Trending

#Cryptographic

Latest posts tagged with #Cryptographic on Bluesky

Latest Top
Trending

Posts tagged #Cryptographic

Original post on etedge-insights.com

We haven’t even quantified the risk of Agentic AI yet Kevin Weiss warns that organisations are deploying autonomous AI systems without fully measuring the cryptographic and security risks they in...

#Cyber #Security #Agentic #AI #security #risks […]

[Original post on etedge-insights.com]

0 0 0 0
Post image

Inside ‘Make Trust Irrelevant’: The Open-Source Manifesto Rewriting the Rules of Digital Verification An open-source GitHub project called 'Make Trust Irrelevant' proposes replacing ins...

#AgenticAI #AISecurityPro #cryptographic #verification #decentralized […]

[Original post on webpronews.com]

0 0 0 0
Post image

Arqit Launches Encryption Intelligence for Post-Quantum Cryptography Planning Insider Brief PRESS RELEASE — Arqit (Nasdaq: ARQQ, ARQQW), a global leader in quantum-safe encryption, today announce...

#Daily #Quantum #Business #ArQit #Cryptographic […]

[Original post on thequantuminsider.com]

0 0 0 0
Post image

Keyfactor and IBM Consulting launch joint solution to accelerate post-quantum cryptography readiness Digital trust and quantum-safe security company Keyfactor Inc. today announced a new joint solut...

#NEWS #Security #The-Latest #cryptographic #security […]

[Original post on siliconangle.com]

0 0 0 0
Preview
Constructing indistinguishability obfuscation schemes in a hardness rich world Rachel Lin’s talk, “Expedition to Obfustopia,” at the Simons Institute examined indistinguishability obfuscation (IO) in cryptography. She highlighted the challenges in constructi…

In my latest blog, I discuss the challenges of building a powerful #cryptographic technique that aims to “obfuscate” the internal implementation details of programs- lnkd.in/gT3smPZh
Thanks Seyoon Ragavan and Rahul llango for the nice chat about their works @simonsinstitute.bsky.social!
#TCS

7 3 0 0
MultiSearch Tag Explorer MultiSearch Tag Explorer - Explore tags and search results by aéPiot

#CRYPTOGRAPHIC #NONCE
multi-search-tag-explorer.allgraph.ro/advanced-sea...
#DOUBLE #TROUBLE 1941 #FILM
multi-search-tag-explorer.allgraph.ro/advanced-sea...

fed.brid.gy/bsky/aepiot.bsky.social

allgraph.ro

0 0 0 0
Original post on globalfintechseries.com

Krown Technologies & ExeQuantum File Joint Patent for SiFA, a New Cryptographic Layer to Stop Email & Payments Fraud Krown and ExeQuantum announce SiFA, a new cryptographic authentication l...

#Uncategorized #AI-generated #AI‑driven #Cryptographic […]

[Original post on globalfintechseries.com]

0 0 0 0
Preview
Taiwan gets first Quantum Resistant Hardware Devices worldwide The quantum-resistant hardware devices feature sub-millisecond switching, HNDL protection, and mission-critical hardware-data isolation.

Taiwan gets first Quantum Resistant Hardware Devices worldwide #quantum #ai #military #microsoft #cryptographic

2 0 0 0
Post image

SRAM PUF: A Revolutionary Approach to Cryptographic Key Protection A secure, device-unique method for key generation without storing keys at rest. The post SRAM PUF: A Revolutionary Approach to Cry...

#IoT #and #Security #Whitepapers #cryptographic #key […]

[Original post on semiengineering.com]

0 0 0 0
Post image

📣 The PQ-NEXT (Post-Quantum Networks for Energy-eXfficient Transitions) project has kicked off!
Our 3-year journey is on with a clear mission to develop a comprehensive framework that will enable a smooth and #secure 🔏transition to #postquantum #cryptographic standards.
🔖 zenodo.org/records/1769...

5 1 0 1

i will begin a new #thread here on #bsky, #ai #art #protection. i thought, why not use AI to protect against others AI? kind of like #alan-turings ( #turing s )
#bombe versus #enigma (ofc it was more than this, #cryptographic and #math analysis etc but)

see this too:
bsky.app/profile/lone...

1 1 6 1
Post image

Viasat to deliver space crypto solution for USSF SSC Viasat, Inc. (NASDAQ: VSAT) is developing a new, space-based encryption solution to support data security for U.S. Space Force (USSF) Space Syst...

#Business #Moves #Contracts #Encryption #End […]

[Original post on news.satnews.com]

0 0 0 0
Original post on biometricupdate.com

Entrust hardware security module running PQC algorithms validated by NIST program Implementations of three post-quantum encryption algorithms standardized by NIST on a hardware security module from...

