Much of the security in the digital world is based on data encryption through algorithms. And as long as a person or computer has trouble discovering the algorithm behind that encryption, that security is guaranteed. In a previous blog on digital signatures, I described that many secret keys are based on the use of prime numbers. Computers have great difficulty with factoring, factoring large numbers into primes. The current world record for a supercomputer is currently a 768-bit number (ie a number with more than 230 numbers). As long as an algorithm uses a much larger prime number, the encryption will remain secure. RSA currently uses 2048 bit numbers. So safe…until now.
Quantum computing threatens encryption
With the ever-improving performance of quantum computers, the time is approaching when encryption no longer provides obvious security. Meanwhile, efforts are underway to find ways to escape this quantum threat. And a very good way is to use human logic that a computer doesn’t understand. A computer can calculate quickly, but it is not intelligent. As humans, we can put that intelligence into software and algorithms, but understanding human logic alone won’t work. Even artificial intelligence will be a different intelligence from human intelligence.
An STT study on artificial intelligence was titled ‘AI no longer has the plug’, a nod to independent system developments and ‘intelligently made’ robots that we humans can no longer unplug. However, technology decides independently, why us? program it that way. We use technology to imitate many earthly things, but always different from living nature. We can move underwater, but a submarine doesn’t swim like a fish. We also move through the air, but we don’t fly like birds. In short, the technical variants do the same thing but fundamentally different. Therefore, artificial intelligence is developing differently from human intelligence. Man has a conscience, a soul, wisdom and emotions. Things that a computer cannot or does not yet have independently.
Smarter than the computer
For new forms of security, the challenge is to stay smarter than an ever-faster computer. Even simple intelligence is often a problem for a computer. A computer can quickly find a definite needle in a haystack. But if he doesn’t know what a pin is, you can be so quick that you never know if you’ve found it or not. If you don’t know or understand what you’re looking for, it’s hard to find. That is the basis on which new forms of ‘quantum secure security’ are devised. As fast as it is, if the computer doesn’t understand the logic of what it’s looking for on you, you’re pretty safe. Also see my previous blog on Secure Quantum Digital Signature. Based on new ‘breaking methods’ with which computers, and also quantum computers, have great difficulty.
For said signature, a multidimensional vector space is used and the encryption is based on finding short broken vectors in that space. A difficult mathematical problem for which calculable and efficient solutions have not yet been found. Not even with quantum computers. Such break methods are also available for data storage. If the encrypted data is broken up into seemingly random chunks and also stored in different locations, it becomes nearly impossible to find, track, and decrypt the data. This breaking principle also applies to the use of different avatars in the pseudonymization of personal data, where it is not known which party has been pseudonymised for what. Using different pseudonyms for different purposes at different times creates extremely secure applications. Some kind of hiding place that a computer with its forward logic doesn’t understand?
And of course the blockchain and no password
Last but not least, the blockchain as a public accounting system greatly contributes to new security possibilities. By putting incomprehensible messages on the public blockchain that are only understandable by the user, you can safely transmit messages. Similar to the coded messages on the radio in times of war. See the nice article about this ‘the goose has flown’. The blockchain also builds on security itself by using rapid code changes with various cryptographic hash algorithms, such as the only open source Digibyte blockchain, making it extremely resistant to hackers.
In addition, we can log in more and more easily without passwords. Preferably through decentralized mobile applications to perform peer-to-peer communications without intermediaries. The best thing about all these new techniques is that we can (!) go back to the old secure Internet, without big providers, platforms and databases. The smaller the scale, the more difficult it is for hackers to find and steal information on a large scale. Therefore, it allows us to create a secure base platform for the new metaverse. A virtual, decentralized, digital world of networks and computers. Built from modern parts, but for our personal safety, refined mixed with bits of old-fashioned human intelligence.
That’s the beauty of metaverse development. The most modern cryptographic technology combined with old-fashioned human intelligence. In the elusive virtual world, every starting point must be and remain inherently secure. Zero Trust: Nothing or no one can be trusted. No password: every repeat can be found, so it only allows the unique use of unique codes. See my blog on decentralized identification: generate self-certifying identification codes on your mobile and be able to verify them yourself after each key rotation. There is also no central storage, but rather intelligently divided and distributed data sets in more places. The new metaverse is being built on the foundation of secure, decentralized data storage and management that respects privacy. Proven techniques that guarantee availability and continuity and that allow friendly applications for professional applications.
The metaverse is becoming important to industry and government. Not as a gaming site or a social meeting place, but as an adult digital twin of the physical world. The prospects for these modern trading platforms are becoming clearer and require fundamentally different platforms, networks and management systems. Digicorp Labs was founded to develop these fundamentally different tools and solutions for this new professional world. A virtual world of digital services and products where security, reliability, privacy, availability and continuity are important values. Passwordless decentralized applications that eliminate security risks. Digital property of objects and documents with NFTs. Facilitate the exchange of information and corporate communication between peers. Secure decentralized data management and data storage that respects privacy and pays costs with cryptocurrencies.
In short, Web 3.0 and the associated decentralized metaverse are important advances in our digital transformation. A complex subject with the challenge of making everything as simple as possible or keeping it as simple as possible without losing its essence. A beautiful and exciting journey lies ahead…
By: Hans Timmerman (photo), Chief Data Officer at DigiCorp Labs and Director of Fortierra