Click any tag below to further narrow down your results
Links
The Bank for International Settlements and several central banks tested post-quantum cryptography to enhance payment system security against quantum computing threats. Their experiment successfully switched traditional digital signatures to post-quantum methods, highlighting the need for further testing due to performance differences.
The article discusses the impact of quantum computing on blockchain security, highlighting the risks of "harvest now, decrypt later" attacks. It examines the current state of blockchain protocols, particularly Bitcoin and privacy chains, and emphasizes the need for transitioning to post-quantum cryptographic methods to safeguard against future threats.
This article discusses how Sigstore is evolving to support multiple cryptographic algorithms while maintaining security. It details the challenges posed by rigid algorithms and outlines recent updates that allow for controlled flexibility in signing artifacts. The changes ensure that software signatures remain valid and secure over time.
A high-severity flaw in the node-forge JavaScript library allows attackers to bypass signature verifications by exploiting its ASN.1 validation mechanism. The issue affects versions 1.3.1 and earlier, and a fix has been released in version 1.3.2. Developers are urged to update immediately to prevent potential security risks.
Shift uses tamper-resistant hardware to securely manage private keys and transaction states, ensuring that digital value moves freely between devices without reliance on software. It incorporates remote attestation to verify the legitimacy of transactions and prevent fraud.
The Ethereum Foundation has established a post-quantum security team to address threats from quantum computing. Led by Thomas Coratger, the initiative includes a $1 million Poseidon Prize for enhancing a key hash function and aims to strengthen Ethereum's defenses against potential quantum attacks.
DumpBrowserSecrets is a tool that extracts sensitive data from various web browsers, including Chrome, Firefox, and Edge. It retrieves information like cookies, credentials, and browsing history using a combination of executable and DLL components. The tool can handle both Chromium-based and non-Chromium browsers for data extraction and decryption.
The author shares their experience using Claude Code to debug a Go implementation of the ML-DSA post-quantum signature algorithm. Despite initial difficulties, the AI quickly identified and suggested fixes for complex bugs in the cryptographic code, demonstrating its utility in low-level programming tasks.
Nic Carter discusses the potential dangers quantum computing poses to Bitcoin, particularly its reliance on elliptic curve cryptography. He emphasizes the urgency for the Bitcoin community to prepare for a future where quantum technology could compromise the network's security and integrity.
This article discusses a Google Research case study where an LLM identified a bug in a cryptography paper on SNARGs that human reviewers missed. The authors used a detailed prompting strategy to guide the model through a rigorous review process, showcasing the potential of LLMs in academic research and audits.
Cloudflare is working to implement Post-Quantum (PQ) cryptography to secure the Internet against future quantum computing threats. The proposed Merkle Tree Certificates (MTCs) aim to reduce the size and complexity of TLS handshakes, addressing the performance issues posed by large PQ signatures. This shift is essential for maintaining security without degrading performance.
The PQC Network Scanner evaluates an organization's cryptographic exposure as it prepares for post-quantum security. It analyzes TLS endpoints for both classical and emerging quantum-safe algorithms, helping teams identify vulnerabilities and improve their security posture. The tool also provides detailed reports on endpoint configurations and offers guidance on migration to new standards.
This article discusses a method to improve wallet security by using cryptographic proofs to verify transaction simulations. It aims to eliminate reliance on potentially compromised third-party RPC providers, allowing users to see accurate transaction outcomes before signing. The proposed solution employs Merkle Patricia Trie proofs and multi-node consensus for enhanced trust and verification.
This article discusses the future of the Rust cryptography ecosystem, focusing on its development and potential impact by 2026. It outlines key projects, trends, and the growing importance of Rust in secure programming.
This article explores the concept of finality in blockchain systems, emphasizing how it varies based on social consensus, cryptographic security, and time. It discusses different types of finality, such as social, protocol, and cryptoeconomic finality, and how user beliefs influence their confidence in transaction permanence.
This article discusses the risks that quantum computing poses to Bitcoin, particularly its cryptographic security. The author argues that the potential emergence of a cryptographically relevant quantum computer could severely undermine Bitcoin's integrity, prompting the need for immediate action.
This article explores two protocols for verifying the authenticity of media: C2PA and CPP. It highlights their differences, particularly focusing on C2PA's limitations in forensic contexts and CPP's enhanced features like independent timestamps and deletion detection. The author shares implementation details using real code examples.
Zero is a decentralized multi-core world computer that uses Zero-Knowledge proofs to enhance blockchain performance. It separates execution from verification, allowing for high transaction speeds and supporting various applications simultaneously. This architecture aims to provide a scalable alternative to traditional cloud services.
OpenNHP is an open-source toolkit designed to implement Zero Trust security in an AI-driven environment by utilizing cryptography and advanced protocols to conceal server resources and ensure data privacy. It introduces the Network-infrastructure Hiding Protocol (NHP) and Data-object Hiding Protocol (DHP), which together enhance security against rising AI-driven cyber threats. With a focus on proactive defense and rapid response strategies, OpenNHP addresses vulnerabilities effectively while providing a modular architecture for scalability and integration with existing security systems.
Memory access time in computer science should be modeled as O(N^α) instead of O(1), as it is affected by the distance to memory and the physical limits of signal transmission. This has practical implications, particularly in optimizing algorithms, such as those used in cryptography, where the size of precomputed tables can significantly impact performance. Understanding these nuances is crucial as computing approaches the limits of general-purpose CPUs and explores specialized hardware like ASICs.
OpenSSH has implemented post-quantum key agreement algorithms to protect SSH connections against potential attacks from future quantum computers. Since version 9.0, it has defaulted to these algorithms and will issue warnings for non-post-quantum connections starting with version 10.1. Users are encouraged to update their servers to utilize these stronger cryptographic methods to prevent vulnerabilities associated with "store now, decrypt later" attacks.
Project Eleven announces a $6 million seed round to develop quantum-resistant solutions for Bitcoin and other digital assets, addressing the imminent threat posed by quantum computing to current cryptography. Their first product, yellowpages, is designed to generate quantum-safe keys for Bitcoin ownership while facilitating necessary upgrades to blockchain protocols. The initiative aims to not only preserve digital asset security but also leverage quantum technology to create innovative financial systems.
The article discusses the importance of scanning for post-quantum cryptographic support as quantum computing technology advances. It emphasizes the need for organizations to assess their current cryptographic systems and prepare for potential vulnerabilities that quantum attacks may pose. Strategies for implementing post-quantum cryptography are also explored to enhance security in the future.
Signal has introduced the Sparse Post Quantum Ratchet (SPQR) to enhance the Signal Protocol's security against potential quantum computing threats, while preserving existing features like forward secrecy and post-compromise security. This new ratchet works alongside the existing Double Ratchet to ensure secure messaging that remains resilient even in the face of future quantum attacks. Users will experience no changes in their app, as the transition to this protocol will occur automatically.
The article discusses the GKR protocol, which enhances the efficiency of proving computations like Poseidon hashes by avoiding commitments to intermediate layers. It highlights the protocol's suitability for handling large-scale computations in cryptography and AI, specifically emphasizing its use in zero-knowledge proofs and the structure of neural networks.
A hash function maps complex inputs to a single number, facilitating data storage and cryptography. The article explores hash collisions, illustrating their probability using examples like the birthday problem, and provides methods for calculating and approximating these probabilities, emphasizing the importance of minimizing collisions in applications like database design.
The article discusses the CHACHA and AES cryptographic algorithms, highlighting their simplicity and effectiveness in securing data. It delves into the design principles behind both algorithms, comparing their performance and use cases in modern cryptography. The focus is on how these algorithms balance security with efficiency in various applications.
Go has introduced native FIPS 140-3 support in its standard library, enhancing compliance for users in regulated environments. The Go Cryptographic Module v1.0.0, which is integrated into Go 1.24, simplifies the developer experience while ensuring uncompromised security and broad platform support. This new module provides a compliant and efficient solution for cryptographic operations in Go applications.
Quantum computers have made significant advances, enabling them to break RSA encryption 20 times faster than before, raising concerns about the security of data encrypted with this widely used method. This development underscores the urgent need for transitioning to quantum-resistant cryptographic algorithms to safeguard sensitive information.
Google commissioned Trail of Bits to audit Go's cryptography packages, resulting in one low-severity finding related to memory management in the legacy Go+BoringCrypto integration and several informational findings about potential timing side-channels. The audit confirms the security of Go's cryptography libraries and highlights ongoing improvements, including a new FIPS 140-3 mode and post-quantum cryptography support.
A Bitcoin developer has proposed a hard fork to transition BTC from legacy wallets to those secured by post-quantum cryptography, aiming to protect against potential quantum computing threats to current ECDSA signatures. The proposal includes a migration deadline for users to move their funds to more secure wallets, and it has sparked debate within the community about its feasibility and implications.
Encryption is a powerful tool for securing communications, but its effectiveness can be undermined by poor key management and human errors, such as mistakenly granting access to sensitive information. The article highlights the limitations of encryption, emphasizing that the real security challenges often stem from how keys are managed rather than the cryptographic algorithms themselves. Key management remains a complex issue that significantly impacts security outcomes.
The article reviews the cryptographic techniques employed by the Signal messaging app, highlighting its commitment to user privacy and security. It delves into the specific algorithms and protocols that underpin Signal's encryption, emphasizing the importance of robust cryptography in protecting user communications. Additionally, it discusses potential vulnerabilities and the app's response to security challenges.
Web3, originally envisioned as a decentralized alternative to the current Internet dominated by major corporations, has evolved into a broader ecosystem focused on cryptocurrency and financial products. Riad Wahby discusses the integral role of cryptography in Web3, the benefits and risks associated with its rapid development, and the importance of hardware security in safeguarding digital assets. He highlights efforts to enhance hardware security modules to better support the needs of Web3 applications.
GitHub Actions can be utilized as an oracle to notarize web content, allowing users to cryptographically prove the existence of online articles even after they are removed. By leveraging GitHub's ID Tokens and logging capabilities, this approach enables secure and publicly verifiable attestations of digital content without relying on complex trusted execution environments. The article also discusses methods for chaining attestations to maintain integrity over time.
AWS has integrated the ML-KEM post-quantum key encapsulation mechanism into its Key Management Service, Certificate Manager, and Secrets Manager to enhance TLS security against future quantum threats. While quantum computers do not currently pose a risk, implementing ML-KEM ensures protection against potential long-term vulnerabilities. Users can enable this feature with minimal performance impact by updating their client SDKs.
The article discusses the discovery of cryptographic vulnerabilities in Cloudflare's CIRCL library, specifically regarding its FourQ elliptic curve implementation. These issues, related to insufficient validation of points during elliptic curve computations, could potentially allow attackers to exploit the system and derive secret keys. The vulnerabilities were reported and subsequently addressed by Cloudflare.