#Access #Control #Biometric #R&D; #Biometrics #News […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on industrialcyber.co

NIST’s CMVP automation effort aims to bridge compliance and industry timelines The U.S. National Institute of Standards and Technology (NIST) has, through its National Cybersecurity Center of Exc...

#Attacks #and #Vulnerabilities #Critical #infrastructure #News #NIST #automation #CMVP […]

0 0 0 0
Quantum Computers Break Tiny RSA Key

Quantum Computers Break Tiny RSA Key

#量子计算机破解微小的 RSA 密钥

量子计算引发了人们对 #cryptographic #security 的担忧。

阅读更多: blockzhub.io/news/68bacb9ec11627f2e7e...

0 0 0 0
Quantum Computers Break Tiny RSA Key

Quantum Computers Break Tiny RSA Key

#Quantum Computers Break Tiny RSA Key

Quantum computing sparks concerns about #cryptographic #security.

Read more: blockzhub.io/news/68bacb9ec11627f2e7e...

0 0 0 0
Original post on globalfintechseries.com

Sovereign Wallet Unveils ‘MMUI-Quantum’: Industry’s First Post-Quantum Cryptographic Library Supporting 10 Programming Languages Integrating 33 Classical and 29 Post-Quantum Cryptographic Alg...

#Blockchain #Cryptocurrency #News #Cryptographic […]

[Original post on globalfintechseries.com]

0 1 0 0
Preview
The little things matter most: NIST finalises lightweight cryptographic standard The National Institute of Standards and Technology (NIST) has recently finalised a lightweight cryptography standard designed to provide a defence from cyber attacks for even the smallest of…

The little things matter most: NIST finalises lightweight cryptographic standard - buff.ly/19okWui #iot #nist #security #cryptographic

0 0 0 0
ZK-proofs Can Protect Privacy, Still Combat Bad Actors A16z Crypto says ZK-proofs can protect privacy while aiding law enforcement, weeks after Tornado Cash’s Roman Storm was…

🚨LATEST: A16z Crypto says ZK-proofs can protect privacy while aiding law enforcement, weeks after Tornado Cash’s Roman Storm was… #A16zCrypto #BadActors #Cryptographic

0 0 0 0
Original post on globalfintechseries.com

Qubit Launches Quantum-Secured Wallet App for Web3 Users Across iOS and Android Qubit, a Web3 infrastructure company developing quantum-powered blockchain tools, has officially launched the Qubit ...

#Digital #Wallet #Fintech #News #blockchain #tools […]

[Original post on globalfintechseries.com]

0 0 0 0
Original post on rivitmedia.com

Hardware Security Modules (HSM): A Critical Layer of Business Cybersecurity What Are Hardware Security Modules (HSMs)? The post Hardware Security Modules (HSM): A Critical Layer of Business Cyberse...

#Cybersecurity #for #Business #business #cybersecurity […]

[Original post on rivitmedia.com]

