La criptografía cuántica es una de las joyas de la corona del cómputo cuántico. Además de conocerse a detalle el fundamento teórico de los protocolos de esta disciplina, se ha hecho investigación experimental por más de dos décadas y, como resultado, existen ya equipos de criptografía cuántica que se pueden comprar e instalar bajo la lógica de cualquier producto comercial.
En esta plática, titulada “Criptografía cuántica - fundamentos, productos y empresas”, el Dr Venegas Andraca dará una introducción concisa a los protocolos de criptografía cuántica BB84 y EK91, describirá las ventajas que estos protocolos tienen respecto de protocolos populares de criptografía convencional, expondrá las restricciones tecnológicas de BB84 y EK91, presentará los equipos de criptografía cuántica disponibles en el mercado y dará un análisis sucinto de las estimaciones de crecimiento comercial de esta disciplina.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
On the Usage of Chained Codes in CryptographyCSCJournals
We discuss the chained randomized linear code and their use in cryptography. We show that the adoption of randomized chained codes in the framework of McEliece cryptosystem expose the cryptosystem to some new attacks.
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
We propose a method to recover the structure of a randomly permuted chained code and how to cryptanalyse cryptographic schemes based on these kinds of error coding. As application of these methods is a cryptographic schema using regular Low Density Parity Check (LDPC) Codes. This result prohibits the use of chained code and particularly regular LDPC codes on cryptography
Exploiting tls to disrupt privacy of web application's trafficSandipan Biswas
In this work, we analyze privacy and security aspects of encryption modes, padding schemes
and order of padding of messages in TLS during encrypted communication between client and
web-application on the server. We show that using padding schemes to pad all packets to
hide message sizes during communication without considering underlying encryption modes and
padding methodology is not safe .
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
We discuss the emerging threat and implications of quantum computing technology on the security of cryptosystems currently deployed in applications, and why system designers should consider addressing this risk already in the near term. We then discuss an overview of the current approaches for building quantum safe cryptosystems and their security and performance aspects. We conclude with a glimpse at the state of the art and research challenges in the area of quantum-safe cryptography, including the design of more advanced quantum-safe cryptographic protocols, such as privacy-preserving cryptocurrencies.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
On the Usage of Chained Codes in CryptographyCSCJournals
We discuss the chained randomized linear code and their use in cryptography. We show that the adoption of randomized chained codes in the framework of McEliece cryptosystem expose the cryptosystem to some new attacks.
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
We propose a method to recover the structure of a randomly permuted chained code and how to cryptanalyse cryptographic schemes based on these kinds of error coding. As application of these methods is a cryptographic schema using regular Low Density Parity Check (LDPC) Codes. This result prohibits the use of chained code and particularly regular LDPC codes on cryptography
Exploiting tls to disrupt privacy of web application's trafficSandipan Biswas
In this work, we analyze privacy and security aspects of encryption modes, padding schemes
and order of padding of messages in TLS during encrypted communication between client and
web-application on the server. We show that using padding schemes to pad all packets to
hide message sizes during communication without considering underlying encryption modes and
padding methodology is not safe .
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
We discuss the emerging threat and implications of quantum computing technology on the security of cryptosystems currently deployed in applications, and why system designers should consider addressing this risk already in the near term. We then discuss an overview of the current approaches for building quantum safe cryptosystems and their security and performance aspects. We conclude with a glimpse at the state of the art and research challenges in the area of quantum-safe cryptography, including the design of more advanced quantum-safe cryptographic protocols, such as privacy-preserving cryptocurrencies.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
With the introduction of quantum computing on the horizon, computer security organizations are stepping up research and development to defend against a new kind of computer power. Quantum computers pose a very real threat to the global information technology infrastructure of today. Many security implementations in use based on the difficulty for modern-day computers to perform large integer factorization. Utilizing a specialized algorithm such as mathematician Peter Shor’s, a quantum computer can compute large integer factoring in polynomial time versus classical computing’s sub-exponential time. This theoretical exponential increase in computing speed has prompted computer security experts around the world to begin preparing by devising new and improved cryptography methods. If the proper measures are not in place by the time full-scale quantum computers produced, the world’s governments and major enterprises could suffer from security breaches and the loss of massive amounts of encrypted data
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two
parties to produce a shared random bit string known only to them. These random bits can be used as a key
to encrypt and decrypt messages. The most important and unique property of quantum cryptography is the
ability of the two communicating users to detect the presence of any third party trying to gain knowledge of
the key. It is based on fundamental aspects of quantum mechanics. By using quantum entanglement or
quantum super positions and transmitting information in quantum states, a communication system can be
implemented which detects eavesdropping. Quantum cryptography is used to produce and distribute a key,
not to transmit any message data. This key along with certain encryption algorithm, is used to encrypt (and
decrypt) a message, which can then be transmitted over a standard communication channel. This paper
concentrates on comparison between classical and quantum cryptography as well as survey on various
quantum key distribution protocols used to generate and distribute the key among communicating parties.
