复杂非确定性世界中的安全:迈向量子安全工业互联网

J. Salvo
{"title":"复杂非确定性世界中的安全:迈向量子安全工业互联网","authors":"J. Salvo","doi":"10.1145/3462223.3485597","DOIUrl":null,"url":null,"abstract":"Exponential change is a counterintuitive concept in the classical world. It's hardly surprising since our cognitive and social organizations typically discount many of the observations and patterns [1] that would alert us to such historical periods of upheaval [2]. The current suite of digital technologies has catalyzed a total upending of the previous distribution channels and management systems for the acquisition, distribution and assimilation of data, information and knowledge [3],[4],[5]. Today the \"digital generation\" learns, interacts and transacts in ways that are foreign and suspicious to some of the current gatekeepers of traditional value storage implementations. [6] The global internet and cellular technologies have connected billions of people and trillions of objects into the most complex networks ever created. This fluid and non-deterministic system of systems has unleashed an unprecedented reservoir of creativity, opportunity, capability and risk. The topology of knowledge and connections has never been so asymmetric whereby a single organization or individual (sometimes anonymously) can quickly gain the control, attention and function of millions of machines and people for costs that are often deemed to be insignificant. [7] Traditional methods of security consistently fail because of the nature of this topology and asymmetry. This novel organization of knowledge combined with the power of \"action at a distance\" requires a new paradigm to secure the future of open society and privacy. Traditional technology platforms for manufacturing, banking, healthcare, finance, social media etc., and their corresponding control mechanisms (digital signatures, passwords, virtual private networks) will potentially fall short in the face of pressure from new computer algorithms/technologies [8] and the global cultural shift that is now deemed to be irreversible (TikTok, WeChat, Facebook, Blockchain, Anonymous) [9]. Code can be exploited in exponential fashion and linear security countermeasures will continue to regularly fail. Undoubtedly, new network designs and technology paradigms will be needed to protect complex systems such as additive manufacturing machines, data and their associated supply chains. Quantum resistant algorithms [10] and novel encrypted and distributed data ledgers offer us hope to blunt this pernicious threat against a hyper-connected world.","PeriodicalId":113006,"journal":{"name":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","volume":"310 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security in a Complex Non-deterministic World: Towards a Quantum Secure Industrial Internet \\\"QSII&\\\"\",\"authors\":\"J. Salvo\",\"doi\":\"10.1145/3462223.3485597\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Exponential change is a counterintuitive concept in the classical world. It's hardly surprising since our cognitive and social organizations typically discount many of the observations and patterns [1] that would alert us to such historical periods of upheaval [2]. The current suite of digital technologies has catalyzed a total upending of the previous distribution channels and management systems for the acquisition, distribution and assimilation of data, information and knowledge [3],[4],[5]. Today the \\\"digital generation\\\" learns, interacts and transacts in ways that are foreign and suspicious to some of the current gatekeepers of traditional value storage implementations. [6] The global internet and cellular technologies have connected billions of people and trillions of objects into the most complex networks ever created. This fluid and non-deterministic system of systems has unleashed an unprecedented reservoir of creativity, opportunity, capability and risk. The topology of knowledge and connections has never been so asymmetric whereby a single organization or individual (sometimes anonymously) can quickly gain the control, attention and function of millions of machines and people for costs that are often deemed to be insignificant. [7] Traditional methods of security consistently fail because of the nature of this topology and asymmetry. This novel organization of knowledge combined with the power of \\\"action at a distance\\\" requires a new paradigm to secure the future of open society and