Trending

#cryptography

Latest posts tagged with #cryptography on Bluesky

Latest Top
Trending

Posts tagged #cryptography

Preview
Cryptography: from paper to silicon - Negative PID For most of its history, cryptography moved at the speed of ink, paper, and human calculation. Even mechanical devices such as rotor machines relied on

Cryptography: from paper to silicon

negativepid.blog/cry...

#cryptography #tech #IT #science #STEM #computing #AI #quantumComputing #inventions #innovation #Cybersecurity #onlineSecurity #negativepid

0 0 0 0
The Crazy Idea That Made the Internet Secure
The Crazy Idea That Made the Internet Secure YouTube video by Dev Random TV

Here’s a fun and accessible framing of the history of why you can buy things and chat securely on the internet. It continues to be a question of whether it is a right or privilege. That conversation is not over. This is a good place to join it:

#technology #cryptography

youtu.be/4paC5Obh9oI

0 0 0 0
Preview
Diffie, Hellman, and PKC - Negative PID Before the 1970s, secure communication depended on shared secret keys. Two parties had to agree on a key in advance, and anyone intercepting the key could

Diffie, Hellman, and PKC

negativepid.blog/dif...

#DiffieHellman #cryptography #PKC #publicKeyCryptography #Internet #tech #IT #science #STEM #computing #AI #quantumComputing #inventions #innovation #Cybersecurity #onlineSecurity #negativepid

