Laser Focus World is an industry bedrock—first published in 1965 and still going strong. We publish original articles about cutting-edge advances in lasers, optics, photonics, sensors, and quantum technologies, as well as test and measurement, and the shift currently underway to usher in the photonic integrated circuits, optical interconnects, and copackaged electronics and photonics to deliver the speed and efficiency essential for data centers of the future.

Our 80,000 qualified print subscribers—and 130,000 12-month engaged online audience—trust us to dive in and provide original journalism you won’t find elsewhere covering key emerging areas such as laser-driven inertial confinement fusion, lasers in space, integrated photonics, chipscale lasers, LiDAR, metasurfaces, high-energy laser weaponry, photonic crystals, and quantum computing/sensors/communications. We cover the innovations driving these markets.

Laser Focus World is part of Endeavor Business Media, a division of EndeavorB2B.

Laser Focus World Membership

Never miss any articles, videos, podcasts, or webinars by signing up for membership access to Laser Focus World online. You can manage your preferences all in one place—and provide our editorial team with your valued feedback.

Magazine Subscription

Can you subscribe to receive our print issue for free? Yes, you sure can!

Newsletter Subscription

Laser Focus World newsletter subscription is free to qualified professionals:

The Daily Beam

Showcases the newest content from Laser Focus World, including photonics- and optics-based applications, components, research, and trends. (Daily)

Product Watch

The latest in products within the photonics industry. (9x per year)

Bio & Life Sciences Product Watch

The latest in products within the biophotonics industry. (4x per year)

Laser Processing Product Watch

The latest in products within the laser processing industry. (3x per year)

Get Published!

If you’d like to write an article for us, reach out with a short pitch to Sally Cole Johnson: [email protected]. We love to hear from you.

Photonics Hot List

Laser Focus World produces a video newscast that gives a peek into what’s happening in the world of photonics.

Following the Photons: A Photonics Podcast

Following the Photons: A Photonics Podcast dives deep into the fascinating world of photonics. Our weekly episodes feature interviews and discussions with industry and research experts, providing valuable perspectives on the issues, technologies, and trends shaping the photonics community.

Editorial Advisory Board

  • Professor Andrea M. Armani, University of Southern California
  • Ruti Ben-Shlomi, Ph.D., LightSolver
  • James Butler, Ph.D., Hamamatsu
  • Natalie Fardian-Melamed, Ph.D., Columbia University
  • Justin Sigley, Ph.D., AmeriCOM
  • Professor Birgit Stiller, Max Planck Institute for the Science of Light, and Leibniz University of Hannover
  • Professor Stephen Sweeney, University of Glasgow
  • Mohan Wang, Ph.D., University of Oxford
  • Professor Xuchen Wang, Harbin Engineering University
  • Professor Stefan Witte, Delft University of Technology

Node in 5ireChain to be Attested with Hardware Root of Trust

In the face of increasing sophistication of cyber attacks, the need for an immutable security protocol cannot be downplayed. The hardware components of a network infrastructure can be the point of penetration into a network. With malicious code installed in a hardware, the entire network can be taken down by attackers. 5ire is using Hardware Root of Trust to ensure that the program running on their nodes is malware-free. 

Node in 5ireChain to be Attested with Hardware Root of Trust

In network computing, one thing is certain, there is a threat nearby. But the fear remains the uncertainty of the next victim. 

While the computing world looks for an ultimate solution to secure their network perimeter from existing threats, cyber attackers are committing as much hard work to develop a malware that will penetrate the most secured network. 

Cyber warfare continues as security gets more sophisticated and comprehensive. However, as the world gets more decentralized and connected, new loopholes are inadvertently created.  The incentives of a successful penetration into a network gets more juicy and attackers will never sheath their sword. 

The security of a network is considered a priority. This is even more the case with blockchain networks as they grapple with the trilemma. 

In a bid to deploy a foolproof security layer to the 5ireChain network, 5ire is utilizing hardware root of trust at the foundation of its security layers.

How Hardware Root of Trust Works

Hardware root of Trust is a security protocol that embeds security to the hardware component of a network infrastructure. Here the security layer descends beyond the software aspects. 

Hardware RoT is the first coach in a chain of security protocols. It works with TPM burned into the hardware infrastructure by the manufacturer, attesting that the program running in the hardware is not infected. This is a zero-trust security model because the need to trust the program is eliminated while guaranteeing its safety with a manufacturer-embedded security. 

5ire ensures that all nodes in the 5ireChain ecosystem  establish a certain level of trust. 5ire is introducing a hardware-based root of  trust based on Trusted Platform Module (TPM) technology. 

A TPM device will  allow 5ire nodes to remotely attest devices for any malicious code. TPM  contains a key pair called an Endorsement Key (EK). This is burned inside the  TPM device at the time of manufacture and even the manufacturer does not  know the private key as it is generated inside the TPM device using a random  seed. 

EK cannot be used to directly sign any piece of data, rather it is used to  generate another key pair called the attestation key (AK). An AK can be used  to sign attestation data inside the TPM device. This data is stored in platform  configuration registers (PCR), which act as applications’ hashes, starting when  the node starts and assisting in identifying malicious applications running on  a node. 5ireChain will ensure that all the block-assembling nodes participating  in the network are running similar applications when they boot.

The target of cyber attacks has gone beyond the software a computer is running or its network infrastructure to include the hardwares in which these programs are hosted. The role of hardware in a security outfit is paramount to the integrity of the entire security network. This is because software security is irrelevant if the hardware is already tampered with. 

With hardware RoT, the operating system running in a hardware device is scrutinized to ensure it is not infected. Since this security layer is embedded to the hardware and cannot be changed, it provides an impenetrable security layer on which other security layers directly or indirectly depend on.

Media Contact
Company Name: 5ire
Contact Person: Vilma Mattila
Email: Send Email
Country: United Kingdom
Website: https://5ire.org


Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.