Podcasts about symmetric

Mathematical invariance under transformations

  • 87PODCASTS
  • 134EPISODES
  • 30mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Dec 11, 2024LATEST
symmetric

POPULARITY

20172018201920202021202220232024


Best podcasts about symmetric

Latest podcast episodes about symmetric

PING
Post-Quantum Cryptography

PING

Play Episode Listen Later Dec 11, 2024 65:44


In the last episode of PING for 2024, APNIC's Chief Scientist Geoff Huston discusses the shift from existing public-private key cryptography using the RSA and ECC algorithms to the world of ‘Post Quantum Cryptography. These new algorithms are designed to withstand potential attacks from large-scale quantum computers and are capable of implementing Shor's algorithm, a theoretical approach for using quantum computing to break the cryptographic keys of RSA and ECC. Standards agencies like NIST are pushing to develop algorithms that are both efficient on modern hardware and resistant to the potential threats posed by Shor's Algorithm in future quantum computers. This urgency stems from the need to ensure ‘perfect forward secrecy' for sensitive data — meaning that information encrypted today remains secure and undecipherable even decades into the future. To date, maintaining security has been achieved by increasing the recommended key length as computing power improved under Moore's Law, with faster processors and greater parallelism. However, quantum computing operates differently and will be capable of breaking the encryption of current public-private key methods, regardless of the key length. Public-private keys are not used to encrypt entire messages or datasets. Instead, they encrypt a temporary ‘ephemeral' key, which is then used by a symmetric algorithm to secure the data. Symmetric key algorithms (where the same key is used for encryption and decryption) are not vulnerable to Shor's Algorithm. However, if the symmetric key is exchanged using RSA or ECC — common in protocols like TLS and QUIC when parties lack a pre-established way to share keys — quantum computing could render the protection ineffective. A quantum computer could intercept and decrypt the symmetric key, compromising the entire communication. Geoff raises concerns that while post-quantum cryptography is essential for managing risks in many online activities — especially for protecting highly sensitive or secret data—it might be misapplied to DNSSEC. In DNSSEC, public-private keys are not used to protect secrets but to ensure the accuracy of DNS data in real-time. If there's no need to worry about someone decoding these keys 20 years from now, why invest significant effort in adapting DNSSEC for a post-quantum world? Instead, he questions whether simply using longer RSA or ECC keys and rotating key pairs more frequently might be a more practical approach. PING will return in early 2025 This is the last episode of PING for 2024, we hope you've enjoyed listening. The first episode of our new series is expected in late January 2025. In the meantime, catch up on all past episodes.

Powerful and Passionate Healthcare Professionals Podcast
From App Testing to Early Disease Detection

Powerful and Passionate Healthcare Professionals Podcast

Play Episode Listen Later Oct 30, 2024 20:45


AI-Driven Healthcare: From App Testing to Early Disease DetectionAre you curious about how AI is transforming healthcare, from behind-the-scenes operations to life-saving diagnoses? In our latest podcast episode, we dive deep into the world of AI-powered healthcare solutions that are changing the game for hospitals and patients alike.

The Post-Quantum World
Zero-Trust Post-Quantum Cryptography – with Richard Blech of XSOC

The Post-Quantum World

Play Episode Listen Later Jul 24, 2024 35:22


The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking and government environments also require other layers of security and strategies, such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses with his guest, Richard Blech from XSOC, a high-performance symmetric encryption solution that will provide defense in-depth today and after thousands of logical qubits arrive.  For more on XSOC, visit www.xsoccorp.com/ .  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.  Questions and comments are welcome!   Theme song by David Schwartz, copyright 2021.   The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Der Podcast für junge Anleger jeden Alters
Song #55: Im Bau (Sebastian "B-Kwem" Leben prod. by Symmetric)

Der Podcast für junge Anleger jeden Alters

Play Episode Listen Later Jun 16, 2024 3:10


Sun, 16 Jun 2024 03:45:00 +0000 https://jungeanleger.podigee.io/1558-song-55-im-bau-sebastian-b-kwem-leben-prod-by-symmetric 024523e24005ebf8cb42151229cc5b0f Im Bau ist ein Song von Börsenradio-Legende Sebastian Leben, produziert von Symmetric. Am 21. Juni geht eine Börsepeople-Folge mit Sebastian live, wir sprechen dort über eine tolle Zeit als Kollegen, über den starken Podcast "Broke und Broker", aber auch ganz offen über eine lebensbedrohliche Erkrankung, mit der Sebastian offen und vor allem erfolgreich umgeht. Statistisch gesehen haben sich seine Chancen wieder deutlich verbessert. Aber hier mal "Im Bau". Weiterer Song von Sebastian: Probleme https://audio-cd.at/page/playlist/1727 Sebastian Börsepeople ab 21.6.: http://www.audio-cd.at/people . https://brokeundbroker.de Er spricht das "Homey B" in meinem täglichen Jingle der Wiener Börse Party: http://www.audio-cd.at/wienerboerseplausch Er hat mein "Stadtsong"-Refrain cooler gemacht: https://audio-cd.at/page/playlist/1985 - mehr Songs: https://www.audio-cd.at/songs - Playlist mit ein paar unserer Songs: https://open.spotify.com/playlist/63tRnVh3aIOlhrdUKvb4P Bewertungen bei Apple (oder auch Spotify) machen mir Freude: http://www.audio-cd.at/apple http://www.audio-cd.at/spotify 1558 full no Christian Drastil Comm.

Neurology Today - Neurology Today Editor’s Picks
Code for ICH, new findings on Havana syndrome, distal symmetric polyneuropathy underdiagnosed in low income primary care clinics

Neurology Today - Neurology Today Editor’s Picks

Play Episode Listen Later Jun 6, 2024 4:44


In this week's podcast, Neurology Today's editor-in-chief discusses a push among neurocritical care experts to develop a code procedure for intracerebral hemorrhage, new findings showing people with Havana syndrome have functional neurologic disorder, and a study reporting distal symmetric polyneuropathy is more prevalent but less diagnosed in primary care clinics in low-income areas.   This podcast is sponsored by argenx. Visit www.vyvgarthcp.com for more information.

PRS Journal Club
“Symmetric Breast Surgery” with Scott Hollenbeck, MD - Apr. 2024 Journal Club

PRS Journal Club

Play Episode Listen Later Apr 3, 2024 16:46


In this episode of the Award-winning PRS Journal Club Podcast, 2024 Resident Ambassadors to the PRS Editorial Board – Rami Kantar, Yoshi Toyoda, and Amanda Sergesketter- and special Scott Hollenbeck, MD, discuss the following articles from the April 2024 issue: “Symmetric Breast Surgery: Balancing Procedures versus Prophylactic Mastectomy and Immediate Reconstruction” by Bitoiu, Grigor, Hardy, et al. Read the article for FREE: https://bit.ly/BalancingBreastSurgery Special guest Dr. Scott Hollenbeck completed his medical degree at The Ohio State University followed by general surgery residency at Cornell and plastic surgery training at Duke University. He started his career at Duke University, where he led the Duke Flap Course and was Vice Chief of Research and Director of Breast Reconstruction, and this past year was appointed the Raymond F. Morgan Professor & Chair of the Department of Plastic Surgery at the University of Virginia. His clinical interests focus on microsurgical reconstruction and breast reconstruction. He holds many leadership positions nationally and this year is serving as the President-Elect of ASPS READ the articles discussed in this podcast as well as free related content: https://bit.ly/JCApril24Collection

PRS Journal Club
April 2024 Journal Club: Symmetric Breast Surgery; ADM versus No ADM in Prepectoral TEs; Medicare Reimbursement Trend Comparison

PRS Journal Club

Play Episode Listen Later Mar 27, 2024 55:06


In this episode of the Award-winning PRS Journal Club Podcast, 2024 Resident Ambassadors to the PRS Editorial Board – Rami Kantar, Yoshi Toyoda, and Amanda Sergesketter- and special Scott Hollenbeck, MD, discuss the following articles from the April 2024 issue:   “Symmetric Breast Surgery: Balancing Procedures versus Prophylactic Mastectomy and Immediate Reconstruction” by Bitoiu, Grigor, Hardy, et al.   “Early Complications in Prepectoral Breast Reconstructions with and without Acellular Dermal Matrix: A Preliminary Analysis of Outcomes” by Plotsker, Graziano, Rubenstein, et al.   “Comparing Trends in Medicare Reimbursement and Inflation within Plastic Surgery Subspecialties” Stoffel, Shim, Pacella, et al.   Special guest Dr. Scott Hollenbeck completed his medical degree at The Ohio State University followed by general surgery residency at Cornell and plastic surgery training at Duke University. He started his career at Duke University, where he led the Duke Flap Course and was Vice Chief of Research and Director of Breast Reconstruction, and this past year was appointed the Raymond F. Morgan Professor & Chair of the Department of Plastic Surgery at the University of Virginia. His clinical interests focus on microsurgical reconstruction and breast reconstruction. He holds many leadership positions nationally and this year is serving as the President-Elect of ASPS   READ the articles discussed in this podcast as well as free related content: https://bit.ly/JCApril24Collection   #PRSJournalClub

RADIO LOCALITIZ
Le Coin de l'EP : K. - All the Hearts Symmetric (vol.2)

RADIO LOCALITIZ

Play Episode Listen Later Mar 3, 2024 1:20


Konstantin du groupe K. nous présente leur nouvel EP All the Hearts Symmetric (vol.2) Pour l'écouter rendez-vous sur la page : https://www.radiolocalitiz.fr/k-all-the-hearts-symmetric-vol-2/ Soutenez-nous sur helloasso.com !

