New Lattice Cryptanalytic Technique
Security Boulevard » Cryptography
by Bruce Schneier
3d ago
A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems. A few things to note. One, this paper has not yet been peer reviewed. As this comment points out: “We had already some cases where efficient quantum algorithms for lattice problems were discovered, but they turned out not being correct or only worked for simple special cases.” I expect we’ll learn more about this particular algorithm with time. And, like many of th ..read more
Visit website
Cryptographic design review of Ockam
Security Boulevard » Cryptography
by Trail of Bits
1M ago
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de Pol In October 2023, Ockam hired Trail of Bits to review the design of its product, a set of protocols that aims to enable secure communication (i.e., end-to-end encrypted and mutually authenticated channels) across various heterogeneous networks. A secure system starts at the design […] The post Cryptographic design review of Ockam appeared first on Security Boulevard ..read more
Visit website
Circomspect has been integrated into the Sindri CLI
Security Boulevard » Cryptography
by Trail of Bits
2M ago
By Jim Miller Our tool Circomspect is now integrated into the Sindri command-line interface (CLI)! We designed Circomspect to help developers build Circom circuits more securely, particularly given the limited tooling support available for this novel programming framework. Integrating this tool into a development environment like that provided by Sindri is a significant step toward […] The post Circomspect has been integrated into the Sindri CLI appeared first on Security Boulevard ..read more
Visit website
Breaking the shared key in threshold signature schemes
Security Boulevard » Cryptography
by Lauren Miorcec
2M ago
By Fredrik Dahlgren Today we are disclosing a denial-of-service vulnerability that affects the Pedersen distributed key generation (DKG) phase of a number of threshold signature scheme implementations based on the Frost, DMZ21, GG20, and GG18 protocols. The vulnerability allows a single malicious participant to surreptitiously raise the threshold required to reconstruct the shared key, which […] The post Breaking the shared key in threshold signature schemes appeared first on Security Boulevard ..read more
Visit website
Cloud cryptography demystified: Amazon Web Services
Security Boulevard » Cryptography
by Trail of Bits
2M ago
By Scott Arciszewski This post, part of a series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Amazon Web Services (AWS): when to use them, when not to use them, and important usage considerations. Stay tuned for future posts covering other cloud services. At Trail of Bits, we […] The post Cloud cryptography demystified: Amazon Web Services appeared first on Security Boulevard ..read more
Visit website
Chaos Communication Congress (37C3) recap
Security Boulevard » Cryptography
by Trail of Bits
2M ago
Last month, two of our engineers attended the 37th Chaos Communication Congress (37C3) in Hamburg, joining thousands of hackers who gather each year to exchange the latest research and achievements in technology and security. Unlike other tech conferences, this annual gathering focuses on the interaction of technology and society, covering such topics as politics, entertainment, […] The post Chaos Communication Congress (37C3) recap appeared first on Security Boulevard ..read more
Visit website
Improving Cybersecurity: Different Certifications Explained
Security Boulevard » Cryptography
by Luke Richardson
2M ago
In the ever-evolving landscape of cybersecurity, the choice of cryptographic algorithms and certificates plays a pivotal role in ensuring the confidentiality and integrity of sensitive information.  While traditional methods such as the RSA public-key cryptosystem have been the cornerstone of secure communication and data transmission for decades, Elliptic Curve Cryptography (ECC) is emerging as an […] The post Improving Cybersecurity: Different Certifications Explained appeared first on Blog. The post Improving Cybersecurity: Different Certifications Explained appeared first on Security ..read more
Visit website
We build X.509 chains so you don’t have to
Security Boulevard » Cryptography
by Trail of Bits
3M ago
By William Woodruff For the past eight months, Trail of Bits has worked with the Python Cryptographic Authority to build cryptography-x509-verification, a brand-new, pure-Rust implementation of the X.509 path validation algorithm that TLS and other encryption and authentication protocols are built on. Our implementation is fast, standards-conforming, and memory-safe, giving the Python ecosystem a modern […] The post We build X.509 chains so you don’t have to appeared first on Security Boulevard ..read more
Visit website
Celebrating our 2023 open-source contributions
Security Boulevard » Cryptography
by Trail of Bits
3M ago
At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about our tools… In 2023, our employees submitted over 450 pull requests (PRs) that were merged into non-Trail of Bits repositories. This demonstrates our […] The post Celebrating our 2023 open-source contributions appeared first on Security Boulevard ..read more
Visit website
Improving Shor’s Algorithm
Security Boulevard » Cryptography
by Bruce Schneier
3M ago
We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are actually feasible—could break both the RSA and Diffie-Hellman public-key algorithms. Now, computer scientist Oded Regev has a significant speed-up to Shor’s algorithm, at the cost of more storage. Details are in this article. Here’s the result: The improvement was profound. The number of elementary logical steps in the quantum part of Regev’s algorithm is proportional to ... The post Improving Sho ..read more
Visit website

Follow Security Boulevard » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR