more insights to enhance their position in the business. The competitive landscape section includes vendor comparison of top market players in the cloud encryption market.

Read the full report: http://www.reportlinker.com/p05086553/Cloud-Encryption-Market-by-Component-Service-Model-Organization-Size-Vertical-And-Region-Global-Forecast-to.html

About Reportlinker ReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

http://www.reportlinker.com

Contact Clare: rel="nofollow">clare@reportlinker.comUS: (339)-368-6001Intl: +1 339-368-6001

View original content:http://www.prnewswire.com/news-releases/cloud-encryption-market-by-component-service-model-organization-size-vertical-and-region---global-forecast-to-2022-300511873.html

SOURCE Reportlinker

Here is the original post:
Cloud Encryption Market by Component, Service Model, Organization Size, Vertical And Region - Global Forecast to ... - Markets Insider

Read More..

Cipher Suites: Ciphers, Algorithms and Negotiating Security Settings – Hashed Out by The SSL Store (registration) (blog)

Heres what you need to know about the algorithms behind SSL/TLS encryption.

If you study SSL and encryption long enough, eventually youre going to come across the word cipher. Aside from just generally being a cool word, ciphers are a very important part of encryption.

So, what are encryption ciphers?

Ciphers are algorithms, more specifically theyre a set of steps for both performing encryption as well as the corresponding decryption. Nowadays ciphers are dependent upon the advanced processing capabilities of computers. That hasnt always been the case though. One of the first, well-known historical ciphers belonged to Caesar emperor of Rome and purveyor of fancy appetizer salads who used it to communicate with his generals during military operations.

Over the years, ciphers have become more complex, but the logic behind them has stayed the same. Whether it was Caesar crossing the Rubicon, the infamous Enigma cipher of World War II or some of the algorithms of todaythe idea has always been to encode or encipher a message in such a way that only the intended party can read it.

For all intents and purposes, when we discuss ciphers as they relate specifically to SSL encryption, there are two kinds of algorithms: symmetric and asymmetric. This really comes down to the kind of encryption youre going to be performing, again, symmetric or asymmetric.

Symmetric encryption involves two keys that are the same, or as the name quite cleverly implies, symmetric. Both keys can perform both functions: encryption and decryption. You see this during an encrypted web connection between a browser and a server. After the SSL certificate has been authenticated and the SSL handshake is complete, the browser and server exchange symmetric session keys that allow them to communicate securely for the duration of the visit. While these session keys are in play, they are making use of a symmetric cipher.

Conversely, with asymmetric encryption, you are talking about different keys with different abilities. The most obvious example of this is the public/private key pair that is used during the SSL handshake. In this scenario, one key encrypts and the other key decrypts. This kind of encryption requires a different kind of cipheran asymmetric algorithm.

There are many different ciphers that are commonly used in encryption in conjunction with one another. Thats because, specifically as it relates to SSL, youre not using just a single algorithm but rather a set of algorithms that are grouped together in what is referred to as a Cipher Suite.

Were building towards that concept, so well get there in a little bit. But, now that weve got an understanding of the two types of algorithm symmetric and asymmetric we can look at some of the different ciphers and the functions they serverthen well talk about building a cipher suite.

Here are some examples of ciphers and other similar algorithms:

RSA

RSA is named after the gentlemen that created it: Rivest, Shamir and Adleman. This is a fairly common asymmetric cryptosystem that uses prime numbers and has a wide range of applications.

Diffie-Hellman

Named after Whitfield Diffie and Martin Hellman, this is a public key protocol used primarily for exchanging cryptographic keys over public channels. Prior to methods like DH, keys had to be transmitted in physical form.

Elliptic Curve Diffie-Hellman

A key agreement protocol that gives two parties with elliptic curve public-private key pairs to establish a shared secret (used either directly as a key or to derive one) securely over a public channel.

PSK

Typically written as TLS-PSK, this is a cipher that provides secure communication based on pre-shared symmetric keys exchanged between parties in advance.

AES

Advanced Encryption Standard, a.k.a. Rijndael, is an NIST approved encryption cipher with a block size of 128 bit, and symmetric keys with lengths of either 128, 192 or 256 bits.

Camellia

A symmetric key block cipher with similar capabilities and key sizes to AES. It was developed in Japan by NTT and Mitsubishi and is approved by the ISO/IEC, EU and the Japanese CRYPTREC project.

ARIA

Another block cipher that is similar to AES, ARIA was developed by a group of researchers in South Korea in 2003.

Hash-Based Message Authentication Code (HMAC)

This is a type of message authentication that uses cryptographic hashes to both authenticate a message and ensure data integrity, think SHA-256.

Authenticated Encryption

AE or AEAD provides confidentiality, integrity and authentication assurances on data under a single programming interface. Typically used in conjunction with a block cipher.

Obviously, this is an incomplete list, there are dozens of other ciphers. But this should at least give you some more context when we begin discussing cipher suites in the next section.

A Cipher Suite is a combination of algorithms used to negotiate security settings during the SSL/TLS handshake. After the ClientHello and ServerHello messages are exchanged, the client sends a prioritized list of cipher suites it supports. The server then responds with the cipher suite it has selected from the list.

Cipher suites are named combinations of:

So, for instance, heres an example of a cipher suite:

Ive color-coated it to help you distinguish between the ciphers.

TLS is the protocol. Starting with ECDHE we can see that during the handshake the keys will be exchanged via ephemeral Elliptic Curve Diffie Hellman (ECDHE). RSA is the authentication algorithm. AES_128_GCM is the bulk encryption algorithm. Finally, SHA-256 is the hashing algorithm.

Most browsers and servers have a list of cipher suites that they support, the two will compare the lists in order of priority against one another during the handshake in order to determine the security settings that will be used.

Of course, as TLS 1.3 inches towards a final release, this is all going to change. While previous versions of SSL/TLS through TLS 1.2 used the version of cipher suites described here, in version 1.3 cipher suites will change structure as they will only be used to negotiate encryption and HMAC algorithms.

Because the structure of 1.3 cipher suites is different from its predecessors, they will not be interchangeable with older TLS versions.

For those that like to skim, here are the key takeaways from todays conversation:

Original post:
Cipher Suites: Ciphers, Algorithms and Negotiating Security Settings - Hashed Out by The SSL Store (registration) (blog)

Read More..