{"id":3618,"date":"2019-07-22T12:57:57","date_gmt":"2019-07-22T19:57:57","guid":{"rendered":"https:\/\/nau.edu\/school-of-informatics-computing-and-cyber-systems\/?p=3618"},"modified":"2019-07-22T12:57:57","modified_gmt":"2019-07-22T19:57:57","slug":"cybersecurity-team-at-nau-testing-ternary-computing-to-secure-blockchain-technology-for-cryptocurrency-other-applications","status":"publish","type":"post","link":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/cybersecurity-team-at-nau-testing-ternary-computing-to-secure-blockchain-technology-for-cryptocurrency-other-applications\/","title":{"rendered":"Cybersecurity team at NAU testing ternary computing to secure blockchain technology for cryptocurrency, other applications"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-content\/uploads\/AdobeStock_205974059-Converted-960x384.png\" alt=\"\" width=\"960\" height=\"384\" class=\"alignnone size-tall-banner-image wp-image-3619\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/299\/AdobeStock_205974059-Converted-960x384.png 960w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/299\/AdobeStock_205974059-Converted-465x186.png 465w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p><em>April 8, 2019<\/em><\/p>\n<p>Cryptocurrency, or digital currency, was introduced in 2009 by Bitcoin, and the market has since expanded to include many other brands such as Ethereum, Ripple, Litecoin and Zcash.<\/p>\n<p>Because it is based on unique blockchain technology, a decentralized network that doesn\u2019t require a third party to process transactions, cryptocurrency operates independently from the global banking system. Data stored in a blockchain is permanent and cannot be modified, and it has been adapted for a wide variety of uses beyond cryptocurrency.<\/p>\n<p>The privacy that users of a network based on blockchain technology have, however, is a major drawback. Because users are nearly impossible to identify, these networks attract terrorists, criminals and black market businesses who wish to remain anonymous. Some experts believe that blockchain technology poses one of the biggest potential threats to U.S. national security.<\/p>\n<p>A team of cybersecurity researchers from NAU\u2019s School of Informatics, Computing, and Cyber Systems, led by professor of practice Bertrand Cambou, was recently awarded a $125,000 grant by the U.S. Air Force Research Lab (AFRL) to study how to apply NAU\u2019s technology to secure the blockchain with novel digital signature schemes.<\/p>\n<p><!--more--><br \/>\n<a href=\"http:\/\/news.nau.edu\/cambou-blockchain-security\/#.XTYTri2ZNZ1\">&#8230;continue reading<\/a><br \/>\n<!--more--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>April 8, 2019 Cryptocurrency, or digital currency, was introduced in 2009 by Bitcoin, and the market has since expanded to include many other brands such as Ethereum, Ripple, Litecoin and Zcash. Because it is based on unique blockchain technology, a decentralized network that doesn\u2019t require a third party to process transactions, cryptocurrency operates independently from [&hellip;]<\/p>\n","protected":false},"author":390,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"categories":[18,29],"tags":[39,40,28],"class_list":["post-3618","post","type-post","status-publish","format-standard","hentry","category-grant","category-research","tag-blockchain","tag-cryptocurrency","tag-siccs"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts\/3618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/comments?post=3618"}],"version-history":[{"count":0,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts\/3618\/revisions"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/media?parent=3618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/categories?post=3618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/tags?post=3618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}