Tech Writer koduje
#61 Tech Writer zaczyna wdrażać semantic search, czyli kilka praktycznych wskazówek na początek

Tech Writer koduje

Play Episode Listen Later Dec 22, 2023 34:34


Po długich miesiącach gadania, przyszedł czas na działanie - wreszcie rozpoczęliśmy wdrażanie semantic searcha! Przejście od teorii do praktyki było dość trudne, dlatego mamy dla Was garść informacji, które ułatwią Wam wejście w temat. Rozmawiamy o tym czym jest semantic search, jakie nam daje korzyści w porównaniu do tradycyjnego wyszukiwania, co musimy mieć, żeby go wdrożyć, jak połączyć ze sobą poszczególne elementy całej układanki i jak takie rozwiązanie zaimplementować. Informacje dodatkowe: "What is semantic search?", Elastic: https://www.elastic.co/what-is/semantic-search "Large language model (LLM)", Wikipedia: https://en.wikipedia.org/wiki/Large_language_model "What Is Retrieval-Augmented Generation, aka RAG?", NVIDIA Blogs: https://blogs.nvidia.com/blog/what-is-retrieval-augmented-generation/ "Hybrid Search Explained", Weaviate: https://weaviate.io/blog/hybrid-search-explained "Semantic search", SBERT: https://www.sbert.net/examples/applications/semantic-search/README.html#semantic-search Hugging Face: https://huggingface.co/ PyTorch: https://pytorch.org/ TensorFlow: https://www.tensorflow.org/ Node.js: https://nodejs.org/en Elasticsearch: https://www.elastic.co/elasticsearch Kubernetes: https://kubernetes.io/ "Build Semantic-Search with Elastic search and BERT vector embeddings. ( From scratch )", Abid Saudagar: https://www.youtube.com/watch?v=KSwPR9eig7w Jupyter Notebook: https://jupyter.org/ SentenceTransformers Documentation: https://www.sbert.net/ "k-nearest neighbor (kNN) search", Elastic Docs: https://www.elastic.co/guide/en/elasticsearch/reference/current/knn-search.html Transformers.js, Hugging Face: https://huggingface.co/docs/transformers.js/index "Export to ONNX", Hugging Face docs: https://huggingface.co/docs/transformers/serialization "Symmetric vs. Asymmetric Semantic Search", SBERT: https://www.sbert.net/examples/applications/semantic-search/README.html#symmetric-vs-asymmetric-semantic-search "Tutorial: semantic search with ELSER", Elastic Docs: https://www.elastic.co/guide/en/elasticsearch/reference/current/semantic-search-elser.html "The Beginner's Guide to Text Embeddings", Deepset: https://www.deepset.ai/blog/the-beginners-guide-to-text-embeddings

Sales Enablement Society - Stories From The Trenches
Ep. 64 - Jonathan "Coach K" Kvarfordt - Enablement AI

Sales Enablement Society - Stories From The Trenches

Play Episode Listen Later Nov 7, 2023 28:05 Transcription Available


Do you ever wonder about the intriguing intersection of AI and sales enablement? Join us as we sit down with Jonathan Carford, aka Coach K, the new head of revenue enablement for an exciting startup, Symmetric. Unravel the mystery between predictive analytics and true AI as Jonathan shines a light on their key differences and how to unlock the full potential of each platform to streamline your work and increase efficiency. Strolling through the futuristic world of AI application in sales, we marvel at the brilliant revolution it brings. Imagine having an interactive AI persona to practice your sales pitch or an AI assistant that researches job histories and companies for your presentations. We delve into the role of product marketing, enablement, and revops in developing customer personas and the prospect of AI generating innovative ideas. Not to mention, the potential of AI analysing 10ks for those who are not business school graduates.Finally, we round off the conversation with Coach K's experiences with AI auto-tagging in CMS systems - a game-changer making content management a breeze. Jonathan also shares his criteria for evaluating AI platforms and shares nuggets of wisdom on trusting your instincts and embracing failure. We discuss the subtle art of LinkedIn connections, providing valuable tips to handle requests. Be sure to tune in to this enriching episode on the future of sales enablement and AI. Join us and Coach K on this journey - you won't want to miss it!Please subscibe on Apple, Spotify or Google.

featured Wiki of the Day
Affine symmetric group

featured Wiki of the Day

Play Episode Listen Later Oct 8, 2023 2:06


Episode 2347: Our featured article of the day is Affine symmetric group.

ASecuritySite Podcast
Bill Buchanan - Meet New PQC Signature Contenders

ASecuritySite Podcast

Play Episode Listen Later Aug 9, 2023 9:29


Digital signatures are the foundation of our digital trust. With this, Bob has a key pair: a private key and a public key. In order to provide his identity, he signs a hash of a message with his private key, and then Alice proves this with his public key. Currently, we mainly use RSA, ECDSA and EdDSA for our signature methods, and where DSA signatures (which use discrete logs) have been dropped for their creation. For example, ECDSA is used with Bitcoin and Ethereum, and RSA is often used to identify Web sites. EdDSA is now on the rise, and is part of the FIPS-186–5 standard. Unforunately, we will need to replace these methods — as quantum computers can crack them. The other area that needs to be replaced is key exchange and public key encryption. These days we typically use ECDH (Elliptic Curve Diffie Hellman) for key exchange, and RSA for public key encryption. These will have to be replaced with quantum-robust methods — Post Quantum Cryptography (PQC). Goodbye RSA and ECC, and Hello to PQC And, so, using Shor's algorithm, quantum computers will be able to crack RSA, discrete logs and ECC (Elliptic Curve Cryptography), and so we need to remove RSA, ECDSA and EdDSA and replace them with methods that are quantum robust. For this, NIST has been running a competition for the last few years, and where CRYSTALS-Dilithium and SPHINCS+ were selected as the winners for PQC digital signatures. There are no other candidates that are being assessed from the previous round. Overall, Dilithium is a lattice-based method, while SPHINCS+ uses a hash-based signature method. But what if these methods are cracked? Well, it happened to two of the finalists for the NIST competition: Rainbow and SIKE, and where the methods were cracked in the final round of the competition. For KEM (Key Exchange Mechanisms) to replace ECDH (Elliptic Curve Diffie Hellman) and Public Key Encryption (PKE) to replace RSA, NIST has standardized CRYSTALS-Kyber, and is still assessing BIKE, Classic McEliece, HQC, and SIKE. Additional Signatures: Round 1 And, so, NIST is on the look-out for alternatives for Dilithium and has set up a new competition [here]: In the first round, we have: Code-based Signatures: CROSS (Codes and Restricted Objects Signature Scheme); Enhanced pqsigRM; FuLeeca; LESS (Linear Equivalence Signature Scheme) and MEDS (Matrix Equivalence Digital Signature Wave). Isogenies: SQIsign. Lattice based: EagleSign; EHTv3 and EHTv4; HAETAE; HAWK; HuFu (Hash-and-Sign Signatures From Powerful Gadgets); Raccoon; and SQUIRRELS (Square Unstructured Integer Euclidean Lattice Signature). MPC in the head: MIRA; MiRitH (MinRank in the Head); MQOM (MQ on my Mind); PERK; RYDE; and SDitH (Syndrome Decoding in the Head). Multivariate Signatures (Oil and Vinegar): 3WISE; Biscuit; DME-Sign; HPPC (Hidden Product of Polynomial Composition); MAYO; PROV (PRovable unbalanced Oil and Vinegar); QR-UOV; SNOVA; TUOV (Triangular Unbalanced Oil and Vinegar); UOV (Unbalanced Oil and Vinegar); and VOX. Symmetric-based Signatures: AIMer; Ascon-Sign; FAEST; and SPHINCS-alpha. Doing a quick count, we have: Multivariate: 11; Lattice: 7; Code-based: 5; MPC-in-the-head: 5; Symmetric-based: 4; and Isogenies: 1. So, multivariate seems to be leading the way, with lattice methods being popular too. But poor old isogenies only has one contender. This may be due to the crack on an isogeny-based method (Supersingular Isogeny Key Encapsulation SIKE), or that isogenies are better suited to key exchange techniques. And so, let's look at the basic methods and some previous examples. Multivariate — Unbalanced Oil and Vinegar (UOV) With multivariate cryptography, we have n variables within polynomial equations. For example, if we have four variables (w,x,y,z) and an order of two, we could have [here]: w²+4wx+3x²+2wy−4wz+2wx+6xz=387 Generally, this is a hard problem to solve, so we want to make it easy if we know a secret. In this case, I know that the solution is w=7,x=4,y=5, and z=6. Oil and Vinegar Makes A Hard Problem Easy Fixing The Hole In The Internet in a Post Quantum World medium.com   Lattice To understand lattice cryptography, you need to understand polynomials, as our bit values are converted into polynomials. Our operations are then conducted with polynomial multiplies and addition, and taken with a (mod p) operation (and where p will be the maximum value we generate for the polynomial values). The Magic of Lattice and The Eye of a Falcon To understand lattice cryptography, you need to understand polynomials, as our bit values are converted into… medium.com   Code-based This method was created in 1978 with the McEliece cryptosystem but has barely been used in real applications. The McEliece method uses linear codes that are used in error-correcting codes and involves matrix-vector multiplication. An example of a linear code is Hamming code [here]. McEliece and Rust: Edging Slowly To A NIST Standard for PQC We live in a world that is dominated by large (and faceless) corporations, but it is individuals who have often built… medium.com   MPC-in-the-head These methods use non-interactive zero-knowledge proofs of knowledge and MPC (Multiparty Computation). With MPC we can split a problem into a number of computing elements, and these can be worked on in order to produce the result, and where none of the elements can see the working out at intermediate stages. The great advantage of this method is that we only use symmetric key methods (block ciphers and hashing functions). Let's Go For A Post-Quantum Picnic And then there were three: CRYSTALS Dilithium, Falcon and Rainbow. These are the finalists for the NIST standard for… medium.com   Symmetric These methods uses standard cryptographic methods such as symmetric key encryption and hashes. Typically they use AES and SHA3 — and which are quantum robust. Isogenies If we have two elliptic curves (E1 and E2), we can create a function that maps a point (P) on E1 to a point Q on E2. This function is known as an isogeny. If we can map this function, every point on E1 can be mapped to E2. Our secret key is then the isogeny and the public key is the elliptic curve. For key exchange, Bob and Alice mix their isogeny and the other side's curve to generate a secret curve. Isogenies? The End Game for Public Key Encryption? Well, we are now at the final stage of NIST's post-quantum cryptography standardization, and which started in 2016: medium.com   Conclusions Exciting times are ahead as the methods go up and against each. In the last competition, some of the methods fell because of a problem with their parameters (Rainbow — UOV) or because of a core weakness (isogenies). But, this time, they are all likely to come back strong and (hopefully) compete well against the lattice methods.