0 0 0 0
Preview
Bitcoin Encryption Faces Future Threat from Quantum Breakthroughs   In light of the rapid evolution of quantum computing, it has become much more than just a subject for academic curiosity—it has begun to pose a serious threat to the cryptographic systems that secure digital currencies such as Bitcoin, which have long been a secure cryptographic system.  According to experts, powerful quantum machines will probably be able to break the elliptic curve cryptography (ECC), which underpins Bitcoin's security, within the next one to two decades, putting billions of dollars worth of digital assets at risk. Despite some debate regarding the exact timing, there is speculation that quantum computers with the capabilities to render Bitcoin obsolete could be available by 2030, depending on the advancement of quantum computing in terms of qubit stability, error correction, and other aspects.  Cryptographic algorithms are used to secure transactions and wallet addresses in Bitcoin, such as SHA-256 and ECDSA (Elliptic Curve Digital Signature Algorithm). It can be argued that quantum algorithms, such as Shor's, might allow the removal of these barriers by cracking private keys from public addresses in a fraction of the time it would take classical computers.  Although Bitcoin has not yet been compromised, the crypto community is already discussing possible post-quantum cryptographic solutions. There is no doubt that quantum computing is on its way; if people don't act, the very foundation of decentralised finance could be shattered. The question is not whether quantum computing will arrive, but when.  One of the most striking revelations in the cybersecurity and crypto communities is a groundbreaking simulation conducted with OpenAI's o3 model that has re-ignited debate within the communities, demonstrating a plausible future in which quantum computing could have a severe impact on blockchain security. This simulation presents the scenario of a quantum breakthrough occurring as early as 2026, which might make many of today's cryptographic standards obsolete in a very real way.  There is a systemic threat to the broader cryptocurrency ecosystem under this scenario, and Bitcoin, which has been the largest and most established digital asset for quite some time, stands out as the most vulnerable. At the core of this concern is that Bitcoin relies heavily upon elliptic curve cryptography (ECC) and the SHA-256 hashing algorithm, two of which have been designed to withstand attacks from classical computers.  A recent development in quantum computing, however, highlights how algorithms such as Shor's could be able to undermine these cryptographic foundations in the future. Using a quantum computer of sufficient power, one could theoretically reverse-engineer private keys from public wallet addresses, which would compromise the security of Bitcoin transactions and user funds. Industry developments underscore the urgency of this threat.  It has been announced that IBM intends to launch its first fault-tolerant quantum system by 2029, referred to as the IBM Quantum Starling, a major milestone that could accelerate progress in this field. However, concerns are still being raised by experts. A Google quantum researcher, Craig Gidney, published in May 2025 findings suggesting that previous estimations of the quantum resources needed to crack RSA encryption were significantly overstated as a result of these findings.  Gidney's research indicated that similar cryptographic systems, such as ECC, could be under threat sooner than previously thought, with a potential threat window emerging between 2030 and 2035, despite Bitcoin's use of RSA. In a year or two, IBM plans to reveal the first fault-tolerant quantum computer in the world, known as Quantum Starling, by 2029, which is the biggest development fueling quantum optimism.  As opposed to current quantum systems that suffer from high error rates and limited stability, fault-tolerant quantum machines are designed to carry out complex computations over extended periods of time with reliability. This development represents a pivotal change in quantum computing's practical application and could mark the beginning of a new era in quantum computing.  Even though the current experimental models represent a major leap forward, a breakthrough of this nature would greatly reduce the timeline for real-world cryptographic disruption. Even though there has been significant progress in the field of quantum computing, experts remain divided as to whether it will actually pose any real threat in the foreseeable future. Despite the well-documented theoretical risks, the timeline for practical impacts remains unclear.  Even though these warnings have been made, opinions remain split among bitcoiners. Adam Back, CEO of Blockstream and a prominent voice within the Bitcoin community, maintains that quantum computing will not be a practical threat for at least two decades. However, he acknowledged that rapid technological advancement could one day lead to a migration to quantum-resistant wallets, which might even affect long-dormant holdings such as the ones attributed to Satoshi Nakamoto, the mysterious creator of Bitcoin.  There is no longer a theoretical debate going on between quantum physics and cryptography; rather, the crypto community must now contend with a pressing question: at what point shall the crypto community adapt so as to secure its future in a quantum-powered world? It is feared by Back, who warned Bitcoin users—including those who have long-dormant wallets, such as those attributed to Satoshi Nakamoto—that as quantum capabilities advance, they may be forced to migrate their assets to quantum-resistant addresses to ensure continued security in the future.  While the threat does not occur immediately, digital currency enthusiasts need to begin preparations well in advance in order to safeguard their future. This cautious but pragmatic viewpoint reflects the sentiment of the larger industry. The development of quantum computing has increasingly been posed as a serious threat to the Bitcoin blockchain's security mechanisms that are based on this concept.  