Pulse Compression Sequence (PCS) are widely used in radar to increase the range resolution. Binary sequence has the limitation that the compression ratio is small. Ternary code is suggested as an alternative. The design of ternary sequence with good Discriminating Factor (DF) and merit factor can be considered as a nonlinear multivariable optimization problem which is difficult to solve. In this paper, we proposed a new method for designing ternary sequence by using Modified Simulated Annealing Algorithm (MSAA). The general features such as global convergence and robustness of the statistical algorithm are revealed.
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and
reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM
tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
La présentation introduira les principes de fonctionnement des ordinateurs quantiques, la conception de portes logiques et d'algorithmes quantiques simples puis leur exécution sur une véritable puce quantique optoélectronique de l'université de Bristol. Les premiers ordinateurs quantiques sont donc une réalité. Plusieurs attaques et leurs impacts sur les cryptosystèmes symétriques et asymétriques actuels sont analysés et différentes alternatives sont proposées pour être utilisées dans le futur. Les participants sont encouragés à participer avec leur ordinateur portable pour mettre en pratique les exemples abordés.
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
Quantum computing, is an exciting and rather unusual field of informatics. Recently I had privilege to participate on The Quantum Panel, as part of the Payments Canada conference, where I shared some of my view with wider audience.
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property
of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.
Quantum cryptography can, in principle, provide unconditional security guaranteed by the law of physics only. Here, we survey the theory and practice of the subject and highlight some recent developments.
Estructuras de datos avanzadas: Casos de uso realesSoftware Guru
La utilización de estructuras de datos adecuadas para cada problema hace que se simplifiquen en gran medida los tiempos de respuestas y la cantidad de cómputo realizada.
Por Nelson González
Onboarding new members into an engineering team is not easy on anyone. In a short period of time, the new team member is required to be able to bring professional
Por Victoriya Kalmanovich
El secreto para ser un desarrollador SeniorSoftware Guru
En esta charla platicaremos sobre el “secreto” y el camino para llegar a ser un desarrollador Senior, experiencia, consejos y recomendaciones que en estos 8 años
Por René Sandoval
Apache Airflow es una plataforma en la que podemos crear flujos de datos de manera programática, planificarlos y monitorear de manera centralizada.
Por Yesi Díaz
How thick data can improve big data analysis for business:Software Guru
En esta presentación hablaré sobre cómo el Análisis de Datos Gruesos, específicamente el análisis antropológico y semiótico, puede ayudar a mejorar los resultados del Big Data
Por Martin Cuitzeo
CoDi® es la nueva forma de realizar pagos digitales desarrollada por el Banco de México. Por medio de CoDi puedes realizar cobros y pagos desde tu celular, utilizando una cuenta bancaria o de alguna institución financiera, sin comisiones.
Por Cristian Jaramillo
Gestionando la felicidad de los equipos con Management 3.0Software Guru
En las metodologías agiles hablamos de equipos colaborativos, autogestionados y felices. hablamos de lideres serviciales. El management 3.0 nos ayuda a cultivar el mindset correcto, aquel que servirá como el terreno fértil para que la agilidad florezca.
Por Andrea Vélez Cárdenas
Taller: Creación de Componentes Web re-usables con StencilJSSoftware Guru
Hoy por hoy las experiences de usuario pueden ser enriquecidas mediante el uso de Web Components, que son un estándar de la W3C soportado por la mayoría de los navegadores web modernos.
Por Alex Arriaga
Así publicamos las apps de Spotify sin stressSoftware Guru
En Spotify tenemos 1600+ ingenieros, trabajando en 280+ squads. Aún a esta escala, hemos logrado adoptar prácticas que nos han permitido acelerar la forma en que desarrollamos nuestro producto. Presentado por Erick Camacho en SG Virtual Conference 2020
Achieving Your Goals: 5 Tips to successfully achieve your goalsSoftware Guru
he measure of the executive, Peter F. Drucker reminds us, is the ability to "get the right things done." This involves having clarity on what are the right things as well as avoiding what is unproductive. Intelligence, creativity, and knowledge may all be wasted if not put to work on the things that matter.
Presentado por Cristina Nistor en SG Virtual Conference 2020
Acciones de comunidades tech en tiempos del Covid19Software Guru
Acciones de Comunidades Tech en tiempo del COVID-19 es una platica para informar acerca de las acciones que están realizando algunas comunidades de tecnología en México para luchar contra la propagación del COVID-19. Desde análisis de datos, visualizaciones, simulaciones de contagio, etc.