ASecuritySite Podcast
Bill Buchanan - A Bluffers Guide To Symmetric Key Encryption Modes

ASecuritySite Podcast

Play Episode Listen Later Aug 6, 2023 8:49


Blog: https://medium.com/asecuritysite-when-bob-met-alice/a-bluffers-guide-to-symmetric-key-encryption-modes-f7882881f6d Symmetric key encryption involves a single key to encrypt and decrypt and where Bob and Alice can use the same encryption key. The two most popular symmetric key methods are AES — Advanced Encryption Standard — and ChaCha20. Along with this, we either have a block cipher or a stream cipher. With a block cipher, we process a number of bytes at a time with our ciphering process. With AES, we have a 128-bit block size, and thus process 16 bytes for each block. For a stream cipher, we generate a pseudo infinitely long key stream from a passphrase or random value, and then just XOR this with the plaintext. The size of the key stream is match to the number of bytes in the plaintext. To decrypt, we just generate the same key stream, and XOR it with the ciphertext to recover the plaintext. I am often surprised by how little care many companies have in their encryption process and do not review the fundamental weaknesses of using symmetric key encryption. For many, it is a tick-box approach, where an auditor just asks if they are using encryption or not. It should not be, and there are many weaknesses that need to be taken into account. So, here's the bluffer's guide to modes in AES: ECB (Electronic Code Book). This is the fastest mode and should NEVER be used, as there is no salt (IV) used in the ciphering process. This mode is only used for academic purposes to show what can go wrong if salt is not added to the encryption process. With this, the ciphertext will always be the same for the same plaintext, and it is possible to easily crack by looking at patterns in the data. All of the other modes have a salt (IV or nonce) value: CTR (Counter). This is an excellent mode which has a counter for each block, and then converts to a stream cipher. It is nearly as fast as ECB, and can be processed in parallel. It can be played back in a different session and can have little in the way to integrity check, and where Eve can flip bits and change the plaintext from the ciphertext. We need all the ciphertext before we can use the plaintext. A demo of breaking CTR is: https://billatnapier.medium.com/can-i-break-aes-encryption-yes-31bdf539aba0 GCM (Galois/Counter Mode). This is almost the same as CTR and is a stream cipher, but slower than CTR (but still relatively fast overall. It has the advantage of adding additional data, such as for a session ID, and thus protects against playback. GCM (Galois/Counter Mode). The main change from CTR is to add a MAC, and so the bit-flipping method would be near impossible to implement. This mode implements AEAD (Authenticated Encryption with Additional Data), and is useful in defending against playback attacks. It can suffer from nonce reuse, though. CBC (Cipher Block Chain). This is a block mode which thus requires padding before encryption and after decryption. While achieving the same speeds as ECB for a small amount of data, it slows down with larger amounts — because of the block-chaining process. It is seen to be a little cumbersome and has a few issues with security. CCM (counter with cipher block chaining message authentication code; counter with CBC-MAC). This is a stream cipher mode and has a similar performance to CBC. It integrates better integrity checks with a MAC (message authentication code). ChaCha20. It is not AES — which can be a good thing. Along with this, it is a stream cipher (and so fast in its operation). It is typically not as fast at CTR and GCM, but faster than CBC. Overall, AES tends to be accelerated for its processing on x64/x86 chips, but not for ChaCha20. As with AES GCM mode, ChaCha20 implements AEAD (Authenticated Encryption with Additional Data) and is useful in defending against playback attacks. There are other modes, such as OFB (Output Feedback) and CFB (Cipher Feedback), but these are not used that much. For this in the finance industry, you might also be using 3DES, and which has not been broken, but is much slower than AES and ChaCha20. Here are some performance tests [here]: Generally, the stream ciphers can struggle against nonce reuse, and if the same nonce is used, it can be possible to break AES by XOR'ing cipher streams. And to show the breaking of the integrity of AES: Can You Trust AES Encryption? In this article, I will not break the AES method (as it has yet to be broken), but breach its integrity. This is… billatnapier.medium.com   But, it's NIST defined! There is no guarantee that because NIST defines something as a standard that it will be secure, as it all depends on the implementation. ECDSA and EdDSA are NIST standards but have been easily broken in the past with poor implementations. We have seen that CTR mode is weak against bit-flipping, and where GCM creates a MAC to defend against this. While it is nearly impossible to flip the bits of the cipher and of the MAC, and for them to tie-up, it is certainly possible to recreate a valid MAC and replace it, when a nonce is reused. So, companies who take security seriously should understand their risks, and test accordingly. Those involved in areas of high risk, such as dealing with financial data and PII, should understand the risks in the methods they implement and not just tick a box to say that they have encrypted the data. I have seen many examples of companies ploughing on with the same old encryption methods — even though they have significant weaknesses.

Investment Terms
Investment Term for the Day - Adverse Selection

Investment Terms

Play Episode Listen Later May 30, 2023 1:30


Adverse selection refers generally to a situation in which sellers have information that buyers do not have, or vice versa, about some aspect of product quality. In other words, it is a case where asymmetric information is exploited. Asymmetric information, also called information failure, happens when one party to a transaction has greater material knowledge than the other party. Typically, the more knowledgeable party is the seller. Symmetric information is when both parties have equal knowledge. In the case of insurance, adverse selection is the tendency of those in dangerous jobs or high-risk lifestyles to purchase products like life insurance. In these cases, it is the buyer who actually has more knowledge. To fight adverse selection, insurance companies reduce exposure to large claims by limiting coverage or raising premiums.This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/4432332/advertisement

Leverage Podcast
233: The Ethics of Flaking – Understanding Symmetric Investment Levels in Dating

Leverage Podcast

Play Episode Listen Later May 26, 2023 56:32


On this episode of Inner Confidence Podcast, Robbie Kramer is joined by Amir to discuss dating strategies and navigating the challenges that come with scheduling. The conversation covers topics such as flaking, symmetric investment levels in relationships, and putting pressure on potential partners. Host Kramer shares his passion for improving men's love lives and recommends [...]

Leverage Podcast
233: The Ethics of Flaking – Understanding Symmetric Investment Levels in Dating

Leverage Podcast

Play Episode Listen Later May 26, 2023 56:32


On this episode of Inner Confidence Podcast, Robbie Kramer is joined by Amir to discuss dating strategies and navigating the challenges that come with scheduling. The conversation covers topics such as flaking, symmetric investment levels in relationships, and putting pressure on potential partners. Host Kramer shares his passion for improving men’s love lives and recommends […] The post 233: The Ethics of Flaking – Understanding Symmetric Investment Levels in Dating appeared first on Inner Confidence.

Open jazz
Nicolas Gardel & Baptiste Herbin en symmétrie

Open jazz

Play Episode Listen Later Mar 8, 2023 54:27


durée : 00:54:27 - Nicolas Gardel & Baptiste Herbin - par : Alex Dutilh - Le projet “Symmetric” est le fruit de la rencontre entre le saxophoniste Baptiste Herbin et le trompettiste Nicolas Gardel. Ils mettent en symétrie leurs univers, celui du jazz de Baptiste Herbin et de la musique actuelle de Nicolas Gardel. Parution chez Matrisse Productions/L'Autre Distribution.

RADIO LOCALITIZ
Le Coin de l'EP : K. - All the Hearts Symmetric

RADIO LOCALITIZ

Play Episode Listen Later Mar 5, 2023 1:22


Konstantin de K. nous présente leur nouvel EP All the Hearts Symmetric Rendez-vous sur sa page : https://www.radiolocalitiz.fr/k-all-the-hearts-symmetric/ https://open.spotify.com/album/44FHCDuP1noYMko9TZmbaT?si=IO54t5EmSTmTfVFYTjGQ5A  

Cyber Work
How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks

Cyber Work

Play Episode Listen Later Jan 5, 2023 7:18


Whether you're studying for the CEH, CISSP, Pentest+, or even the Security+, there's always one question about cryptography, and it's easy to miss! Want to hear a cool trick to keep symmetric and asymmetric cryptography straight in your head? Keatron Evans has one, and he told it to me — stay tuned and listen closely because it's a Cyber Work Hacks!0:00 - Cryptography exam tips0:23 - Certifications with cryptography questions1:15 - Symmetric versus asymmetric cryptography3:40 - Learn more about cryptography4:50 - Find and learn from Keatron EvansAbout InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.

PaperPlayer biorxiv neuroscience
Emergence of brain-like mirror-symmetric viewpoint tuning in convolutional neural networks

PaperPlayer biorxiv neuroscience

Play Episode Listen Later Jan 5, 2023


Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2023.01.05.522909v1?rss=1 Authors: Farzmahdi, A., Zarco, W., Freiwald, W., Kriegeskorte, N., Golan, T. Abstract: Primates can recognize objects despite 3D geometric variations such as in-depth rotations. The computational mechanisms that give rise to such invariances are yet to be fully understood. A curious case of partial invariance occurs in the macaque face-patch AL and in fully connected layers of deep convolutional networks in which neurons respond similarly to mirror-symmetric views (e.g., left and right profiles). Why does this tuning develop? Here, we propose a simple learning-driven explanation for mirror-symmetric viewpoint tuning. We show that mirror-symmetric viewpoint tuning for faces emerges in the fully connected layers of convolutional deep neural networks trained on object recognition tasks, even when the training dataset does not include faces. First, using 3D objects rendered from multiple views as test stimuli, we demonstrate that mirror-symmetric viewpoint tuning in convolutional neural network models is not unique to faces: it emerges for multiple object categories with bilateral symmetry. Second, we show why this invariance emerges in the models. Learning to discriminate among bilaterally symmetric object categories induces reflection-equivariant intermediate representations. AL-like mirror-symmetric tuning is achieved when such equivariant responses are spatially pooled by downstream units with sufficiently large receptive fields. These results explain how mirror-symmetric viewpoint tuning can emerge in neural networks, providing a theory of how they might emerge in the primate brain. Our theory predicts that mirror-symmetric viewpoint tuning can emerge as a consequence of exposure to bilaterally symmetric objects beyond the category of faces, and that it can generalize beyond previously experienced object categories. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC

Astro arXiv | all categories
The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object?

Astro arXiv | all categories

Play Episode Listen Later Nov 24, 2022 0:44


The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object? by A. Marecki et al. on Thursday 24 November We observed the core region of the giant radio galaxy GRS J0844+4627 with e-MERLIN at 1.52 and 5.07 GHz. These observations revealed that the apparent single feature at the centre of GRS J0844+4627, as seen by GMRT, consists of two components separated by 2.7 kpc in projection. Follow-up observations at 1.66 GHz using the EVN unveiled the complex morphologies of the two components. In particular, the south-western component identified with the SDSS J084408.85+462744.2 galaxy morphologically resembles a compact symmetric object (CSO) with a projected linear size of 115 pc. If the CSO hypothesis turns out to be correct, then the overall radio structure of GRS J0844+4627 is triple-double. Given that CSOs are considered young objects, GRS J0844+4627 would appear as a recently restarted active galaxy. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2209.01428v2

Astro arXiv | all categories
The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object?

Astro arXiv | all categories

Play Episode Listen Later Nov 23, 2022 0:50


The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object? by A. Marecki et al. on Wednesday 23 November We observed the core region of the giant radio galaxy GRS J0844+4627 with e-MERLIN at 1.52 and 5.07 GHz. These observations revealed that the apparent single feature at the centre of GRS J0844+4627, as seen by GMRT, consists of two components separated by 2.7 kpc in projection. Follow-up observations at 1.66 GHz using the EVN unveiled the complex morphologies of the two components. In particular, the south-western component identified with the SDSS J084408.85+462744.2 galaxy morphologically resembles a compact symmetric object (CSO) with a projected linear size of 115 pc. If the CSO hypothesis turns out to be correct, then the overall radio structure of GRS J0844+4627 is triple-double. Given that CSOs are considered young objects, GRS J0844+4627 would appear as a recently restarted active galaxy. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2209.01428v2

Astro arXiv | all categories
The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object?

Astro arXiv | all categories

Play Episode Listen Later Nov 23, 2022 0:49


The structure at the centre of the giant radio galaxy GRS J0844+4627: a compact symmetric object? by A. Marecki et al. on Wednesday 23 November We observed the core region of the giant radio galaxy GRS J0844+4627 with e-MERLIN at 1.52 and 5.07 GHz. These observations revealed that the apparent single feature at the centre of GRS J0844+4627, as seen by GMRT, consists of two components separated by 2.7 kpc in projection. Follow-up observations at 1.66 GHz using the EVN unveiled the complex morphologies of the two components. In particular, the south-western component identified with the SDSS J084408.85+462744.2 galaxy morphologically resembles a compact symmetric object (CSO) with a projected linear size of 115 pc. If the CSO hypothesis turns out to be correct, then the overall radio structure of GRS J0844+4627 is triple-double. Given that CSOs are considered young objects, GRS J0844+4627 would appear as a recently restarted active galaxy. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2209.01428v2

Cybercrime Magazine Podcast
Quantum Minute. The Adoption Of Symmetric Key Systems. Sponsored By ARQIT.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 14, 2022 1:14


The "Quantum Minute" is brought to you by ARQIT, providers of transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens. Arqit supplies a unique quantum encryption Platform-as-a-Service which makes the communications links of any networked device secure against current and future forms of attack – even from a quantum computer. To learn more, visit https://arqit.uk.

Root Causes: A PKI and Security Podcast
Root Causes 254: Toyota Symmetric Key Exposed on GitHub

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Nov 8, 2022 10:53


In a recently exposed error, key material for a popular automobile manufacturer's PKI has been discovered on GitHub, resulting in exposure of sensitive information. In this episode we explain the dual errors that led to this breach.

Astro arXiv | all categories
Evolution of collisional neutrino flavor instabilities in spherically symmetric supernova models

Astro arXiv | all categories

Play Episode Listen Later Oct 17, 2022 0:52


Evolution of collisional neutrino flavor instabilities in spherically symmetric supernova models by Zewei Xiong et al. on Monday 17 October We implement a multi-group and discrete-ordinate neutrino transport model in spherical symmetry which allows to simulate collective neutrino oscillations by including realistic collisional rates in a self-consistent way. We utilize this innovative model, based on strategic parameter rescaling, to study a recently proposed collisional flavor instability caused by the asymmetry of emission and absorption rates between $nu_e$ and $barnu_e$ for four different static backgrounds taken from different stages in a core-collapse supernova simulation. Our results confirm that collisional instabilities generally exist around the neutrinosphere during the SN accretion and post-accretion phase, as suggested by [arXiv:2104.11369]. However, the growth and transport of flavor instabilities can only be fully captured by models with global simulations as done in this work. With minimal ingredient to trigger collisional instabilities, we find that the flavor oscillations and transport mainly affect (anti)neutrinos of heavy lepton flavors around their decoupling sphere, which then leave imprints on their energy spectra in the free-streaming regime. For electron (anti)neutrinos, their properties remain nearly intact. We also explore various effects due to the decoherence from neutrino-nucleon scattering, artificially enhanced decoherence from emission and absorption, neutrino vacuum mixing, and inhomogeneous matter profile, and discuss the implication of our work. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2210.08254v1

Astro arXiv | all categories
A Force Explosion Condition for Spherically Symmetric Core-collapse Supernovae

Astro arXiv | all categories

Play Episode Listen Later Sep 21, 2022 0:49


A Force Explosion Condition for Spherically Symmetric Core-collapse Supernovae by Mariam Gogilashvili et al. on Wednesday 21 September Understanding which stars explode leaving behind neutron stars and which stars collapse forming black holes remains a fundamental astrophysical problem. We derive an analytic explosion condition for spherically symmetric core-collapse supernovae. The derivation starts with the exact governing equations, considers the balance of integral forces, includes the important dimensionless parameters, and includes an explicit set of self-consistent approximations. The force explosion condition is $tilde{L}_nutau_g - 0.06 tilde{kappa} > 0.38$, and only depends upon two dimensionless parameters. The first compares the neutrino power deposited in the gain region with the accretion power, $tilde{L}_nu tau_g = L_{nu} tau_g R_{rm NS}/ ( G dot{M} M_{rm NS})$. The second, $tilde{kappa} = kappa dot{M} / sqrt{G M_{rm NS} R_{rm NS}}$, parameterizes the neutrino optical depth in the accreted matter near the neutron-star surface. Over the years, many have proposed approximate explosion conditions: the critical neutrino-luminosity, ante-sonic, and timescale conditions. We are able to derive these other conditions from the force explosion condition, which unifies them all. Using numerical, steady-state and fully hydrodynamic solutions, we test the explosion condition. The success of these tests is promising in two ways. One, the force explosion condition helps to illuminate the underlying physics of explosions. Two, this condition may be a useful explosion diagnostic for more realistic, three-dimensional radiation hydrodynamic core-collapse simulations. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2110.10173v2

Astro arXiv | all categories
A Force Explosion Condition for Spherically Symmetric Core-collapse Supernovae

Astro arXiv | all categories

Play Episode Listen Later Sep 21, 2022 0:49


A Force Explosion Condition for Spherically Symmetric Core-collapse Supernovae by Mariam Gogilashvili et al. on Wednesday 21 September Understanding which stars explode leaving behind neutron stars and which stars collapse forming black holes remains a fundamental astrophysical problem. We derive an analytic explosion condition for spherically symmetric core-collapse supernovae. The derivation starts with the exact governing equations, considers the balance of integral forces, includes the important dimensionless parameters, and includes an explicit set of self-consistent approximations. The force explosion condition is $tilde{L}_nutau_g - 0.06 tilde{kappa} > 0.38$, and only depends upon two dimensionless parameters. The first compares the neutrino power deposited in the gain region with the accretion power, $tilde{L}_nu tau_g = L_{nu} tau_g R_{rm NS}/ ( G dot{M} M_{rm NS})$. The second, $tilde{kappa} = kappa dot{M} / sqrt{G M_{rm NS} R_{rm NS}}$, parameterizes the neutrino optical depth in the accreted matter near the neutron-star surface. Over the years, many have proposed approximate explosion conditions: the critical neutrino-luminosity, ante-sonic, and timescale conditions. We are able to derive these other conditions from the force explosion condition, which unifies them all. Using numerical, steady-state and fully hydrodynamic solutions, we test the explosion condition. The success of these tests is promising in two ways. One, the force explosion condition helps to illuminate the underlying physics of explosions. Two, this condition may be a useful explosion diagnostic for more realistic, three-dimensional radiation hydrodynamic core-collapse simulations. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2110.10173v2

Cybercrime Magazine Podcast
Quantum Minute. The Future Lies In Symmetric Encryption. Sponsored By ARQIT.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 16, 2022 0:52


The "Quantum Minute" is brought to you by ARQIT, providers of transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens. Arqit supplies a unique quantum encryption Platform-as-a-Service which makes the communications links of any networked device secure against current and future forms of attack – even from a quantum computer. To learn more, visit https://arqit.uk.