A recent survey shows that approximately 25% of all Bitcoins are held in addresses that could be vulnerable to quantum attacks, particularly those utilising older forms of cryptographic exposure, such as pay-to-public-key (P2PK) addresses. When quantum advances outpace public disclosure - which is a concern that some members of the cybersecurity community share - the holders of such vulnerable wallets may be faced with an urgent need to act if quantum advancements exceed public disclosure.  Generally, experts recommend transferring assets to secure pay-to-public-key-hash (P2PKH) addresses, which offer an additional level of cryptographic security. Despite the fact that there is secure storage, users should ensure that private keys are properly backed up using trusted, offline methods to prevent accidental loss of access to private keys. However, the implications go beyond individual wallet holders.  While some individuals may have secured their assets, the broader Bitcoin ecosystem remains at risk if there is a significant amount of Bitcoin exposed, regardless of whether they can secure their assets. Suppose there is a mass quantum-enabled theft that undermines market confidence, leads to a collapse in Bitcoin's value, and damages the credibility of blockchain technology as a whole? In the future, even universal adoption of measures such as P2PKH is not enough to prevent the inevitable from happening.  A quantum computer could eventually be able to compromise current cryptographic algorithms rapidly if it reaches a point at which it can do so, which may jeopardise Bitcoin's transaction validation process itself if it reaches that point. It would seem that the only viable long-term solution in such a scenario is a switch to post-quantum cryptography, an emerging class of cryptography that has been specifically developed to deal with quantum attacks. Although these algorithms are promising, they present new challenges regarding scalability, efficiency, and integration with existing protocols of blockchains. Several cryptographers throughout the world are actively researching and testing these systems in an attempt to build robust, quantum-resistant blockchain infrastructures capable of protecting digital assets for years to come.  It is believed that Bitcoin's cryptographic framework is based primarily on Elliptic Curve Digital Signature Algorithm (ECDSA), and that its recent enhancements have also included Schnorr signatures, an innovation that improves privacy, speeds transaction verification, and makes it much easier to aggregate multiple signatures than legacy systems such as RSA. The advancements made to Bitcoin have helped to make it more efficient and scalable.  Even though ECDSA and Schnorr are both sophisticated, they remain fundamentally vulnerable to a sufficiently advanced quantum computer in terms of computational power. There is a major vulnerability at the heart of this vulnerability, which is Shor's Algorithm, a quantum algorithm introduced in 1994 that, when executed on an advanced quantum computer, is capable of solving the mathematical problems that govern elliptic curve cryptography quite efficiently, as long as that quantum system is powerful enough.  Even though no quantum computer today is capable of running Shor’s Algorithm at the necessary scale, today’s computers have already exceeded the 100-qubit threshold, and rapid advances in quantum error correction are constantly bridging the gap between theoretical risk and practical threat, with significant progress being made in quantum error correction. It has been highlighted by the New York Digital Investment Group (NYDIG) that Bitcoin is still protected from quantum machines in today's world, but may not be protected as much in the future, due to the fact that it may not be as safe against quantum machines.  Bitcoin's long-term security depends on more than just hash power and decentralised mining, but also on adopting quantum-resistant cryptographic measures that are capable of resisting quantum attacks in the future. The response to this problem has been to promote the development of Post-Quantum Cryptography (PQC), a new class of cryptographic algorithms designed specifically to resist quantum attacks, by researchers and blockchain developers.  It is, however, a highly complex challenge to integrate PQC into Bitcoin's core protocol. These next-generation cryptographic schemes can often require much larger keys and digital signatures than those used today, which in turn could lead to an increase in blockchain size as well as more storage and bandwidth demands on the Bitcoin network. As a result of slower processing speeds, Bitcoin's scalability may also be at risk, as this may impact transaction throughput. Additionally, the decentralised governance model of Bitcoin adds an extra layer of difficulty as well.  The transition to the new cryptographic protocol requires broad agreement among developers, miners, wallet providers, and node operators, making protocol transitions arduous and politically complicated. Even so, there is still an urgency to adapt to the new quantum technologies as the momentum in quantum research keeps growing. A critical moment has come for the Bitcoin ecosystem: either it evolves to meet the demands of the quantum era, or it risks fundamental compromise of its cryptographic integrity if it fails to adapt.  With quantum technology advancing from the theoretical stage to practical application, the Bitcoin community stands at a critical turning point. Despite the fact that the current cryptographic measures remain intact, a forward-looking response is necessary in order to keep up with the rapid pace of innovation.  For the decentralised finance industry to thrive, it will be necessary to invest in quantum-resilient infrastructure, adopt post-quantum cryptographic standards as soon as possible, and collaborate with researchers, developers, and protocol stakeholders proactively.  The possibility of quantum breakthroughs being ignored could threaten not only the integrity of individual assets but also the structural integrity of the entire cryptocurrency ecosystem if people fail to address their potential effects. To future-proof Bitcoin, it is also crucial that people start doing so now, not in response to an attack, but to prepare for a reality that the more technological advancements they make, the closer it seems to being a reality.