Presentado por Juana Martínez, Adriana Vallejo y Eduardo Ramírez en SG Virtual Conference 2020
De lo operativo a lo estratégico: un modelo de management de diseñoSoftware Guru
La charla presenta un modelo claro, generado por la ponente, para atender los niveles desde lo operativo a lo estratégico.
Presentado por Gabriela Salinas en SG Virtual Conference
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Criptografía cuántica - fundamentos, productos y empresas
1.
2. Quantum Cryptography:
Quantum cryptography: foundations,
products and companies
Salvador E. Venegas-Andraca
Tecnol´ogico de Monterrey, Escuela de Ingenier´ıa y Ciencias
Qualtop, SA de CV
Software Gur´u Virtual Conference 2017
24 May 2017
3. Quantum Cryptography:
Thanks
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
5. Quantum Cryptography:
Quantum Computation and Quantum Information
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
6. Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum computation and quantum information
Quantum computation and quantum information are scientific
and engineering disciplines devoted to the development of
i) Quantum algorithms.
ii) Quantum information processing protocols and devices.
7. Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum computation and quantum information
Some key results in quantum computation and quantum infor-
mation include the discovery of
Quantum teleportation, which consists of transmitting
quantum information (originally contained in a qubit) via a
quantum channel.
Quantum dense coding, which allows sending two
classical bits using only one qubit.
quantum cryptography, which allows coding using
quantum systems.
8. Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum Cryptography
Quantum cryptography is a robust field of science and engineer-
ing that has evolved in an emergent high-tech market with com-
panies capable of delivering off-the-shelf products. Quantum
cryptography protocols can be categorized into
Quantum key distribution protocols (QKD).
Quantum secret sharing protocols (QSS).
Quantum secure direct communication protocols
(QSDC).
Deterministic secure quantum communication
protocols (DSQC).
9. Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum Cryptography
Let us now provide a succinct introduction to some fundamental
concepts of quantum computation needed to formally describe
quantum cryptography protocols.
10. Quantum Cryptography:
Mathematics for quantum cryptography
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
11. Quantum Cryptography:
Mathematics for quantum cryptography
A question: what is quantum computation?
Quantum Computation
=
Quantum Mechanics + Computer Science
Quantum Mechanics: a set of physical laws that describe the
behaviour of atomic and subatomic phenomena.
Computer science: branch of mathematics divided into
automata theory, computability theory and complexity theory.
12. Quantum Cryptography:
Mathematics for quantum cryptography
A question: what is quantum computation?
Quantum computation, one of the most recent joint ventures be-
tween physics and computer science, may be defined as follows:
Quantum Computation is a multidisciplinary field focused on
the development of computers and algorithms, i.e. hardware
and software, based on the quantum mechanical properties of
Nature.
13. Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In classical computation, information is stored and manipulated
in the form of bits.
The mathematical structure of a classical bit is rather simple:
it suffices to define two logical values, traditionally labelled as
{0, 1} (i.e. a classical bit lives in a scalar space) and to relate
those values to two different and mutually exclusive outcomes
of a classical measurement.
14. Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In quantum computation, information is stored, manipulated and
measured in the form of qubits (= quantum bit). A qubit is a
physical entity described by the laws of quantum mechanics.
15. Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
Remember:
– R2, the two-dimensional space studied in elementary
school. Elements of R2, denoted by ˛x, are vectors.
– Any vector ˛x = (a, b) can be written as a linear combination
of a basis, e.g.
˛x = (a, b) = ˛x = (a, b) = aˆı + bˆä
16. Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In quantum computation, we use the following notation for
denoting vectors:
˛x = |xÍ
So,
˛x = aˆı + bˆä … |xÍ = a|iÍ + b|jÍ
18. Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
A qubit |ÂÍ may be written in general form as
|ÂÍ = –|pÍ + —|qÍ
where –, — œ C, |–|2 +|—|2 = 1 and {|pÍ, |qÍ} is an arbitrary basis
spanning C2.
Note that a most important consequence of the vectorial nature
of a qubit is the possibility of writing it as a linear combination of
elements of any basis.
19. Quantum Cryptography:
Mathematics for quantum cryptography
The choice of {|pÍ, |qÍ} is often the orthonormal basis
{|0Í, |1Í}
known as the computational basis.
20. Quantum Cryptography:
Mathematics for quantum cryptography
In addition to the computational basis {|0Í, |1Í}, it is customary
in quantum cryptography protocols to use the diagonal basis
{|+Í, |≠Í}
21. Quantum Cryptography:
Cryptography
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
22. Quantum Cryptography:
Cryptography
Intro to cryptography
Cryptography is the branch of science and engineering devoted
to the design and implementation of techniques for secure com-
munication, under the assumption that a third party is interested
in reading our messages.
