Click any tag below to further narrow down your results
Links
The Bank for International Settlements and several central banks tested post-quantum cryptography to enhance payment system security against quantum computing threats. Their experiment successfully switched traditional digital signatures to post-quantum methods, highlighting the need for further testing due to performance differences.
The article discusses the impact of quantum computing on blockchain security, highlighting the risks of "harvest now, decrypt later" attacks. It examines the current state of blockchain protocols, particularly Bitcoin and privacy chains, and emphasizes the need for transitioning to post-quantum cryptographic methods to safeguard against future threats.
This article discusses how Sigstore is evolving to support multiple cryptographic algorithms while maintaining security. It details the challenges posed by rigid algorithms and outlines recent updates that allow for controlled flexibility in signing artifacts. The changes ensure that software signatures remain valid and secure over time.
A high-severity flaw in the node-forge JavaScript library allows attackers to bypass signature verifications by exploiting its ASN.1 validation mechanism. The issue affects versions 1.3.1 and earlier, and a fix has been released in version 1.3.2. Developers are urged to update immediately to prevent potential security risks.
Shift uses tamper-resistant hardware to securely manage private keys and transaction states, ensuring that digital value moves freely between devices without reliance on software. It incorporates remote attestation to verify the legitimacy of transactions and prevent fraud.
DumpBrowserSecrets is a tool that extracts sensitive data from various web browsers, including Chrome, Firefox, and Edge. It retrieves information like cookies, credentials, and browsing history using a combination of executable and DLL components. The tool can handle both Chromium-based and non-Chromium browsers for data extraction and decryption.
Nic Carter discusses the potential dangers quantum computing poses to Bitcoin, particularly its reliance on elliptic curve cryptography. He emphasizes the urgency for the Bitcoin community to prepare for a future where quantum technology could compromise the network's security and integrity.
The PQC Network Scanner evaluates an organization's cryptographic exposure as it prepares for post-quantum security. It analyzes TLS endpoints for both classical and emerging quantum-safe algorithms, helping teams identify vulnerabilities and improve their security posture. The tool also provides detailed reports on endpoint configurations and offers guidance on migration to new standards.
Cloudflare is working to implement Post-Quantum (PQ) cryptography to secure the Internet against future quantum computing threats. The proposed Merkle Tree Certificates (MTCs) aim to reduce the size and complexity of TLS handshakes, addressing the performance issues posed by large PQ signatures. This shift is essential for maintaining security without degrading performance.
This article discusses the risks that quantum computing poses to Bitcoin, particularly its cryptographic security. The author argues that the potential emergence of a cryptographically relevant quantum computer could severely undermine Bitcoin's integrity, prompting the need for immediate action.
OpenSSH has implemented post-quantum key agreement algorithms to protect SSH connections against potential attacks from future quantum computers. Since version 9.0, it has defaulted to these algorithms and will issue warnings for non-post-quantum connections starting with version 10.1. Users are encouraged to update their servers to utilize these stronger cryptographic methods to prevent vulnerabilities associated with "store now, decrypt later" attacks.
The article discusses the importance of scanning for post-quantum cryptographic support as quantum computing technology advances. It emphasizes the need for organizations to assess their current cryptographic systems and prepare for potential vulnerabilities that quantum attacks may pose. Strategies for implementing post-quantum cryptography are also explored to enhance security in the future.
Go has introduced native FIPS 140-3 support in its standard library, enhancing compliance for users in regulated environments. The Go Cryptographic Module v1.0.0, which is integrated into Go 1.24, simplifies the developer experience while ensuring uncompromised security and broad platform support. This new module provides a compliant and efficient solution for cryptographic operations in Go applications.
The article discusses the CHACHA and AES cryptographic algorithms, highlighting their simplicity and effectiveness in securing data. It delves into the design principles behind both algorithms, comparing their performance and use cases in modern cryptography. The focus is on how these algorithms balance security with efficiency in various applications.
Google commissioned Trail of Bits to audit Go's cryptography packages, resulting in one low-severity finding related to memory management in the legacy Go+BoringCrypto integration and several informational findings about potential timing side-channels. The audit confirms the security of Go's cryptography libraries and highlights ongoing improvements, including a new FIPS 140-3 mode and post-quantum cryptography support.
Encryption is a powerful tool for securing communications, but its effectiveness can be undermined by poor key management and human errors, such as mistakenly granting access to sensitive information. The article highlights the limitations of encryption, emphasizing that the real security challenges often stem from how keys are managed rather than the cryptographic algorithms themselves. Key management remains a complex issue that significantly impacts security outcomes.
The article reviews the cryptographic techniques employed by the Signal messaging app, highlighting its commitment to user privacy and security. It delves into the specific algorithms and protocols that underpin Signal's encryption, emphasizing the importance of robust cryptography in protecting user communications. Additionally, it discusses potential vulnerabilities and the app's response to security challenges.
The article discusses the discovery of cryptographic vulnerabilities in Cloudflare's CIRCL library, specifically regarding its FourQ elliptic curve implementation. These issues, related to insufficient validation of points during elliptic curve computations, could potentially allow attackers to exploit the system and derive secret keys. The vulnerabilities were reported and subsequently addressed by Cloudflare.