Bitcoin Encryption Faces Future Threat from Quantum Breakthroughs #AIvulnerabilities #BitcoinCyberThreat #Cryptographic

1 0 0 0
Preview
Core Cryptographic Technique Compromised Putting Blockchain Security at Risk   The concept of randomness is often regarded as a cornerstone of fairness, security, and predictability in both physical and digital environments. Randomness must be used to ensure impartiality, protect sensitive information, and ensure integrity, whether it is determining which team kicks off a match by coin toss or securely securing billions of online transactions with cryptographic keys.  However, in the digital age, it is often very challenging and resource-consuming to generate true randomness. Because of this limitation, computer scientists and engineers have turned to hash functions as a tool to solve this problem.  Hash functions are mathematical algorithms that mix input data in an unpredictable fashion, yielding fixed-length outputs. Although these outputs are not truly random, they are designed to mimic randomness as closely as possible.  Historically, this practical substitution has been based on the widely accepted theoretical assumption of a random oracle model, which holds that the outputs of well-designed hash functions are indistinguishable from genuine randomness. As a result of this model, numerous cryptographic protocols have been designed and analysed, enabling secure communication, digital signatures, and consensus mechanisms, which have established it as a foundational pillar in cryptographic research.  Despite this, as this assumption has been increasingly relied upon, so too has the scrutiny of its limits become more critical, raising serious questions about the long-term resilience of systems built on a system that may only be an illusion of randomness based on it. By enabling transparent, tamper-evident, and trustless transactions, blockchain technology is transforming a wide range of industries, ranging from finance and logistics to health care and legal systems.  In light of the increasing popularity of the technology, it has become increasingly crucial for companies to secure digital assets, safeguard sensitive information, and ensure the integrity of their transactions in order to scale their adoption effectively. Organisations must have a deep understanding of how to implement and maintain strong security protocols across the blockchain ecosystem to ensure the effectiveness of enterprise adoption.  In order to secure blockchain networks, there must be a variety of critical issues addressed, such as verifying transactions, verifying identities, controlling access to the blockchain, and preventing unauthorised data manipulation. Blockchain's trust model is based on robust cryptographic techniques that form the foundation of these security measures.  An example of symmetric encryption utilises the same secret key for both encryption and decryption; an example of asymmetric encryption is establishing secure communication channels and verifying digital signatures through the use of a public-private key pair; and another example is cryptographic hash functions that generate fixed-length, irreversible representations of data and thus ensure integrity and non-repudiation of data. Several of these cryptographic methods are crucial to maintaining the security and resilience of blockchain systems, each playing a distinct and vital role. As a general rule, symmetric encryption is usually used in secure data exchange between trusted nodes, whereas asymmetric encryption is commonly used in identifying and signing transactions. Hash functions, on the other hand, are essential to the core blockchain functions of block creation, consensus mechanisms, and proof-of-work algorithms.  By using these techniques, blockchain networks are able to provide a secure, transparent and tamper-resistant platform that can meet the ever-growing demands of modern digital infrastructure, while simultaneously offering a secure, transparent, and tamper-resistant platform. In the broader world of cybersecurity, cryptography serves as a foundational technology for protecting digital systems, communication channels, and data. In addition to maintaining confidentiality, making sure sensitive data is protected from unauthorised access, and ensuring data integrity by detecting tampering or unauthorised modifications, it is an essential part of maintaining data integrity. As well as protecting data, cryptography also enables authentication, using mechanisms such as digital certificates and cryptographic signatures, which enable organisations to verify the identity of their users, devices, and systems in a high-assurance manner.  The adoption of cryptographic controls is explicitly required by many data protection and privacy regulations, including the GDPR, HIPAA, and PCI-DSS, placing cryptography as an essential tool in ensuring regulatory compliance across many industries. With the development of more sophisticated cybersecurity strategies, cryptography will become increasingly important as it is integrated into emerging frameworks like the Zero Trust architecture and defence-in-depth models in order to respond to increasingly sophisticated threats.  As the ultimate safeguard in multi-layered security strategies, cryptography plays a crucial role—a resilient barrier that is able to protect data even when a system compromise takes place. Despite the fact that attackers may penetrate outer security layers, strong encryption ensures that critical information will remain unable to be accessed and understood without the right cryptographic key if they manage to penetrate outer security layers.  Using the Zero Trust paradigm, which assumes that there should be no inherently trustworthy user or device, cryptography enables secure access by enforcing granular authentication, encryption of data, and policy-driven access controls as well. The software secures data both in transit and at rest, reducing the risk of lateral movement, insider threats, and compromised credentials.  A cyberattack is becoming increasingly targeted at core infrastructures as well as high-value data, and cryptographic technologies can provide enduring protection, ensuring confidentiality, integrity, and availability, no matter what environment a computer or network is in. The development of secure, resilient, and trustworthy digital ecosystems relies on cryptography more than any other technical component.  A groundbreaking new study has challenged a central assumption in modern cryptography - that the random oracle model can be trusted - as well as challenged a fundamental part of cryptography's reliability. An effective technique has been developed to deceive a widely used, commercially available cryptographic proof system into validating false statements, revealing a method that is new to the world of cryptographic proof.  In light of the fact that the system in question has long been considered secure, the random oracle model has long assumed that its outputs mimic genuine randomness. This revelation is particularly alarming. According to the researchers, the vulnerability they discovered raises significant concerns for blockchain ecosystems, especially those in which proof protocols play a key role in validating off-chain computations and protecting transaction records, especially those within blockchain ecosystems.  The vulnerability carries significant repercussions for the blockchain and cryptocurrency industries, where the stakes are extremely high. According to the researcher Eylon Yogev from Bar-Ilan University in Israel, "there is quite a bit of money being made with these kinds of things." Given the substantial incentives for adversaries to exploit cryptographic vulnerabilities, malicious actors have a strong chance of undermining the integrity of blockchains.  In the paper, Dmitry Khovratovich, a member of the Ethereum Foundation, Ron Rothblum, a member of the Technion–Israel Institute of Technology and zero-knowledge proof firm Succinct and Lev Soukhanov of the blockchain-focused startup [[alloc] init] all point out that the attacks are not restricted to any particular hash function.  As a matter of fact, it exposes a more fundamental problem: it enables the fabrication of convincing, yet false, proofs regardless of the specific hash function used to simulate randomness within the system. This discovery fundamentally challenges the notion that hash-based randomness in cryptographic applications can always replace the real-world unpredictable nature of cryptography.  A growing number of blockchain technologies are being developed and scaled, so the findings make it clear that we need more robust, formally verifiable security models—ones that are not based on idealised assumptions alone—as the technology continues to grow and grow. Encryption backdoors are deliberately designed, concealed vulnerabilities within cryptographic systems that allow unauthorised access to encrypted data despite standard authentication or decryption procedures being bypassed.  This type of hidden mechanism can be embedded within a wide variety of digital technologies — from secure messaging platforms to cloud storage to virtual private networks and communication protocols, to name but a few. As encryption is intended to keep data secure, so only those with the intent to access it can do so, a backdoor undermines this principle effectively by providing a secret entry point that is usually known to the creators or designated third parties only.  As an example, imagine encrypted data being stored in a highly secure digital vault, where access is restricted only to those with special cryptographic keys that they have, along with the recipient of the data, which can only be accessed by them. It is often said that backdoors are like concealed second keyholes — one undocumented and deliberately concealed — which can be used by selected entities without the user's knowledge or consent to unlock the vault.  It is clear that proponents of such mechanisms contend that they are essential to national security and critical law enforcement operations, but this viewpoint remains very contentious among cybersecurity professionals and privacy advocates. Regardless of the purpose of the intentional vulnerability, it erodes the overall security posture of any system when included.  There is a single point of failure with backdoors; if they are discovered or exploited by malicious actors such as hackers, foreign intelligence services, or insider threats, they have the ability to compromise a large amount of sensitive data. Having a backdoor negates the very nature of encryption, and turns robust digital fortresses into potentially leaky structures by the very nature of their existence.  This implies that the debate over backdoors lies at an intersection of information privacy, trust, and security, and, in doing so, raises profound questions regarding whether the pursuit of surveillance should be made at the expense of an adequate level of digital security for every person.

