Tag: cryptographic

  • Schneier on Security: Implementing Cryptography in AI Systems

    Source URL: https://www.schneier.com/blog/archives/2025/02/implementing-cryptography-in-ai-systems.html Source: Schneier on Security Title: Implementing Cryptography in AI Systems Feedly Summary: Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired cryptographic functionality (e.g, to decrypt an encrypted input,…

  • Cloud Blog: Announcing quantum-safe digital signatures in Cloud KMS

    Source URL: https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms/ Source: Cloud Blog Title: Announcing quantum-safe digital signatures in Cloud KMS Feedly Summary: The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential…

  • NCSC Feed: MIKEY-SAKKE frequently asked questions

    Source URL: https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions Source: NCSC Feed Title: MIKEY-SAKKE frequently asked questions Feedly Summary: A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption. AI Summary and Description: Yes Summary: The text discusses the deployment of a Key Management System (KMS) within a Hardware Security Module (HSM) for enhanced…

  • Hacker News: Reviewing the Cryptography Used by Signal

    Source URL: https://soatok.blog/2025/02/18/reviewing-the-cryptography-used-by-signal/ Source: Hacker News Title: Reviewing the Cryptography Used by Signal Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the importance of secure messaging apps, particularly focusing on Signal and its cryptography. It critiques the use of alternative privacy tools like VPNs and highlights the need for credible security…

  • Hacker News: Setting up a trusted, self-signed SSL/TLS certificate authority in Linux

    Source URL: https://previnder.com/tls-ca-linux/ Source: Hacker News Title: Setting up a trusted, self-signed SSL/TLS certificate authority in Linux Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a detailed technical guide on generating self-signed TLS certificates using OpenSSL and creating a custom Certificate Authority (CA) for local use, particularly for testing purposes. It…

  • Hacker News: Tea Extensions [pdf] (2006)

    Source URL: https://tayloredge.com/reference/Mathematics/TEA-XTEA.pdf Source: Hacker News Title: Tea Extensions [pdf] (2006) Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text discusses the Tiny Encryption Algorithm (TEA), describing its characteristics, efficiency, and practical implementations in various programming languages. As a lightweight and open-source encryption technique, TEA is notable for its simplicity and speed,…

  • Hacker News: Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions

    Source URL: https://cacm.acm.org/practice/questioning-the-criteria-for-evaluating-non-cryptographic-hash-functions/ Source: Hacker News Title: Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth examination of both cryptographic and non-cryptographic hash functions, highlighting their importance in computing practices, security requirements, and performance in various applications. It reveals critical insights into…

  • Anchore: Trust in the Supply Chain: CycloneDX Attestations & SBOMs

    Source URL: https://anchore.com/events/trust-in-the-supply-chain-cyclonedx-attestations-sboms/ Source: Anchore Title: Trust in the Supply Chain: CycloneDX Attestations & SBOMs Feedly Summary: The post Trust in the Supply Chain: CycloneDX Attestations & SBOMs appeared first on Anchore. AI Summary and Description: Yes Summary: This text relates to software security, specifically focusing on Software Bill of Materials (SBOM) and CycloneDX’s innovations.…

  • Rekt: zkLend – Rekt

    Source URL: https://www.rekt.news/ Source: Rekt Title: zkLend – Rekt Feedly Summary: A rounding error exploit bled $9.57M from zkLend vaults on Starknet. After Railgun showed them the door, the attacker ignored their Valentine’s Day bounty deadline, letting the stolen funds sit idle. Same operator behind EraLend’s 2023 hack? On-chain evidence suggests yes. AI Summary and…

  • Hacker News: Why cryptography is not based on NP-complete problems

    Source URL: https://blintzbase.com/posts/cryptography-is-not-based-on-np-hard-problems/ Source: Hacker News Title: Why cryptography is not based on NP-complete problems Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text explores the intrinsic reasons why cryptography does not rely on NP-complete problems, highlighting the critical distinction between ‘worst-case’ and ‘average-case’ hardness in cryptographic contexts. This is significant for professionals…