highlighting a looming cyber threat emanating from fast developing artificial intelligence. This strategic threat is further magnified with the advent of quantum computers. AI and quantum-AI (QAI) represent a totally ...
详细信息
ISBN:
(纸本)9798350327595
highlighting a looming cyber threat emanating from fast developing artificial intelligence. This strategic threat is further magnified with the advent of quantum computers. AI and quantum-AI (QAI) represent a totally new and effective vector of cryptanalytic attack. Much as modern AI successfully completes browser search phrases, so it is increasingly capable of guessing a rather narrow a-priori list of plausible plaintexts. This guessing is most effective over device cryptography where the message space is limited. Matching these guesses with the captured ciphertext will greatly accelerate the code breaking process. We never faced such a plaintext-originated attack on a strategic level, and never had to prepare for it. Now we do. Proposing to apply a well-known martial art tactics: using the opponent's strength against them: constructing ciphertexts that would provide false answers to the AI attacker and lead them astray. We are achieving this defensive measure by pivoting away from the norm of small, known-size key and pattern-loaded ciphers. Using instead large keys of secret size, augmented with ad-hoc unilateral randomness of unbound limits, and deploying a pattern-devoid algorithm with a remarkably low computational burden, so it can easily handle very large keys. Thereby we achieve large as desired unicity distances. This strategy has become feasible just when the AI threat looms. It exploits three new technologies coming together: (i) non-algorithmic randomness, (ii) very large and inexpensive memory chips, and (iii) high throughout communication networks. These pattern-devoid, randomness rich ciphers also turn up to be an important option in the toolbox NIST prepares to meet the quantum challenge. Avoiding the computational load of mainstay ciphers, AIR-cryptography presents itself as the ciphers of choice for medical, military and other battery-limited devices for which data security is paramount. In summary: we are pointing out a fast emerging cyber chall
In recent years, significant progress has been made in salient object detection. Nevertheless, there remains a need for further improvements in the effective combination of local and global perspectives. Combining glo...
详细信息
Pneumothorax is a life-threatening and urgent chest disease than can be detected using Chest X-Ray (CXR) image. CXR images are low resolution and diagnosis of pneumothorax based on them is error prone. Deep learning-b...
详细信息
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif...
详细信息
To better improve the production capacity and control efficiency of discrete manufacturing workshops, a decision system architecture based on online acquisition and data analysis is proposed, and its architecture and ...
详细信息
Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless ***,edge computing servers(ECSs)from different operators may not trust each other,and thus the incentives...
详细信息
Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless ***,edge computing servers(ECSs)from different operators may not trust each other,and thus the incentives for collaboration cannot be *** this paper,we propose a consortium blockchain enabled collaborative edge computing framework,where users can offload computing tasks to ECSs from different *** minimize the total delay of users,we formulate a joint task offloading and resource optimization problem,under the constraint of the computing capability of each *** apply the Tammer decomposition method and heuristic optimization algorithms to obtain the optimal ***,we propose a reputation based node selection approach to facilitate the consensus process,and also consider a completion time based primary node selection to avoid monopolization of certain edge node and enhance the security of the *** results validate the effectiveness of the proposed algorithm,and the total delay can be reduced by up to 40%compared with the non-cooperative case.
Millimeter-wave radar technology is gaining popularity as a perception sensor in autonomous vehicles. This is due to its ability to detect nearby objects in adverse weather conditions, such as rain, snow, or fog, as w...
详细信息
The focus of this research work revolves around the utilization of a specialized"Combinatorial Kinetic Dualistic Auction Model" designed specifically for"metaverse Services." The main goal is to im...
详细信息
Malware distributors use persistence mechanisms in their malware to keep a PC infected for a long time. Techniques such as packing and obfuscation are often used so that the presence of malware cannot be determined by...
详细信息
The proposed IoT-based Smart Curve Monitoring and Alert system is designed to improve road safety through the fusion of embedded systems, machine learning and edge computing technologies. The proposed system is primar...
详细信息
暂无评论