Core Cryptographic Technique Compromised Putting Blockchain Security at Risk #AdvancedTechnology #BlockchainSecurity #Cryptographic

0 0 0 0

⚡️ It uses CPU's built-in #SHA instructions when available. You can see it coming: up to 3-5x faster (!!) hashing on modern processors!

And the API doesn't change. It's just FREE performance boost. Really!

#Cryptographic operations just got turbocharged! ⚡

1 0 1 0
Preview
Global Encryption at Risk as China Reportedly Advances Decryption Capabilities   It has been announced that researchers at Shanghai University have achieved a breakthrough in quantum computing that could have a profound impact on modern cryptographic systems. They achieved a significant leap in quantum computing. The team used a quantum annealing processor called D-Wave to successfully factor a 22-bit RSA number, a feat that has, until now, been beyond the practical capabilities of this particular class of quantum processor.  There is no real-world value in a 22-bit key, but this milestone marks the beginning of the development of quantum algorithms and the improvement of hardware efficiency, even though it is relatively small and holds no real-world encryption value today. A growing vulnerability has been observed in classical encryption methods such as RSA, which are foundational to digital security across a wide range of financial systems, communication networks and government infrastructures.  It is a great example of the accelerated pace at which the quantum arms race is occurring, and it reinforces the urgency around the creation of quantum-resistant cryptographic standards and the adoption of quantum-resistant protocols globally.  As a result of quantum computing's progress, one of the greatest threats is that it has the potential to break widely used public key cryptographic algorithms, including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, and even symmetric encryption standards, such as Advanced Encryption Standard (AES), very quickly and with ease. Global digital security is built on the backbone of these encryption protocols, safeguarding everything from financial transactions and confidential communications to government and defense data, a safeguard that protects everything from financial transactions to confidential communications. As quantum computers become more advanced, this system might become obsolete if quantum computers become sufficiently advanced by dramatically reducing the time required to decrypt, posing a serious risk to privacy and infrastructure security.  As a result of this threat looming over the world, major global powers have already refocused their strategic priorities. There is a widespread belief that nation-states that are financially and technologically able to develop quantum computing capabilities are actively engaged in a long-term offensive referred to as “harvest now, decrypt later”, which is the purpose of this offensive.  Essentially, this tactic involves gathering enormous amounts of encrypted data today to decrypt that data in the future, when quantum computers reach a level of functionality that can break classical encryption. Even if the data has remained secure for now, its long-term confidentiality could be compromised.  According to this strategy, there is a pressing need for quantum-resistant cryptographic standards to be developed and deployed urgently to provide a future-proof solution to sensitive data against the inevitable rise in quantum decryption capabilities that is inevitable. Despite the fact that 22-bit RSA keys are far from secure by contemporary standards, and they can be easily cracked by classical computer methods, this experiment marks the largest number of quantum annealing calculations to date, a process that is fundamentally different from the gate-based quantum systems that are most commonly discussed.  It is important to note that this experiment is not related to Shor's algorithm, which has been thecentrer of theoretical discussions about breaking RSA encryption and uses gate-based quantum computers based on highly advanced technology. Instead, this experiment utilised quantum annealing, an algorithm that is specifically designed to solve a specific type of mathematical problem, such as factoring and optimisation, using quantum computing.  The difference is very significant: whereas Shor's algorithm remains largely impractical at scale because of hardware limitations at the moment, D-Wave offers a solution to this dilemma by demonstrating how real-world factoring can be achieved on existing quantum hardware. Although it is limited to small key sizes, it does demonstrate the potential for real-world factoring on existing quantum hardware. This development has a lot of importance for the broader cryptographic security community.  For decades, RSA encryption has provided online transactions, confidential communications, software integrity, and authentication systems with the necessary level of security. The RSA encryption is heavily dependent upon the computational difficulty of factorising large semiprime numbers. Classical computers have required a tremendous amount of time and resources to crack such encryption, which has kept the RSA encryption in business for decades to come. In spite of the advances made by Wang and his team, it appears that even alternative quantum methods, beyond the widely discussed gate-based systems, may have tangible results for attacking these cryptographic barriers in the coming years. While it may be the case that quantum annealing is still at its infancy, the trajectory is still clearly in sight: quantum annealing is maturing, and as a result, the urgency for transitioning to post-quantum cryptographic standards becomes increasingly important. A 22-bit RSA key does not have any real cryptographic value in today's digital landscape — where standard RSA keys usually exceed 2048 bits — but the successful factoring of such a key using quantum annealing represents a crucial step forward in quantum computing research. A demonstration, which is being organised by researchers in Shanghai, will not address the immediate practical threats that quantum attacks pose, but rather what it will reveal concerning quantum attack scalability in the future.  A compelling proof-of-concept has been demonstrated here, illustrating that with refined techniques and optimisation, more significant encryption scenarios may soon come under attack. What makes this experiment so compelling is the technical efficiency reached by the research team as a result of their work. A team of researchers demonstrated that the current hardware limitations might actually be more flexible than previously thought by minimising the number of physical qubits required per variable, improving embeddings, and reducing noise through improved embeddings.  By using quantum annealers—specialised quantum devices previously thought to be too limited for such tasks, this opens up the possibility to factor out larger key sizes. Additionally, there have been successful implementations of the quantum annealing approach for use with symmetric cryptography algorithms, including Substitution-Permutation Network (SPN) cyphers such as Present and Rectangle, which have proven to be highly effective.  