InfosecTrain
What is Cryptography | Types of Cryptography | InfosecTrain

InfosecTrain

Play Episode Listen Later Jul 11, 2022 13:46


Cryptography is the practice of encrypting all data and information for safe communication by converting plain text to cipher text. There are three types of cryptography in general: Symmetric key cryptography Asymmetric key cryptography Hash function ✅Our Official Website - https://www.infosectrain.com/ ✅For more details or free demo with out expert write into us at sales@infosectrain.com or call us at IND: 1800-843-7890 / US: +1 657-722-11127 / UK : +44 7451 208413 Subscribe to our channel to get video updates. Hit the subscribe button above. Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train LinkedIn: https://www.linkedin.com/company/infosec-train/ Instagram: https://www.instagram.com/infosectrain/ Telegram: https://t.me/infosectrains

Carry the Two
Dario Bauso on Honeybees

Carry the Two

Play Episode Listen Later Jul 5, 2022 19:29


Welcome to the second episode of Carry the Two! We’re the show for people who enjoy discovering hidden elements that impact our lives in the most unexpected ways. In this episode, Ian and Sadie talk about how honeybees decide on new hive locations when they outgrow their current home. With the help of mathematician Dario Bauso, they learn how researchers use mean field games to model such decision-making and how it applies to other cases as well. Find our transcript here: LINK Curious to learn more? Check out these additional links: https://www.imsi.institute/videos/mean-field-game-for-collective-decision-making-in-honeybees-via-switched-systems/ (Dario’s talk at IMSI) https://ieeexplore.ieee.org/document/9529000 L. Stella, D. Bauso, P. Colaneri, "Mean-Field Games for Collective Decision-Making in Honeybees via Switched Systems", IEEE Transactions on Automatic Control, online doi: 10.1109/TAC.2021.3110166 https://www.sciencedirect.com/science/article/abs/pii/S0005109818305375 L. Stella and D. Bauso, “Bio-inspired evolutionary dynamics on complex networks under uncertain cross-inhibitory signals", Automatica vol. 100, 2019, pp. 61--66 https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0073216 D. Pais et al., "A mechanism for value-sensitive decision-making", PLoS ONE, vol. 8, no. 9, Sep. 2013 10.1109/LCSYS.2018.2838445 L. Stella and D. Bauso, “Bio-Inspired Evolutionary Game Dynamics in Symmetric and Asymmetric Models", IEEE Control Systems Letters, 2.3 2018 pp. 405--410 Follow more of IMSI’s work: www.IMSI.institute, (twitter) @IMSI_institute, (instagram) IMSI.institute Follow Dario Bauso: @g_t_engineering This episode was audio engineered by Tyler Damme. Music by Blue Dot Sessions. Special thanks to Dario Bauso, the Institute for Mathematical and Statistical Innovation, the University of Chicago, and the National Science Foundation. The Institute for Mathematical and Statistical Innovation (IMSI) is funded by NSF grant DMS-1929348.

Steve Endow's Business Central Podcast
Learning Business Central - Episode 2: Exploring Symmetric Encryption in BC SaaS!

Steve Endow's Business Central Podcast

Play Episode Listen Later Jun 8, 2022 32:01


How can we encrypt data in BC?  Can we do better?

The Nonlinear Library: LessWrong Top Posts
Just another day in utopia by Stuart_Armstrong

The Nonlinear Library: LessWrong Top Posts

Play Episode Listen Later Dec 11, 2021 21:09


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Just another day in utopia, published by Stuart_Armstrong on the AI Alignment Forum. (Reposted from discussion at commentator suggestion) Thinking of Eliezer's fun theory and the challenge of creating actual utopias where people would like to live, I tried to write a light utopia for my friends around Christmas, and thought it might be worth sharing. It's a techno-utopia, but (considering my audience) it's only a short inferential distance from normality. Just another day in Utopia Ishtar went to sleep in the arms of her lover Ted, and awoke locked in a safe, in a cargo hold of a triplane spiralling towards a collision with the reconstructed temple of Solomon. Again! Sometimes she wished that a whole week would go by without something like that happening. But then, she had chosen a high excitement existence (not maximal excitement, of course – that was for complete masochists), so she couldn't complain. She closed her eyes for a moment and let the thrill and the adrenaline warp her limbs and mind, until she felt transformed, yet again, into a demi-goddess of adventure. Drugs couldn't have that effect on her, she knew; only real danger and challenge could do that. Right. First, the safe. She gave the inner door a firm thud, felt it ring like a bell, heard the echo return – and felt the tumblers move. So, sound controlled lock, then. A search through her shoes produced a small pebble which sparked as she dashed it against the metal. Trying to ignore the ominous vibration as the triplane motor shook itself to pieces, she constructed a mental image of the safe's inside from the brief flashes of light. Symmetric gold and gilded extravagances festooned her small prison – French Baroque decorations, but not yet Roccoco. So Louis XIV period. She gave the less visited parts of her mind a good dusting, trying to remember the tunes of Jean Batiste Lully, the period's most influential composer. She hoped it wasn't any of his ballets; she was much better with his operas. The decorations looked vaguely snake-like; so she guessed Lully's ‘Persée' opera, about the death of the medusa. The engine creaked to a worrying silence as she was half-way through humming the Gorgon theme from the opera. Rushing the rest of the composition, she felt the door shift, finally, to a ten-times speeded up version of Andromeda's response to Perseus's proposal. She kicked the door open, exploded from the safe, took in the view of the temple of Solomon rushing up towards her, seconds away, grabbed a picture from the floor, grabbed an axe from the wall, hacked off one of the wings with three violent cuts, and jumped out of the plane after it. Behind her, the plane disintegrated in midair as the temple lasers cut it to shreds and she fell through space, buffeted by the wind, not losing her grip on to the mangled wing. She had maybe thirty seconds to tie herself to the wing, using the object's own canvas as binding, and she rushed through that. The Machines wouldn't allow the fall to kill her, of course, but it would hurt quite a bit (another of her choices – she'd allowed herself to feel moderate amounts of pain), put back her attempts to ever find Ted, and, most importantly of all, be crushingly embarrassing socially. Once she was lashed to the plummeting piece of wood and canvas, and she was reasonably confident that the fall was slow enough, and her knots secure enough, she finally looked at the photograph she had grabbed during her explosive exit from the plane. It showed Ted, trussed up in chains but smiling and evidently enjoying the novel experience. Underneath was finely engraved note saying “If you ever want to see your lover again, bring me the missing Stradivarius by noon tomorrow. Nero the 2nd”. Each capital letter was beautifully decorated with heads on spikes. So! It seemed that her magnific...

Business Standard Podcast
What is encryption and how does it protect our data?

Business Standard Podcast

Play Episode Listen Later Dec 7, 2021 2:40


Encryption is a way of scrambling data so that only authorised parties can understand the information that is being shared. In encryption, human-readable plain text is converted into incomprehensible text, also called cipher text.  Encryption requires the use of a cryptographic key, a set of mathematical values that both the sender and the recipient of an encrypted message agree on. To decrypt this data, the sender and the receiver of the message have a key. Only this key can be used to decrypt the data. That ensures the data remains secure.  But encryption is of two types. Symmetric and asymmetric.  This could pose some problems, as it could involve the sender transferring the key to the recipient and potentially exposing the key to nefarious actors.  To counter this threat, we have end-to-end (E2E) or asymmetric encryption.  What this means is that on WhatsApp, only the sender and the receiver can read their chat exchange.  Not even WhatsApp can check the messages being exchanged between the two parties. It is this security feature that WhatsApp fears India's new IT Rules may potentially undermine. WhatsApp says if it is required to identify the first originator of any piece of information, that would require it to store a digital signature for every message that is passed through its servers.  Watch video

Alien Air Podcast
2021DecNo1: Mid Era & Mix

Alien Air Podcast

Play Episode Listen Later Dec 3, 2021 122:06


Mid Era: sets by Curved Light (USA) including his new release & Thomas Ronkin (USA) from live performances at the Cyberstock outdoor concert series Mix Set: different synth styles of IDM, Chill, Trance, including the new release by Steve Moore & Bluetech (USA)     TIME....ARTIST...........................TRACK............................RELEASE    00:00  [Intro-Curved Light set]    00:39 Curved Light                 direction of the wind      A Users Guide...      05:25 Curved Light                 within abstraction           A Users Guide...    08:20 Curved Light                 achives of forgotten...     A Users Guide...    12:24 Curved Light                 rendered textures           A Users Guide...    16:48 Curved Light                 disappearing through...  A Users Guide...    20:02 Curved Light                 revenant                           Spirit Echo    23:15 Curved Light                 identity constructs          Fragment Reality    27:06 [break-Thomas Ronkin live]                                    28:54 Thomas Ronkin             sic tranist gloria              Symmetric    41:27 Thomas Ronkin             deis irae                           Symmetric    54:57 Thomas Ronkin             de profundis                    Symmetric    59:58 Thomas Ronkin             et in secula seculorum   Symmetric 1:09:25 [break-Mix Set]              1:10:50 Anodyne                        all that you leave...          IV 1:15:26 S. Moore+Bluetech     entertain light (rmx)        Liminal Migration 1:21:25 Cosmic Replicant         lunatic runner                  Processes 1:28:31 Irritant                           two trees        1:36:34 Cialyn                            the man from taured       The Descent Unseen 1:40:48 X-Dream                       intercorporal stimulator  The Best 1991-2001 1:46:21 Morphology                 multiplex                            Horta Proxima 1:51:44 Tripswitch                    spiral                                   Cosmic Chill Yellow 1:59:16 [Outro]   Keywords: International electronic music internet electronic artists unsigned electronic artists Ambient Tribal Trance PsyTance Ethno/PsyTrance IDM Dub Step Mid Era Berlin School

Das geht schon klar, Podcast

Ein neues Format... Das kann ja nur schief gehen! Aber hört selbst!