1 0 0 0
Preview
Intel Demos Chip to Compute With Encrypted Data ## Summary * Fully homomorphic encryption (FHE) allows computing on encrypted data without decryption, but it’s currently slow on standard CPUs and GPUs. * Intel’s Heracles chip accelerates FHE tasks up to 5,000 times faster than top Intel server CPUs. * Heracles uses a 3-nanometer FinFET technology and high-bandwidth memory, enabling efficient encrypted computing at scale. * Startups and Intel are racing to commercialize FHE accelerators, with potential applications in AI and secure data processing. Worried that your latest ask to a cloud-based AI reveals a bit too much about you? Want to know your genetic risk of disease without revealing it to the services that compute the answer? There is a way to do computing on encrypted data without ever having it decrypted. It’s called fully homomorphic encryption, or FHE. But there’s a rather large catch. It can take thousands—even tens of thousands—of times longer to compute on today’s CPUs and GPUs than simply working with the decrypted data. So universities, startups, and at least one processor giant have been working on specialized chips that could close that gap. Last month at the IEEE International Solid-State Circuits Conference (ISSCC) in San Francisco, Intel demonstrated its answer, Heracles, which sped up FHE computing tasks as much as 5,000-fold compared to a top-of the-line Intel server CPU. Startups are racing to beat Intel and each other to commercialization. But Sanu Mathew, who leads security circuits research at Intel, believes the CPU giant has a big lead, because its chip can do more computing than any other FHE accelerator yet built. “Heracles is the first hardware that works at scale,” he says. The scale is measurable both physically and in compute performance. While other FHE research chips have been in the range of 10 square millimeters or less, Heracles is about 20 times that size and is built using Intel’s most advanced, 3-nanometer FinFET technology. And it’s flanked inside a liquid-cooled package by two 24-gigabyte high-bandwidth memory chips—a configuration usually seen only in GPUs for training AI. RELATED: How to Compute with Data You Can’t See In terms of scaling compute performance, Heracles showed muscle in live demonstrations at ISSCC. At its heart the demo was a simple private query to a secure server. It simulated a request by a voter to make sure that her ballot had been registered correctly. The state, in this case, has an encrypted database of voters and their votes. To maintain her privacy, the voter would not want to have her ballot information decrypted at any point; so using FHE, she encrypts her ID and vote and sends it to the government database. There, without decrypting it, the system determines if it is a match and returns an encrypted answer, which she then decrypts on her side. On an Intel Xeon server CPU, the process took 15 milliseconds. Heracles did it in 14 microseconds. While that difference isn’t something a single human would notice, verifying 100 million voter ballots adds up to more than 17 days of CPU work versus a mere 23 minutes on Heracles. Looking back on the five-year journey to bring the Heracles chip to life, Ro Cammarota, who led the project at Intel until last December and is now at University of California Irvine, says “we have proven and delivered everything that we promised.” ## FHE Data Expansion FHE is fundamentally a mathematical transformation, sort of like the Fourier transform. It encrypts data using a quantum-computer-proof algorithm, but, crucially, uses corollaries to the mathematical operations usually used on unencrypted data. These corollaries achieve the same ends on the encrypted data.**** One of the main things holding such secure computing back is the explosion in the size of the data once it’s encrypted for FHE,Anupam Golder, a research scientist at Intel’s circuits research lab, told engineers at ISSCC. “Usually, the size of cipher text is the same as the size of plain text, but for FHE it’s orders of magnitude larger,” he said. While the sheer volume is a big problem, the kinds of computing you need to do with that data is also an issue. FHE is all about very large numbers that must be computed with precision. While a CPU can do that, it’s very slow going—integer addition and multiplication take about 10,000 more clock cycles in FHE. Worse still, CPUs aren’t built to do such computing in parallel. Although GPUs excel at parallel operations, precision is not their strong suit. (In fact, from generation to generation, GPU designers have devoted more and more of the chip’s resources to computing less and less-precise numbers.) FHE also requires some oddball operations with names like “twiddling” and “automorphism,” and it relies on a compute-intensive noise-cancelling process called bootstrapping. None of these things are efficient on a general-purpose processor. So, while clever algorithms and libraries of software cheats have been developed over the years, the need for a hardware accelerator remains if FHE is going to tackle large-scale problems, says Cammarota. ## The Labors of Heracles Heracles was initiated under a DARPA program five years ago to accelerate FHE using purpose-built hardware. It was developed as “a whole system-level effort that went all the way from theory and algorithms down to the circuit design,” says Cammarota. Among the first problems was how to compute with numbers that were larger than even the 64-bit words that are today a CPU’s most precise. There are ways to break up these gigantic numbers into chunks of bits that can be calculated independently of each other, providing a degree of parallelism. Early on, the Intel team made a big bet that they would be able to make this work in smaller, 32-bit chunks, yet still maintain the needed precision. This decision gave the Heracles architecture some speed and parallelism, because the 32-bit arithmetic circuits are considerably smaller than 64-bit ones, explains Cammarota. At Heracles’ heart are 64 compute cores—called tile-pairs—arranged in an eight-by-eight grid. These are what are called single instruction multiple data (SIMD) compute engines designed to do the polynomial math, twiddling, and other things that make up computing in FHE and to do them in parallel. An on-chip 2D mesh network connects the tiles to each other with wide, 512 byte, buses. RELATED: Tech Keeps Chatbots From Leaking Your Data Important to making encrypted computing efficient is feeding those huge numbers to the compute cores quickly. The sheer amount of data involved meant linking 48-GB-worth of expensive high-bandwidth memory to the processor with 819 GB per second connections. Once on the chip, data musters in 64 megabytes of cache memory—somewhat more than an Nvidia Hopper-generation GPU. From there it can flow through the array at 9.6 terabytes per second by hopping from tile-pair to tile-pair. To ensure that computing and moving data don’t get in each other’s way, Heracles runs three synchronized streams of instructions simultaneously, one for moving data onto and off of the processor, one for moving data within it, and a third for doing the math, Golder explained. It all adds up to some massive speed ups, according to Intel. Heracles—operating at 1.2 gigahertz—takes just 39 microseconds to do FHE’s critical math transformation, a 2,355-fold improvement over an Intel Xeon CPU running at 3.5 GHz. Across seven key operations, Heracles was 1,074 to 5,547 times as fast. The differing ranges have to do with how much data movement is involved in the operations, explains Mathew. “It’s all about balancing the movement of data with the crunching of numbers,” he says. ## FHE Competition “It’s very good work,” Kurt Rohloff, chief technology officer at FHE software firm Duality Technology, says of the Heracles results. Duality was part of a team that developed a competing accelerator design under the same DARPA program that Intel conceived Heracles under. “When Intel starts talking about scale, that usually carries quite a bit of weight.” Duality’s focus is less on new hardware than on software products that do the kind of encrypted queries that Intel demonstrated at ISSCC. At the scale in use today “there’s less of a need for [specialized] hardware,” says Rohloff. “Where you start to need hardware is emerging applications around deeper machine-learning oriented operations like neural net, LLMs, or semantic search.” Last year, Duality demonstrated an FHE-encrypted language model called BERT. Like more famous LLMs such as ChatGPT, BERT is a transformer model. However it’s only one tenth the size of even the most compact LLMs. John Barrus, vice president of product at Dayton, Ohio-based Niobium Microsystems, an FHE chip startup spun out of another DARPA competitor, agrees that encrypted AI is a key target of FHE chips. “There are a lot of smaller models that, even with FHE’s data expansion, will run just fine on accelerated hardware,” he says. With no stated commercial plans from Intel, Niobium expects its chip to be “the world’s first commercially viable FHE accelerator, designed to enable encrypted computations at speeds practical for real-world cloud and AI infrastructure.” Although it hasn’t announced when a commercial chip will be available, last month the startup revealed that it had inked a deal worth 10 billion South Korean won (US $6.9 million) with Seoul-based chip design firm Semifive to develop the FHE accelerator for fabrication using Samsung Foundry’s 8-nanometer process technology. Other startups including Fabric Cryptography, Cornami, and Optalysys have been working on chips to accelerate FHE. Optalysys CEO Nick New says Heracles hits about the level of speedup you could hope for using an all-digital system. “We’re looking at pushing way past that digital limit,” he says. His company’s approach is to use the physics of a photonic chip to do FHE’s compute-intensive transform steps. That photonics chip is on its seventh generation, he says, and among the next steps is to 3D integrate it with custom silicon to do the non-transform steps and coordinate the whole process. A full 3D-stacked commercial chip could be ready in two or three years, says New. While competitors develop their chips, so will Intel, says Mathew. It will be improving on how much the chip can accelerate computations by fine tuning the software. It will also be trying out more massive FHE problems, and exploring hardware improvements for a potential next generation. “This is like the first microprocessor… the start of a whole journey,” says Mathew.

