Crypto-anchors and Lattices are the two big and powerful innovations from IBM this year. While Crypto-anchors are nutcrackers for counterfeiting, Lattice is a boost to cybersecurity.
Crypto-anchors and the Blockchain
According to IBM, blockchain is no anonymity because it provides us a stage to ensure the origin of every single trade on the network. Goods pass through different nodes before reaching the end user and therefore might be prone to several risks like theft, tampering and so on. IBM reassures that blockchain can help eliminate such hazards with the help of crypto-anchors. Crypto-anchors are microscopic codes that serve as digital fingerprints ensuring security at every stage of the trade’s journey.
Dr. Jeff Welser, Vice President of IBM Research says:
“The challenge here is that the blockchain can record all the transactions but somewhere you’ve got to link the transactions to the actual physical object itself – so that you know the banana that got scanned is the actual banana that got to you,”
Lattice Cryptography, a hacker’s nightmare
Near is the age of quantum computers and so is that of its capable hacker. This advanced computing power needs one mighty cryptography tool which helps to secure a lot of data and Lattice is IBM’s answer to it.
Wesler speaks about Lattice:
“The reality is there’s constantly a battle on with cybersecurity, we need to make sure we continue to have cryptography and encryption that can keep the bad guys out, and all of that relies on the fact that the maths is so hard to do that trying to solve it with a computer takes an unreasonable amount of time”
He further adds:
“We have to make sure that as computers get faster, we can continue to keep ahead of them. In particular, this is a concern with the quantum computers that are coming up.”
Lattice cryptography is unique in many ways, such as:
- It involves encrypting data within high dimensional structures
- It also supports Fully Homomorphic Encryption [FHE] where computing can be done on even ciphertexts to generate an encrypted result which when decrypted gives the intended value. This is to avoid decrypting the data at any stage even when a decision is to be made the data remain encoded.
The post IBM has news to the CryptoWorld, an alarm for counterfeiters and hackers appeared first on AMBCrypto.
Powered by WPeMatico