Bulletproof Dental Practice
VISIONEERING: Entrepreneur vs Solopreneur vs Associateprenuer

Bulletproof Dental Practice

Play Episode Listen Later Oct 13, 2021 37:22


Join our network at www.Bulletproof.Dental to stay in the know on all things Bulletproof! Bulletproof Dental Practice Podcast Episode 215 Hosts: Dr. Peter Boulden & Dr. Craig Spodak Key Takeaways:Intro Advantages Of Being An Entrepreneur Symmetric Vs. Asymmetric Risk Creating Wealth References: Bulletproof Dental Practice Network Tweetable: Keep your money in specification. Make your money in diversification. Dr. Peter Boulden

Spectacles In Conversation
Bird's Eye - The Political Spectrum and Political Alignment

Spectacles In Conversation

Play Episode Listen Later Sep 18, 2021 34:05


Join the editors as they begin an exploration of the political spectrum, the way citizens align themselves with political parties, and the nature of the two party system. Is a single-axis political spectrum the best way to conceptualize American politics? What are the effects of more disciplined political parties? How can we best understand what voters want if our major political parties are not delivering? Next week we'll be diving into a deeper exploration of the two party system, so make sure to stay tuned! -- https://www.spectacles.news/birds-eye-political-spectrum-political-alignment/ (To comment on this episode or sign up for our newsletter, click here.)https://spectacles-insight.captivate.fm/listen (To listen to written articles from Spectacles read aloud, click here.)Further Readinghttps://www.spectacles.news/birds-eye-small-gov-models/ (Bird's Eye – Small Government and Liberal Democracy.) https://www.spectacles.news/birds-eye-big-gov-models/ (Bird's Eye – Big Government and Liberal Democracy.) https://www.politicalcompass.org/test (Political Compass Test). “http://www.jakebowers.org/PAPERS/polacrossgen3a.pdf (Politics Across Generations: Family Transmission Re-Examined),” by M. Kent Jennings, Laura Stoker, and Jake Bower, presented at the 1999 American Political Science Association Annual Meeting. “https://www.nytimes.com/interactive/2021/09/08/opinion/republicans-democrats-parties.html?searchResultPosition=1 (Quiz: If America Had Six Parties, Which Would You Belong To)?” by Lee Drutman in the New York Times. “https://journals.sagepub.com/doi/abs/10.1177/1532673X20961022?journalCode=aprb (The Nature of Partisan Conflict in Public Opinion: Asymmetric or Symmetric)?” by Maria Narayani Lasala Blanco, Robert Y. Shapiro, and Joy Wilke. Table of Contents00:00 - Intro & Housekeeping 00:32 - What would you expect? 01:43 - Today's topic 02:37 - What is the political spectrum? 04:36 - What are the problems with it? 08:28 - The impact of party sorting and what that means 13:58 - Inadequacy of the spectrum; is a compass better? 18:43 - Movement of the Republican party post-90s 21:21 - Inadequacy of the political compass 23:12 - Asymmetric polarization, complexities 25:16 - Inadequacy of a two-party system 30:35 - Closing notes; the argument for two-party 32:41 - Next week's topic 33:25 - Signing off

Trance Planet
Trance Planet Session 426 [02.08.2021]

Trance Planet

Play Episode Listen Later Aug 1, 2021 119:43


Tracklist: 1.deadmau5, Lights - When The Summer Dies (Alternative Mix) 2.Eagle Vision - Nexus (Original Mix) [Exclusive Premier] 3.Above & Beyond vs Cosmic Gate feat Emma Hewitt - Red Rocks vs Tonight (Armin van Buuren Mashup) 4.Aylo Vizo - Eccentric (Original Mix) [Exclusive Premier] 5.Adam Sein - Lazy Summer (Neava Remix) [Exclusive Premier] 6.Zyfaii - Drift (Airdeep Remix) [Exclusive Premier] 7.Tom Bro - Peaceful (Lepo Remix) [Exclusive Premier] 8.PoLYED feat. Sorry Ellison - Slow Down (Rafal Sentiel Remix) [Exclusive Premier] 9.AFTERUS - At Midnight (Original Mix) [Exclusive Premier] 10.Armin van Buuren feat Sam Martin - Miles Away (Avian Grays vs Graham Bell Remix) (Armin van Buuren Mashup) 11.Blasterjaxx vs Exis - Alice's Story vs The Count (Armin van Buuren Mashup) 12.Armin van Buuren & Jamis vs Armin van Buuren & Brennan Heart feat Andreas Moe - Boom Boom vs All On Me (Armin van Buuren Mashup) 13.Nicky Romero & MARF ft. Wulf - Okay (Extended Mix) 14.D-Mad & Arty vs Above & Beyond feat Richard Bedford - She Gave Me The Sun & Moon (Lavisse Den Bosch Bootleg) 15.Armin van Buuren & Rank 1 - The Greater Light To Rule The Night (Original Mix) 16.Abide - Magnex (Allan McGrey Remix) [Exclusive Premier] 17.XjO - Gemini (Original Mix) [Exclusive Premier] 18.Armin van Buuren & Jorn van Deynhoven - Lost In Space (Extended Mix) 19.Shana Vanguarde - Mamma Mia (Electro Club Mix) 20.The Chemical Brothers - Do It Again (Chris Schweizer Bootleg) 21.Mark Sherry & Scot Project vs Faithless & Andrew Rayel - Sangre Caliente (Andrew Rayel Mashup) 22.Marcelo Fratini vs DJ Wag x Indecent Noise vs John O'Callaghan & Cold Blue vs Armin van Buuren Ft. Susana - T.O.T. vs Man On the Moon vs Symmetric vs Shivers (Armin van Buuren Mashup) 23.Ben Gold vs Andrew Rayel & Robbie Seed ft. That Girl - The City Sleeps Tonight vs Stars Collide (Daniel Le Martinez Mashup) 24.Alexander Popov & Kitone vs Armin van Buuren feat. Jake Reese - Control Me vs Need You Now (Armin van Buuren Mashup) 25.Aly & Fila vs Alex M.O.R.P.H. - It's All About The Melody vs Running for Peace (Armin van Buuren Mashup) 26.Alex M.O.R.P.H. feat. Sylvia Tosun - An Angel´s Love (Vocal Mix) 27.John Askew - Battery Acid (John Askew's Dark Room Mix) 28.Seven Lions feat. Paul Meany- Higher Love (Seven Lions & Jason Ross 1999 Remix) 29.Maarten de Jong vs Corti Organ vs Armin van Buuren - Flash vs The Joker vs Blah Blah Blah (Armin van Buuren Mashup)

Code Completion
30: It's a Big Sure

Code Completion

Play Episode Listen Later May 26, 2021 87:54


Welcome to Code Completion! We are a group of iOS developers and educators hoping to share what we love most about development, Apple technology, and completing your code! Today, we discuss: • Code Completion Club: https://codecompletion.io/jointheclub • Indie App Spotlight, with three apps for you to check out: • Charty by Rodrigo Araujo: https://apps.apple.com/us/app/charty-for-shortcuts/id1494386093?ls=1 • Cone by Kushagra Agarwal: https://apps.apple.com/us/app/cone-live-color-picker/id1221305627?mt=8 • MinBrowser by Ben Standaert: https://minbrowser.org • WWDC Software and Hardware Predictions, • App Clips one year later, • In-App Purchases and External Payments, • How Can The App Store Be a Better Place for Us As Developers? • The Future of Objective-C Follow us @CodeCompletion (https://twitter.com/CodeCompletion) on Twitter to hear about our upcoming livestreams, videos, and other content. Also, join us for #CompleteTheCode and Compiler Error, two segments that test both your knowledge and our knowledge on Swift, Apple, and all things development! Your hosts for this week: * Spencer Curtis (https://twitter.com/Spencerccurtis) * Dimitri Bouniol (https://twitter.com/dimitribouniol) * Fernando Olivares (https://twitter.com/fromjrtosr) * Johnny Hicks (https://twitter.com/johnnydhicks) Be sure to also sign up to our monthly newsletter (https://codecompletion.io/), where we will recap the topics we discussed, reveal the answers to #CompleteTheCode, and share even more things we learned in between episodes. You are what makes this show possible, so please be sure to share this with your friends and family who are also interested in any part of the app development process. Sponsor This week's episode of Code Completion is brought to you by Not Phở. Search for Not Phở (https://apps.apple.com/app/apple-store/id1525104124?pt=14724&ct=CodeCompletion1&mt=8) on the iOS and macOS App Stores today to give it a try. Complete the Code Be sure to tweet us (https://twitter.com/intent/tweet?text=%23CompleteTheCode%20cc%2F%20%40CodeCompletion&original_referer=https%3A%2F%2Fcodecompletion.io) with hashtag #CompleteTheCode (https://twitter.com/hashtag/CompleteTheCode) if you know the answer! Compiler Error 1 - AES, or the American Encryption Standard, is a suite of symmetric block cyphers that was selected as a part of an open process hosted by NIST and the US government from 1997 to 2000 to replace DES. 2 - A one time pad is an early but very robust encryption technique, which can be uncrackable so long as the key on the pad is never re-used, is truly random, is longer than the plaintext, and is kept completely secret. 3 - Symmetric key algorithms use the same cryptographic keys for both encryption and decryption, while asymmetric key algorithms make use of a public key and a private key to encrypt and decrypt information. 4 - Unlike RSA which relies on large prime number factorization, Elliptic-curve cryptography makes use of a given elliptic curve’s geometric and algebraic properties, ultimately providing the same level of security as RSA with smaller keys.

Ethical Hacking
Protect your information in the internet world with the help of cryptography...