#Intel Demos Chip to Compute With Encrypted Data

https://spectrum.ieee.org/fhe-intel

#Heracles #HomomorphicEncryption #cybersecurity #cryptography

1 0 0 0
Preview
An interactive intro to Elliptic Curve Cryptography (ECC) A hands-on introduction to elliptic curve cryptography. Start with curve geometry, build point addition and scalar multiplication, see why ECDLP is hard, and then use that math in ECDH, ECDSA, and ECI...

Any thoughts about this? #cryptography

growingswe.com/blog/ellipti...

0 0 0 0
What is Quantum Cryptography? An Introduction
What is Quantum Cryptography? An Introduction YouTube video by Eye on Tech

What is #Quantum #Cryptography? An Introduction. #BB84 (#E91 #entanglement) #science #tech #computing ( #secure #communication) #comms
www.youtube.com/watch?v=_5NQ...

1 0 0 0
system diagram of software and hardware

system diagram of software and hardware

@nlnetlabs.bsky.social NLnet Foundation funded open source WireGuard router in FPGA. Featuring PipelineC for cryptography blocks 🤓

github.com/JulianKemmer...

#hardware #fpga #rtl #hdl #hls #verilog #vhdl #cryptography #wireguard #pipelinec

4 2 2 0
Original post on infosec.exchange

This is big but not unexpected: Meta built a multi-channel influence operation to pass age verification laws.

github.com/upper-up/meta-lobbying-a...