In the real world, lightweight cyphers are common in embedded systems as well as Internet of Things (IoT) devices, which makes this the first demonstration of a quantum processor that poses a credible threat to both asymmetric as well as symmetric encryption mechanisms simultaneously instead of only one or the other.  There are far-reaching implications to the advancements that have been made as a result of this advancement, and they have not gone unnoticed by the world at large. In response to the accelerated pace of quantum developments, the US National Institute of Standards and Technology (NIST) published the first official post-quantum cryptography (PQC) standards in August of 2024. These standards were formalised under the FIPS 203, 204, and 205 codes.  There is no doubt that this transition is backed by the adoption of the Hamming Quasi-Cyclic scheme by NIST, marking another milestone in the move toward a quantum-safe infrastructure, as it is based on lattice-based cryptography that is believed to be resistant to both current and emerging quantum attacks. This adoption further solidifies the transition into this field. There has also been a strong emphasis on the urgency of the issue from the White House in policy directives issued by the White House.  A number of federal agencies have been instructed to begin phasing out vulnerable public key encryption protocols. The directive highlights the growing consensus that proactive mitigation is essential in light of the threat of "harvest now, decrypt later" strategies, where adversaries collect encrypted data today in anticipation of the possibility that future quantum technologies can be used to decrypt it.  Increasing quantum breakthroughs are making it increasingly important to move to post-quantum cryptographic systems as soon as possible, as this is no longer a theoretical exercise but a necessity for the security of the world at large. While the 22-bit RSA key is very small when compared to the 2048-bit keys commonly used in contemporary cryptographic systems, the recent breakthrough by Shanghai researchers holds a great deal of significance both scientifically and technologically.  Previously, quantum factoring was attempted with annealing-based systems, but had reached a plateau at 19-bit keys. This required a significant number of qubits per variable, which was rather excessive. By fine-tuning the local field and coupling coefficients within their Ising model, the researchers were able to overcome this barrier in their quantum setup.  Through these optimisations, the noise reduction and factoring process was enhanced, and the factoring process was more consistent, which suggests that with further refinement, a higher level of complexity can be reached in the future with the RSA key size, according to independent experts who are aware of the possible implications.  Despite not being involved in this study, Prabhjyot Kaur, an analyst at Everest Group who was not involved, has warned that advances in quantum computing could pose serious security threats to a wide range of industries. She underscored that cybersecurity professionals and policymakers alike are becoming increasingly conscious of the fact that theoretical risks are rapidly becoming operational realities in the field of cybersecurity.  A significant majority of the concern surrounding quantum threats to encryption has traditionally focused on Shor's algorithm - a powerful quantum technique capable of factoring large numbers efficiently, but requiring a quantum computer based on gate-based quantum algorithms to be implemented.  Though theoretically, these universal quantum machines are not without their limitations in hardware, such as the limited number of qubits, the limited coherence times, and the difficult correction of quantum errors. The quantum annealers from D-Wave, on the other hand, are much more mature, commercially accessible and do not have a universal function, but are considerably more mature than the ones from other companies.  With its current generation of Advantage systems, D-Wave has been able to boast over 5,000 qubits and maintain an analogue quantum evolution process that is extremely stable at an ultra-low temperature of 15 millikelvin. There are limitations to quantum annealers, particularly in the form of exponential scaling costs, limiting their ability to crack only small moduli at present, but they also present a unique path to quantum-assisted cryptanalysis that is becoming increasingly viable as time goes by.  By utilising a fundamentally different model of computation, annealers avoid many of the pitfalls associated with gate-based systems, including deep quantum circuits and high error rates, which are common in gate-based systems. In addition to demonstrating the versatility of quantum platforms, this divergence in approach also underscores how important it is for organisations to remain up to date and adaptive as multiple forms of quantum computing continue to evolve at the same time.  The quantum era is steadily approaching, and as a result, organisations, governments, and security professionals must acknowledge the importance of cryptographic resilience as not only a theoretical concern but an urgent operational issue. There is no doubt that recent advances in quantum annealing, although they may be limited in their immediate threat, serve as a clear indication that quantum technology is progressing at a faster ra///-te than many had expected.  The risk of enterprises and institutions not being able to afford to wait for large-scale quantum computers to become fully capable before implementing security transitions is too great to take. Rather than passively watching, companies and institutions must start by establishing a full understanding of the cryptographic assets they are deploying across their infrastructure in order to be able to make informed decisions about their cryptographic assets.  It is also critical to adopt quantum-resistant algorithms, embrace crypto-agility, and participate in standards-based migration efforts if people hope to secure digital ecosystems for the long term. Moreover, continuous education is equally important to ensure that decision-makers remain informed about quantum developments as they develop to make timely and strategic security investments promptly.  The disruptive potential of quantum computing presents undeniable risks, however it also presents a rare opportunity for modernizing foundational digital security practices. As people approach post-quantum cryptography, the digital future should be viewed not as one-time upgrade but as a transformation that integrates foresight, flexibility, and resilience, enabling us to become more resilient, resilient, and flexible. Taking proactive measures today will have a significant impact on whether people remain secure in the future.