24. Quantum Cryptography:
Cryptography
Symmetric key cryptosystems
Symmetric key cryptosystems, also known as private key
cryptosystems, are encryption algorithms that use a single
key for both encryption and decryption of the ciphertext. In
this field, algorithms for encryption and decryption are
known while the key must remain private, i.e. secret.
25. Quantum Cryptography:
Cryptography
Asymmetric key cryptosystems
Asymmetric key cryptosystems use two keys: a public key
and a private key, the public key is used for encryption and
the private key for decryption. These cryptosystems work
under the rationale of a safe with two keys: the key to lock
the safe is known by everybody but the key for opening is
available to only one person.
26. Quantum Cryptography:
Cryptography
Private key cryptosystems
Private key cryptosystems can be very powerful. For example,
The cryptosystem known as the one-time pad can be proved
to be perfectly secured as long as the key is truly random,
the length of the key is equal to the size of the message and
the key is only used once.
Other private key cryptosystems include the Data Encryp-
tion Standard (DES) and the Advanced Encryption Stan-
dard.
27. Quantum Cryptography:
Cryptography
Key distribution
One of the most sensible issues with private key cryptosystems
is safe key distribution, i.e., the process of establishing a private
key between two users who cannot use a perfectly secure
communication channel.
The issue is the fact that, if the channel used to distribute a
private key is governed by the laws of classical physics, then
in principle any (classical) key can be passively eavesdropped,
i.e. without users becoming aware of this vulnerability.
28. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
In 1984, Charles Bennett and Gilles Brassard proposed a quan-
tum key distribution protocol known as BB84. The key idea of
BB84 is to produce a key by encoding bits in qubits that are
taken from a set composed by the union of the computational
and diagonal bases, i.e., a set of four non-orthogonal quantum
states.
29. Quantum Cryptography:
Cryptography
BB84 Quantum Key distribution
Let us suppose the following setting:
- Alice and Bob want to create a key for encoding a message.
- The key, to be shared by Alice and Bob, must be random and
secret.
- There is a third character: Eve, an eavesdropper.
- The conflict in this story is: Alice and Bob’s key need their key
to be secret and Eve will do anything in her power to reveal at
least some portions of the key.
30. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
- The purpose of BB84 is to produce a key, i.e. actual encoded
data transmission is not part of the BB84.
- Hereinafter, we assume that:
a) Alice has access to a source of individual photons, the exper-
imental equipment and expertise to manipulate the polarization
of her photons, and a source of random bits.
b) There is a channel available to Alice and Bob that they can
use to send quantum states (e.g. an optical fiber.)
c) Bob has the experimental facilities and expertise required to
measure quantum states using different bases.
d) Alice and Bob have a classical channel (e.g. a telephone line)
that may or may not be a secure line, it doesn’t matter.
31. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
The BB84 protocol is composed of the following steps: 1. Alice
starts by generating two sets of random bits A = {a1, a2, . . . an}
and B = {b1, b2, . . . bn}
32. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
2. Alice uses the set of random bits A to select the vector basis
with which she will prepare the initial polarization state of her
photons, according to the following criterion: Alice will read one
bit at a time from set A and, depending on her reading (either 0
or 1), she will choose the computational basis (+) or the diagonal
basis (◊) to prepare her photons. In computational terms, this
step would be more or less equivalent to variable initialization.
33. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
For instance, let us suppose that A = {0, 1, 0, 0, 1, 0, 1, 1, 1, 0}
and that Alice has chosen the following criterion: if 0 then use
the computational basis; if 1 then use the diagonal basis. Then,
Alice would initialize her qubits using the following list: (+, ◊, +,
+, ◊, +, ◊, ◊, ◊, +).
34. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
3. Now, Alice must randomly choose one vector from each basis
to prepare the polarization initial state of each photon. To do so,
Alice will use the elements of set B according to the following
function:
initial polarization state =
Y
_____]
_____[
|0Í (or |1Í) if (+,0)
|1Í( or |0Í) if (+,1)
|+Í( or |≠Í) if (◊,0)
|≠Í( or |+Í) if (◊,1)
35. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
4. Alice sends her qubit sequence to Bob via the quantum chan-
nel they both have access to. This step is Eve’s chance to extract
information from the quantum channel.
36. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
The KEY point to remember here is the following:
– Extracting information from a quantum system (e.g. a pho-
ton) makes irreversible changes in the actual information
contained in the quantum system.
– This is due to a truly exotic property of quantum mechan-
ics: measuring a quantum system is a probabilistic process
that changes the state of the quantum system.
37. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
Measuring a quantum system is equivalent to projecting (as in
analytical geometry) a vector onto a vector basis.
38. Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
So, if Eve is eavesdropping, she will change the contents of any
qubits and that is the footprint that we need in order to detect
her presence!
40. Quantum Cryptography:
Business
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business