Ethical Hacking

Play Episode Listen Later Dec 24, 2020 4:09


hello every one my name is vijay kumar deviredy and i am glad to have you on my episode 03 today we are going to disscuss about how to protect your information in the internet world  with the help of cryptography before going into deep let see where it is started with little drama. In 1586, Mary, Queen of Scots,was convicted of treason against Queen Elizabeth.She was found guilty of plotting to overthrow the English monarch,and not long afterwards she was  beheaded.Did you know that the evidence that convicted her was obtained by the English spymaster's ability to break Mary's secret correspondence with her supporters? What can we learn from this drama? Well, that you better know how to protect your secrets. When we started discussing information security, we learned that there are two types of parties involved. The defenders and the adversaries.we call it as attackers The defenders have a variety of goals that they need to achieve,and the adversaries try to disrupt their efforts. In this episode we will focus on the confidentiality defensive goal,and on attacks against it. The techniques used to achieve both defensive and offensive goals belong to the body of knowledge called cryptography.The word "cryptography" comes from ancient Greek, and translates to "secret writing". Cryptography also includes solutions to more advanced goals, like digital signatures and key exchange, which we will discuss in a later episodes which will be a continuation of this .The starting point of the confidentiality goal is that our defender, who we shall call lara , has some secret information.But just having a secret  is not very interesting right.lara needs to send this information,as a secret message, to rakesh,who is also on  the defenders' side.The idea of a secret message implicitly introduces the adversary,who we shall call vijay.vijay can eavesdrop on the communications between lara and rakesh. So, lara needs a wayto send a secret message to rakesh,in a way that rakesh will understand,but vijay will not, despite the fact that vijay can hear,or read, the communicated message.In the 1587 drama,Mary played the role of lara,her supporters were rakesh,and Queen Elizabeth's spymaster played vijay, To achieve their joint goal,lara and rakesh need to agree upon a special communication mechanism that is resistant to eavesdropping. The mechanism lara usesto construct the secret message is called encryption.rakesh uses the inverse mechanism, decryption. Together, the encryption and decryption mechanisms form a cryptographic primitive called a cipher.More specifically, a symmetric cipher.A cryptographic primitiveis a cryptographic capability, or mechanism,that can be used by itself, and can also be used as a building block in a larger context.Symmetric ciphers are the firstcryptographic primitive we will learn about. We will meet more primitives later in the continuation episodes. until then take rest and beaware about what we had discussed in episode and thankyou...

SPICYDOG's TechTalks
SPICYDOG's TechTalks EP 1 - Symmetric Encryption

SPICYDOG's TechTalks

Play Episode Listen Later Oct 30, 2020 56:41


คุยกันเรื่องการเข้ารหัสข้อมูล และลงลึกนิดหน่อยในส่วนของ Symmetric Encryption

HIMSSCast
Accelerate Supply Chain Management: Rich Kucera, Principal of Symmetric Health Solutions (Accelerate Health Podcast Episode 3)

HIMSSCast

Play Episode Listen Later Oct 8, 2020 30:03


The COVID-19 crisis thrust hospital supply chain issues into the national spotlight as we heard about shortages of personal protective equipment almost daily during the early days of the crisis. But the issues that lead to these shortages are only a few of the many challenges that hospital supply chain managers face every day. For this week’s episode, co-host, Rob Havasy is joined by Rich Kucera, Principal of Symmetric Health Solutions and the winner of the 2019 SCAN Health Design Competition to discuss their innovative solution to the supply chain problem. For more information about the SCAN Health Design Challenge, click here. Learn more about how Accelerate Health is redefining health at HIMSS here.

HIMSS Accelerate Health Podcast
Accelerate Supply Chain Innovation: Rich Kucera, CEO, Symmetric Health Solutions

HIMSS Accelerate Health Podcast

Play Episode Listen Later Oct 7, 2020 30:03 Transcription Available


The COVID-19 crisis thrust hospital supply chain issues into the national spotlight as we heard about shortages of personal protective equipment almost daily during the early days of the crisis. But the issues that lead to these shortages are only a few of the many challenges that hospital supply chain managers face every day. For this week’s episode, co-host, Rob Havasy is joined by Rich Kucera, CEO and Co-founder of Symmetric Health Solutions and the winner of the 2019 SCAN Health Design Competition to discuss their innovative solution to the supply chain problem. For more information about the SCAN Health Design Challenge, click here. Learn more about how Accelerate Health is redefining health at HIMSS here.

Cryptography FM
Episode 2: Breaking Lightweight Symmetric Cryptography!

Cryptography FM

Play Episode Listen Later Oct 6, 2020 34:24 Very Popular


Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard. Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design. In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security. But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise? Links and papers discussed in the show: * New results on Gimli: full-permutation distinguishers and improved collisions (https://eprint.iacr.org/2020/744) * Lower Bounds on the Degree of Block Ciphers (https://eprint.iacr.org/2020/1051) * Saturnin lightweight cryptography (https://project.inria.fr/saturnin/) Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Léo Perrin.

50:HERTZ Community
50:HERTZ #218 - Host MITCH DE KLEIN / Guest FOUR HANDS (DI.FM / Diesel FM / Deep Radio)

50:HERTZ Community

Play Episode Listen Later Jun 9, 2020 120:00


The weekly 50:HERTZ Radioshow is hosted by MITCH DE KLEIN, FULL ON FUNK, DAVID LEESE, KEVIN HELMERS, STEVE MULDER & PRECURSOR. The show is broadcasted on Tuesday nights on DI.FM (6pm >> 8pm CEST), Thursday nights on Deep Radio (NL - 8pm >> 10pm CEST) and on Friday nights on Diesel FM (Washington, USA - 6PM >> 8PM EST). Powered by "Vision Acoustics" they're taking their edge on techno all over the world, uniting people and making new things possible. 1st Hour: Host Mitch de Klein (@mitchdeklein) 1 Jaden Raxel & Mitch de Klein - Below 2 Jos & Eli, Magit Cacoon - Tropical Heart 3 Mitch de Klein - Vanishing Clouds 4 Oliver Winters - Bending of Light 5 Einmusik - Dread 6 Olivier Weiter - Madaar 7 REMIND - REPLICA (edit) 8 Mitch de Klein - Unknown 9 Stephan Jolk - Analogy 10 Ryuichi Sakamoto - The Revenant (Mitch de Klein Remix) 11 Voices of Valley - Midgard (Alberth Remix) 12 Iberian muse, Wurtz - Mental Depth 2nd Hour Four Hands (@four-hands-1) 1 Fat Cosmoe - Moonshiner 2 Yubik - Conspiracy Of Silence 3 Julian Wassermann, Anaphase, Henri Bergmann - Dust 4 Dyzen - Time Flows (VNTM Remix) 5 Symmetric, Future of Matter - Anderida (Bastinov Remix) 6 Middle Earth - Caisa (Kevin De Vries Remix) 7 Black Peters - Renaissance Diner (O˜ostil Remix) 8 Alberth - Image 9 Oliver Winters - Bending of Light 10 Enai, Dream Vacation - Fall Follow Mitch de Klein @mitchdeklein www.facebook.com/MitchdeKleinOfficial Follow Four Hands @four-hands-1 www.facebook.com/fourhands2015 Follow All The 50:HERTZ Hosts: @full-on-funk // @djdavidleese // @mitchdeklein // @kevinhelmers // @steve-mulder // @precursornl Follow 50:HERTZ facebook.com/50hertz.official @50hertz-radioshow Follow Vision Acoustics: www.visionacoustics.nl facebook.com/VisionAcoustics/ instagram.com/vision_acoustics/ Follow DI.FM: www.di.fm Follow Deep Radio: www.deep.radio www.facebook.com/digitallyimported/ Follow Diesel.FM: www.diesel.fm diesel.fm/technoplayer/ facebook.com/DIESELFM twitter.com/Diesel_Fm @dieselfmradio

Monday housin'
Martin Cehelsky - Monday housin' Part 193 (feat. Going Under w. D.K.O.)

Monday housin'

Play Episode Listen Later Jun 1, 2020 107:51


Enjoy the new part of Monday housin' filled to the top by the best #housemusic including Going Under with D.K.O. Najnovší dielik do skladačky relácie menom Monday housin'. To owners or copyright holders: I do not intend to steal rights! I use the tracks for PROMOTIONAL purposes only. Tracklist: 1. Jaded - Bang Bang (Extended Mix) 2. Luuk Van Dijk - Da Revolution (Original Mix) 3. Alex Kennon - Dreams (Original Mix) 4. Proudly People - Daily Fix (Original Mix) 5. Paul Cart, Dantiez, King Saaidi - Falling (Original Mix) 6. Oz (BR) - Catch You (Original mix) 7. George Kwali - Grounded (Extended Mix) 8. Audiojack - Are We Here (Original Mix) 9. Collective Machine - Spectrum (Club Mix) 10. Terry Grant, Spiritchaser - A Thousand Dances (Remixed) (Spiritchaser Spacefunk Dub (Extended Mix)) 11. Peggy Gou - Starry Night (Original Mix) Pick of the Week: 12. Peter Brown - Troubles (Richard Earnshaw Revision) Going Under w. D.K.O.: 1. Rodriguez Jr. - Nairobi (Original Mix) 2. Mark Tarmonea, Yannek Maunz, Brascon, Johanson - Hollow (Original Mix) 3. HAFT - Mojave (Original Mix) 4. Symmetric, Future of Matter - River In The Sky (VNTM Remix) 5. Ivory (IT) - Sense (Kadosh Remix) 6. Dodi Palese - Last Destination (Original Mix) 7. RIGOONI - A Blues Rose For Daniele (Original Mix) 8. Rob Hes - The Age Of Innocence (Original Mix) 9. Oliver Koletzki, Niko Schwind - Agitation (Original Mix)

PaperPlayer biorxiv neuroscience
Optically splitting symmetric neuron pairs in C. elegans

PaperPlayer biorxiv neuroscience

Play Episode Listen Later May 3, 2020


Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.05.02.072363v1?rss=1 Authors: Davis, L., Radman, I., Goutou, A., Tynan, A., Baxter, K., Xi, Z., Chin, J. W., Greiss, S. Abstract: Two thirds of the 302 neurons in C. elegans form bilaterally symmetric pairs in its physical connectome, and similar gross morphological symmetries are seen in the nervous systems of many other animals. A central question is whether and how this morphological symmetry is broken to produce functional asymmetry. Addressing this question, in all but two cases, has been impossible because no promoters are known that can direct gene expression to a single cell within a symmetric pair. Here we develop an efficient genetic code expansion system in C. elegans and use this system to create a photo-activatable version of Cre recombinase. Using this system, we target single neurons within a bilaterally symmetric pair (PLMR and PLML) with a laser. This turns on Cre and thereby switches on expression of an optogenetic channel in a single cell. We hereby overcome the limitation that these neurons cannot be targeted by genetic means. Our approach enables the generation of large numbers of animals for downstream experiments. By globally illuminating groups of freely moving animals to stimulate the targeted neurons that express an optogenetic channel we dissect the individual contributions of PLMR and PLML to the C. elegans touch response. Our results reveal that the individual neurons make asymmetric contributions to this behaviour, and suggest distinct roles for PLMR and PLML in the habituation to repeated stimulation. Our results demonstrate how genetic code expansion and optical targeting can be combined to break the symmetry of neuron pairs in C. elegans and thereby dissect the contributions of individual neurons to behaviour. Copy rights belong to original authors. Visit the link for more info