Global Encryption at Risk as China Reportedly Advances Decryption Capabilities #AES #Cryptographic #CryptographicallyRelevantQuantumComputer

0 0 0 0
Post image

The Cryptographic Fix for US Elections Is Still Sitting on the Shelf In brief A former voting machine auditor says U.S. election systems still lack basic cryptographic safeguards to detect ballot t...

#Web3 #cryptographic #Elections #Fix #shelf #sitting

Origin | Interest | Match

0 0 0 0
Preview
Alan Turing: Beyond the Turing Test The Legacy of Alan Turing In the cannon of scientific history, few names evoke as much reverence and fascination as Alan Turing. His contributions to mathematics, logic, cryptography, and computer

Alan Turing’s early life provides a fascinating glimpse into the formative years of one of the 20th century’s most brilliant minds

#AlanTuring : Beyond the Turing Test
promisesproject.net/pen-vs-sword...

#bletchleypark #cambridge #cryptographic #encryption #Engineering #EnigmaMachine #lgbtqia

0 1 0 0
Post image

9062 Ransomware Remove 9062 Ransomware: A deep dive into the latest 9062 ransomware threat The po...


#Malware #Ransomware #Adware #removal #Antivirus #software #computer #virus #cryptographic #ransomware #cyber
Origin | Interest | Match

0 1 0 0

If you’re ready to challenge the state of the art of #cryptographic security, we want to hear from you. Feel free to reach out to us at grants@zama.ai.

1 0 0 0