The original Reddit posts were removed, but they are archived […]

0 4 0 0
Post image

🎤 PQ-REACT conversations with our experts: Your decryption key to the future of #cryptography!
🎬 In our 5th episode, we explore the differences between High-Performance & Quantum Computing, the “Eclipse Qrisp” programming language & more.
🎧 www.podbean.com/ew/pb-nmpzs-...
▶️ youtu.be/D69cxheBQ-w?...

0 1 0 0
Preview
Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed Meta yesterday detailed the cryptography and confidential computing architecture behind Advanced Browsing Protection in Messenger, a tool that scans malicious links inside end-to-end encrypted chats without exposing user URLs to its own servers.

FYI: Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed #Meta #Messenger #Cryptography #Privacy #CyberSecurity

1 0 0 0
Preview
Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed Meta yesterday detailed the cryptography and confidential computing architecture behind Advanced Browsing Protection in Messenger, a tool that scans malicious links inside end-to-end encrypted chats without exposing user URLs to its own servers.

FYI: Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed #Meta #Messenger #Cryptography #Privacy #CyberSecurity

1 0 0 0
President Trump's Cybersecurity Strategy for America
President Trump's Cybersecurity Strategy for America YouTube video by PiKture Time Films and Photography, Indiana, USA

#CyberStrategy USA
Just released, a new 'offensive' and privatization of National Security Defence, #ZeroTrust model implementation and #PostQuantum #Cryptography are key features mentioned also. This comes after last years #Cyber defeats in cellular and DOGEd #CSIA & #NCET.
youtu.be/vk51609o2pc?...

0 0 3 0

#SIGINT #COMINT #Krypto500 #Krypto1000 #EUDefence #informatiedominatie
#IndoPacific #drones #uavdrone #armada #ejercito #miltares #militar
#dron #PNT #IndustriadeDefesa @BreakingDefense @defensenews.bsky.social
@aaronia.bsky.social #cryptography #cryptology

0 0 0 0
Preview
W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it W3C's Decentralized Identifiers v1.1 enters Candidate Recommendation on March 5, 2026, inviting implementations of a cryptographic identity standard that could reshape how digital identity works online.

ICYMI: W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it #W3C #DecentralizedIdentifiers #DigitalIdentity #Blockchain #Cryptography

0 0 0 0
Preview
W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it W3C's Decentralized Identifiers v1.1 enters Candidate Recommendation on March 5, 2026, inviting implementations of a cryptographic identity standard that could reshape how digital identity works online.

ICYMI: W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it #W3C #DecentralizedIdentifiers #DigitalIdentity #Blockchain #Cryptography

0 0 0 0
Preview
Secure Communication, Buried In A News App Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody else, and as long as they’re the only one that knows a secret little…

My love for @theguardian.com has been steadily growing over the past year, and this just accelerated it into overdrive: hackaday.com/2026/03/09/s...

#journalism #privacy #cryptography

0 0 0 0
Post image

Opps!
#mathematics #math #cryptography
Source:https://x.com/fermatslibrary/status/2030182265775354014

0 0 0 0
Preview
Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed Meta yesterday detailed the cryptography and confidential computing architecture behind Advanced Browsing Protection in Messenger, a tool that scans malicious links inside end-to-end encrypted chats without exposing user URLs to its own servers.

ICYMI: Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed #Meta #Messenger #Cryptography #CyberSecurity #PrivacyProtection

0 0 0 0
Preview
Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed Meta yesterday detailed the cryptography and confidential computing architecture behind Advanced Browsing Protection in Messenger, a tool that scans malicious links inside end-to-end encrypted chats without exposing user URLs to its own servers.

ICYMI: Meta's Messenger gets a cryptographic shield nobody asked about - but everyone needed #Meta #Messenger #Cryptography #CyberSecurity #PrivacyProtection

0 0 0 0
Preview
W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it W3C's Decentralized Identifiers v1.1 enters Candidate Recommendation on March 5, 2026, inviting implementations of a cryptographic identity standard that could reshape how digital identity works online.