Set of the Day Podcast
Set Of The Day Podcast - 678 - Bassiks

Set of the Day Podcast

Play Episode Listen Later Apr 23, 2020 78:03


Bassiks are a Greek DJ duo playing a variety of sounds, from House to Techno. Born and raised in Thessaloniki both members got involved from an early age with music following music studies. In 2016 their love and passion for the electronic music brought them together and since then they are active members of the local scene playing in clubs and bars in Thessaloniki and Athens such as Urania Bar, Fix Factory, We, Wonderwall Rooftop, Faust Bar and sharing the booth with international branded names like Sam Paganini, The Yellowheads, Axel Karakasis, TKNO and also with some local Dj’s such as Chris Low, Bassment, Mr Ado, Undertone, Symmetric etc. In 2019 they appeared for the first time at the techno scene of Amsterdam having a guest mix at AMW radio station and performing at Amsterdam Dance Event. They are members of NoLove collective and at the same time they are also hosts at Frequencies event in which they play as residents near guests Dj’s aiming in the growth of the underground culture and local scene. SoundCloud: https://soundcloud.com/bassiksskg Facebook: https://www.facebook.com/BassiksSKG/ Instagram: https://www.instagram.com/bassiksmusicskg/?hl=el Download for free on The Artist Union

The History of Computing
Scraping The Surface Of Modern Cryptography

The History of Computing

Play Episode Listen Later Aug 7, 2019 14:43


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us for the innovations of the future! Todays episode is scraping the surface of cryptography. Cryptography is derived from the Greek words kryptos, which stands for hidden and grafein, which stands for to write. Through history, cryptography has meant the process of concealing the contents of a message from all except those who know the key. Dating back to 1900 BC in Egypt and Julius Caesar using substitution cyphers, encryption used similar techniques for thousands of years, until a little before World War II. Vigenere designed the first known cipher thatused an encryption key in the 16th century. Since then with most encryption, you convert the contents, known as plaintext, into encrypted information that's otherwise unintelligible, known as cipher text. The cypher is a pair of algorithms - one to encrypt, the other to decrypt. Those processes are done by use of a key. Encryption has been used throughout the ages to hide messages. Thomas Jefferson built a wheel cypher. The order of the disks you put in the wheel was the key and you would provide a message, line the wheels up and it would convert the message into cypher text. You would tell the key to the person on the other end, they would put in the cypher text and out would pop the message. That was 1795 era encryption and is synonymous with what we call symmetrical key cryptography, which was independently invented by Etienne Bazeries and used well into the 1900s by the US Army. The Hebern rotor machine in the 19th century gave us an electro-mechanical version of the wheel cypher and then everything changed in encryption with the introduction of the Enigma Machine, which used different rotors placed into a machine and turned at different speeds based on the settings of those rotors. The innovations that came out of breaking that code and hiding the messages being sent by the Allies kickstarted the modern age of encryption. Most cryptographic techniques rely heavily on the exchange of cryptographic keys. Symmetric-key cryptography refers to encryption methods where both senders and receivers of data share the same key and data is encrypted and decrypted with algorithms based on those keys. The modern study of symmetric-key ciphers revolves around block ciphers and stream ciphers and how these ciphers are applied. Block ciphers take a block of plaintext and a key, then output a block of ciphertext of the same size. DES and AES are block ciphers. AES, also called Rijndael, is a designated cryptographic standard by the US government. AES usually uses a key size of 128, 192 or 256 bits. DES is no longer an approved method of encryption triple-DES, its variant, remains popular. Triple-DES uses three 56-bit DES keys and is used across a wide range of applications from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Stream ciphers create an arbitrarily long stream of key material, which is combined with a plaintext bit by bit or character by character, somewhat like the one-time pad encryption technique. In a stream cipher, the output stream is based on an internal state, which changes as the cipher operates. That state's change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known stream cipher. Cryptographic hash functions do not use keys but take data and output a short, fixed length hash in a one-way function. For good hashing algorithms, collisions (two plaintexts which produce the same hash) are extremely difficult to find, although they do happen. Symmetric-key cryptosystems typically use the same key for encryption and decryption. A disadvantage of symmetric ciphers is that a complicated key management system is necessary to use them securely. Each distinct pair of communicating parties must share a different key. The number of keys required increases with the number of network members. This requires very complex key management schemes in large networks. It is also difficult to establish a secret key exchange between two communicating parties when a secure channel doesn't already exist between them. You can think of modern cryptography in computers as beginning with DES, or the Data Encryption Standard, us a 56-bit symmetric-key algorithm developed by IBM and published in 1975, with some tweaks here and there from the US National Security Agency. In 1977, Whitfield Diffie and Martin Hellman claimed they could build a machine for $20 million dollars that could find a DES key in one day. As computers get faster, the price goes down as does the time to crack the key. Diffie and Hellman are considered the inventors of public-key cryptography, or asymmetric key cryptography, which they proposed in 1976. With public key encryption, two different but mathematically related keys are used: a public key and a private key. A public key system is constructed so that calculation of the private key is computationally infeasible from knowledge of the public key, even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol. The next year, Ron Rivest, Adi Shamir and Leonard Adleman developed the RSA encryption algorithm at MIT and founded RSA Data Security a few years later in 1982. Later, it became publicly known that asymmetric cryptography had been invented by James H. Ellis at GCHQ, a British intelligence organization and that both the Diffie-Hellman and RSA algorithms had been previously developed in 1970 and were initially called “non-secret encryption.” Apparently Ellis got the idea reading a bell labs paper about encrypting voice communication from World War II. Just to connect some dots here, Alan Turing, who broke the Enigma encryption, visited the proposed author of that paper, Shannon, in 1943. This shouldn't take anything away from Shannon, who was a brilliant mathematical genius in his own right, and got to see Gödel, Einstein, and others at Princeton. Random note: he invented wearables to help people cheat at roulette. Computer nerds have been trying leverage their mad skills to cheat at gambling for a long time. By the way, he also tried to cheat at, er, I mean, program chess very early on, noting that 10 to the 120th power was the game-tree complexity of chess and wrote a paper on it. Of course someone who does those things as a hobby would be widely recognized as the father of informational theory. RSA grew throughout the 80s and 90s and in 1995, they spun off a company called VeriSign, who handled patent agreements for the RSA technology until the patents wore out, er, I mean expired. RSA Security was acquired by EMC Corporation in 2006 for $2.1 billion and was a division of EMC until EMC was acquired by Dell in 2016. They also served as a CA - that business unit was sold in 2010 to Symantec for $1.28B. RSA has made a number of acquisitions and spun other businesses off over the years, helping them get into more biometric encryption options and other businesses. Over time the 56 bit key size of DES was too small and it was followed up by Triple-DES in 1998. And Advanced Encryption Standard, or AES, also in 1998. Diffie-Hellman and RSA, in addition to being the first public examples of high quality public-key cryptosystems have been amongst the most widely used. In addition to encryption, public-key cryptography can be used to implement digital signature schemes. A digital signature is somewhat like an ordinary signature; they have the characteristic that they are easy for a user to produce, but difficult for anyone else to forge. Digital signatures can also be permanently tied to the content of the message being signed as they cannot be moved from one document to another as any attempt will be detectable. In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message (or a hash of the message or both), and one for verification, in which the matching public key is used with the message to check the validity of the signature. RSA and DSA are two of the most popular digital signature schemes. Digital signatures are central to the operation of public key infrastructures and to many network security schemes (SSL/TLS, many VPNs, etc). Digital signatures provide users with the ability to verify the integrity of the message, thus allowing for non-repudiation of the communication. Public-key algorithms are most often based on the computational complexity of hard problems, often from number theory. The hardness of RSA is related to the integer factorization problem, while Diffie-Hellman and DSA are related to the discrete logarithm problem. More recently, elliptic curve cryptography has developed in which security is based on number theoretic problems involving elliptic curves. Because of the complexity of the underlying problems, most public-key algorithms involve operations such as modular multiplication and exponentiation, which are much more computationally expensive than the techniques used in most block ciphers, especially with typical key sizes. As a result, public-key cryptosystems are commonly hybrid systems, in which a fast symmetric-key encryption algorithm is used for the message itself, while the relevant symmetric key is sent with the message, but encrypted using a public-key algorithm. Hybrid signature schemes are often used, in which a cryptographic hash function is computed, and only the resulting hash is digitally signed. OpenSSL is a software library that most applications use to access the various encryption mechanisms supported by the operating systems. OpenSSL supports Diffie-Hellman and various versions of RSA, MD5, AES, Base, sha, DES, cast and rc. OpenSSL allows you to create ciphers, decrypt information and set the various parameters required to encrypt and decrypt data. There are so many of these algorithms because people break them and then a new person has to come along and invent one and then version it, then add more bits to it, etc. At this point, I personally assume that all encryption systems can be broken. This might mean that the system is broken while encrypting, or the algorithm itself is broken once encrypted. A great example would be an accidental programming mistake allowing a password to be put into the password hint rather than in the password. Most flaws aren't as simple as that. Although Kerckhoffs's principle teaches us that the secrecy of your message should depend on the secrecy of the key, and not on the secrecy of the system used to encrypt the message. Some flaws are with the algorithms themselves, though. At this point most of those are public and security without a password or private key they just take too long to decrypt to be worth anything once decrypted. This doesn't mean we don't encrypt things, it just means that in addition to encryption we now add another factor to that security. But we'll leave the history of two-factor security to another episode. Finally, RSA made a lot of money because they used ciphers that were publicly reviewed and established as a standard. Public review of various technological innovations allows for commentary and making it better. Today, you can trust most encryption systems because due to that process, it costs more to decrypt what you're sending over the wire than what is being sent is worth. In other words, collaboration trumps secrecy.