privacy. Traditional technology platforms for manufacturing, banking, healthcare, finance, social media etc., and their corresponding control mechanisms (digital signatures, passwords, virtual private networks) will potentially fall short in the face of pressure from new computer algorithms/technologies [8] and the global cultural shift that is now deemed to be irreversible (TikTok, WeChat, Facebook, Blockchain, Anonymous) [9]. Code can be exploited in exponential fashion and linear security countermeasures will continue to regularly fail. Undoubtedly, new network designs and technology paradigms will be needed to protect complex systems such as additive manufacturing machines, data and their associated supply chains. Quantum resistant algorithms [10] and novel encrypted and distributed data ledgers offer us hope to blunt this pernicious threat against a hyper-connected world.\",\"PeriodicalId\":113006,\"journal\":{\"name\":\"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security\",\"volume\":\"310 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3462223.3485597\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3462223.3485597","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在古典世界里,指数变化是一个反直觉的概念。这并不奇怪,因为我们的认知和社会组织典型地忽略了许多观察和模式[1],这些观察和模式会提醒我们注意这样的历史动荡时期[2]。当前的数字技术套件已经催化了对以前的数据、信息和知识的获取、分发和同化的分销渠道和管理系统的全面颠覆[3],[4],[5]。如今,“数字一代”的学习、互动和交易方式,对于传统价值存储实现的一些当前守门人来说,是陌生和可疑的。[6]全球互联网和蜂窝技术已将数十亿人和数万亿物体连接到有史以来最复杂的网络中。这种流动的、不确定的“系统的系统”释放出前所未有的创造力、机会、能力和风险。知识和联系的拓扑结构从未如此不对称,单个组织或个人(有时是匿名的)可以以通常被认为微不足道的成本迅速获得数百万机器和人员的控制、关注和功能。[7]由于这种拓扑结构和不对称性的性质,传统的安全方法总是失败。这种新型的知识组织与“远距离行动”的力量相结合,需要一种新的范式来确保开放社会和隐私的未来。制造业、银行业、医疗保健、金融、社交媒体等领域的传统技术平台及其相应的控制机制(数字签名、密码、虚拟专用网络)在新的计算机算法/技术[8]和现在被认为是不可逆转的全球文化转变(TikTok、微信、Facebook、区块链、匿名)[9]的压力下,可能会出现不足。代码可以以指数方式被利用,线性安全对策将继续定期失败。毫无疑问,需要新的网络设计和技术范例来保护复杂的系统,如增材制造机器、数据及其相关的供应链。抗量子算法[10]和新颖的加密和分布式数据分类账为我们提供了削弱这种对超连接世界的有害威胁的希望。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security in a Complex Non-deterministic World: Towards a Quantum Secure Industrial Internet "QSII&"
Exponential change is a counterintuitive concept in the classical world. It's hardly surprising since our cognitive and social organizations typically discount many of the observations and patterns [1] that would alert us to such historical periods of upheaval [2]. The current suite of digital technologies has catalyzed a total upending of the previous distribution channels and management systems for the acquisition, distribution and assimilation of data, information and knowledge [3],[4],[5]. Today the "digital generation" learns, interacts and transacts in ways that are foreign and suspicious to some of the current gatekeepers of traditional value storage implementations. [6] The global internet and cellular technologies have connected billions of people and trillions of objects into the most complex networks ever created. This fluid and non-deterministic system of systems has unleashed an unprecedented reservoir of creativity, opportunity, capability and risk. The topology of knowledge and connections has never been so asymmetric whereby a single organization or individual (sometimes anonymously) can quickly gain the control, attention and function of millions of machines and people for costs that are often deemed to be insignificant. [7] Traditional methods of security consistently fail because of the nature of this topology and asymmetry. This novel organization of knowledge combined with the power of "action at a distance" requires a new paradigm to secure the future of open society and privacy. Traditional technology platforms for manufacturing, banking, healthcare, finance, social media etc., and their corresponding control mechanisms (digital signatures, passwords, virtual private networks) will potentially fall short in the face of pressure from new computer algorithms/technologies [8] and the global cultural shift that is now deemed to be irreversible (TikTok, WeChat, Facebook, Blockchain, Anonymous) [9]. Code can be exploited in exponential fashion and linear security countermeasures will continue to regularly fail. Undoubtedly, new network designs and technology paradigms will be needed to protect complex systems such as additive manufacturing machines, data and their associated supply chains. Quantum resistant algorithms [10] and novel encrypted and distributed data ledgers offer us hope to blunt this pernicious threat against a hyper-connected world.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信