A group of researchers at South Korea’s Gwangju Institute of Science and Technology (GIST) have used natural silk fibers from domesticated silkworms to build an environmentally friendly digital security system that they say is “practically unbreachable.” The Korean researchers take advantage of the diffraction of light through the natural microholes in silk to create a secure and unique digital key for security solutions needing a unique identifier.
Physical Unclonable Functions or PUFs are needed when a security device is creating a unique security key or identity marker. PUFs must be unpredictable or random in order to serve their purpose. Researchers discovered that these silk microholes contain microscopic differences easily recorded and identified by electronic equipment making them well suited for the creation of unique identifiers (cryptographic keys).
In other words, PUFs are non-algorithmic one-way functions derived from uncopiable elements to create unbreakable identifiers for strong authentication. Over the years, PUFs have been widely used in smartcards to provide “silicon fingerprints” as a way of uniquely identifying cardholders based on a challenge-response authentication scheme. To understand how this new technology works, GIST researchers put the diagram below together to explain.
Should such a system be deployed for user authentication using a smart card, the researchers said that faking an authentication key generated from the module through a brute-force attack would take as long as 5 x 1041 years to crack it open, making it cryptographically unbreakable even with the specter of quantum computing threatening current best practices in cryptography. Put simply, silk PUFs may provide relief from theoretical attacks by quantum computers on current cryptographic hashes.
Proving identities is a critical function in any business. Understanding identity and access management in your SMB is important. How you accomplish that won’t be with PUFs but is done with existing technologies such as single-sign-on, federated identities, and tools like Azure AD and Okta. These are all readily attainable by an MSP or SMB.
Encryption and cryptography are important to SMBs or MSPs in order to protect the confidentiality and integrity of critical and sensitive information. SMBs or MSPs may fall under legislative controls such as HIPAA or PCI which require specific forms of data (Health Records, Credit Card PAN information) to be protected from disclosure (confidentiality) or manipulation (integrity).
One strategy for SMB’s to deal with industry compliance requirements is NOT to have such data in their possession to begin with. For example, PCI compliance obligations can often be avoided by partnering with online Web Services that perform the Credit Authorization outside of your Website or store and simply provide the SMB or MSP an authorization code back. However, in cases where an SMB/MSP must collect and store critical and sensitive data, then they must protect it with encryption. Today, that means using the Advanced Encryption Standard (AES) encryption, currently the most powerful algorithmic way to produce one-way functions to protect your data from compromise and exposure.
SMBs/MSPs should encrypt laptops and tablets with Microsoft’s BitLocker or Apple’s FileVault to protect the critical and sensitive data they contain from compromise. This limits a stolen or lost device to a financial loss or cost instead of larger financial fines from a breach of regulated critical or sensitive data (HIPAA records, PCI, or NPPI).
As with physical keys, logical key management is important. Be certain you store decryption keys in a secure place, not on the device for which the key decrypts the data itself. That’s like hiding the key under the mat.
Additionally, these recommendations below will help you and your business stay secure with the various threats you may face on a day-to-day basis. All of the suggestions listed below can be gained by hiring CyberHoot’s vCISO services.
All of these recommendations are built into CyberHoot the product or CyberHoot’s vCISO Services. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Source:
Additional Reading:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.