W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it #W3C #DecentralizedIdentifiers #DigitalIdentity #Cryptography #Privacy

0 0 0 0
Preview
W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it W3C's Decentralized Identifiers v1.1 enters Candidate Recommendation on March 5, 2026, inviting implementations of a cryptographic identity standard that could reshape how digital identity works online.

W3C pushes DIDs v1.1 to implementations - and your ad stack may feel it #W3C #DecentralizedIdentifiers #DigitalIdentity #Cryptography #Privacy

0 0 0 0
Preview
RSAC Set to Honor Excellence in the Field of Mathematics Awards, Inaugural Test of Time Awards at RSAC 2026 Conference

🎉 Proud moment for COSIC! Prof. Nigel Smart has received the #RSAC 2026 Award for Excellence in the Field of Mathematics for his groundbreaking work in #MPC, Threshold #Cryptography & foundational crypto research. Congratulations, Nigel! 👏
www.rsaconference.com/library/pres...

2 2 0 0
Preview
Diffie, Hellman, and PKC - Negative PID Before the 1970s, secure communication depended on shared secret keys. Two parties had to agree on a key in advance, and anyone intercepting the key could

Diffie, Hellman, and PKC
negativepid.blog/dif...

#DiffieHellman #cryptography #PKC #Cybersecurity #onlineSecurity #Internet #tech #IT #science #STEM #computing #inventions #innovation #negativepid

0 0 0 0
Tecno Guia Pro

🛡️ Quantum Cryptography: The Unpredictable Security Era.
Analyzing the global megatreaty and how quantum-resistant algorithms are redefining data protection in 2026.
Full technical audit on the blog:
🌐 tecnoguiapro.blogspot.com
#TechGuidePro #QuantumComputing #CyberSecurity #Cryptography #Tech2026

1 0 0 0

#Security #Cryptography #EmbeddedSystems

0 0 0 0
Preview
Mastercard and Google's new trust layer could reshape how AI buys for you Mastercard and Google yesterday introduced Verifiable Intent, a cryptographic trust standard for AI agent payments, backed by IBM, Adyen, Fiserv, and six other partners.

FYI: Mastercard and Google's new trust layer could reshape how AI buys for you #Mastercard #Google #AI #Cryptography #Fintech

0 0 0 0
Preview
Mastercard and Google's new trust layer could reshape how AI buys for you Mastercard and Google yesterday introduced Verifiable Intent, a cryptographic trust standard for AI agent payments, backed by IBM, Adyen, Fiserv, and six other partners.

FYI: Mastercard and Google's new trust layer could reshape how AI buys for you #Mastercard #Google #AI #Cryptography #Fintech

0 0 0 0
Original post on infosec.exchange

Second #cryptography question: How widely accepted or controversial is the advice to use XSalsa20-Poly1305 in Latacora's "right answers" series? It's been a while since I've done serious cryptographic work, and the "Use AES" advice was pretty burned into my brain […]

0 0 0 0
RedHat Talks Vol. 11: PostQuantum
RedHat Talks Vol. 11: PostQuantum YouTube video by Exclusive Networks Slovakia

S Matějem Týčem jsme na Red Hat Talks hovořili o důvodech pro přechod k PQC (post kvantové kryptografii) přesto, že kantový počítač ohrožující klasickou kryptografii není zatím dostupný.

youtu.be/-idNdbI2PzM?...

#PQC #QuantumComputing #Cryptography #RedHat #PostQuantumCryptography #RHEL

0 0 0 0
Preview
RSAC 2026 Conference to Celebrate Pioneering Minds in Mathematics and Cryptography Awards The RSAC 2026 Conference will honor distinguished leaders in mathematics and cryptography, showcasing their contributions and groundbreaking research in cybersecurity.

RSAC 2026 Conference to Celebrate Pioneering Minds in Mathematics and Cryptography Awards #United_States #San_Francisco #RSAC_Conference #Mathematics #Cryptography

1 1 0 0