#cryptography

[ follow ]
Typography
fromOpen Culture
4 days ago

Discover the Copiale Cipher: The Mysterious 18th-Century Book That Took 260 Years to Decode

The Copiale cipher, a 260-year-old manuscript, was deciphered by researchers using machine-readable code and linguistic analysis.
#quantum-computing
Information security
fromTheregister
3 weeks ago

Cryptographers place $5,000 bet whether quantum will matter

Quantum computing poses a potential threat to cryptography, prompting the development of Post-Quantum Cryptography to address future vulnerabilities.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

IBM Quantum Hardware Cracks 15-Bit ECC Key, but Bitcoin Devs Say Random Bits Match the Result

Giancarlo Lelli received 1 BTC for cracking a 15-bit ECC key on IBM quantum hardware, but developers dismissed it as noise with no quantum advantage.
Information security
fromArs Technica
1 week ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

No Consensus Changes Needed: Starkware CPO Builds Quantum-Safe Bitcoin Transactions From Existing Rules

Quantum Safe Bitcoin (QSB) enables secure bitcoin transactions against quantum attacks without protocol changes, costing $75 to $150 per transaction.
Information security
fromTheregister
3 weeks ago

Cryptographers place $5,000 bet whether quantum will matter

Quantum computing poses a potential threat to cryptography, prompting the development of Post-Quantum Cryptography to address future vulnerabilities.
#blockchain
fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bitcoin's Quantum Problem Is Really A Governance Crisis In Disguise: UTXO

Bitcoin faces a quantum computing threat that requires urgent political consensus for effective protocol changes to ensure security.
Cryptocurrency
fromBitcoin Magazine
1 week ago

The U.S. Military Is Running A Bitcoin Node, Admiral Says

The U.S. military operates a Bitcoin node for network security tests, viewing Bitcoin as a computer science tool rather than a financial asset.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
#ai
fromHackernoon
2 years ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Information security
fromnews.bitcoin.com
1 week ago

From Scripts to Swarms: Why AI Is Breaking Traditional Sybil Defenses

AI agents will centralize identity management, enhancing security against Sybil attacks through advanced automation and dynamic behavior.
fromHackernoon
2 years ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Cryptocurrency
fromnews.bitcoin.com
1 week ago

XRP Prepares for Quantum Future as Ripple Maps XRPL Strategy for Security Readiness

Ripple is implementing a multi-phase plan to secure the XRP Ledger against quantum threats by 2028.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Scarcity Pump or Monetary Suicide? The Radical Argument Against BIP-361

BIP-361 aims to protect bitcoin from quantum threats, but critics warn it could harm bitcoin's value and social contract.
History
fromwww.scientificamerican.com
2 weeks ago

How two mathematicians created an equation that quietly runs the planet

British sailors risked their lives to retrieve Enigma codes from a sinking submarine, aiding in the deciphering of Nazi communications and shortening WWII.
#satoshi-nakamoto
fromTechCrunch
3 weeks ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

fromTechCrunch
3 weeks ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

Node JS
fromYcombinator
3 weeks ago

Show HN: I rewrote my 2012 self-signed cert generator in Go - cert-depot.com | Hacker News

A new certificate generation tool was built in Go, eliminating external dependencies and improving security features.
Information security
fromnews.bitcoin.com
4 weeks ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
Information security
fromTheregister
1 month ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromCointelegraph
1 month ago

Bitcoin's Quantum Defense Plan: What BIP-360 Actually Changes

BIP-360 formally adds quantum resistance to Bitcoin's roadmap through Pay-to-Merkle-Root, reducing elliptic curve exposure by eliminating Taproot key path spending while preserving smart contract flexibility.
Science
fromPadailypost
2 months ago

Arthur H. Hausman

Arthur Herbert Hausman (1923–2026) was a cryptologist, engineer, and executive whose innovations in cryptography, electronics, and broadcasting advanced national security and global media.
Information security
fromTheregister
2 months ago

How the GNU C Compiler became the Clippy of cryptography

Modern compilers optimize away security protections, causing constant-time and other defensive code to fail and reintroducing side-channel vulnerabilities.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
fromwww.bbc.com
5 months ago

Cryptology firm cancels elections after losing encryption key

The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results. In a statement, the scientific organisation said one of the trustees had lost their key in "an honest but unfortunate human mistake", making it impossible for them to decrypt - and uncover - the final results.
Information security
Information security
fromArs Technica
5 months ago

Cryptography group cancels election results after official loses secret key

A lost trustee private key prevented decryption of IACR’s Helios-election ballots, causing results cancellation and prompting a re-run with revised key-sharing rules.
#kryptos
fromWIRED
5 months ago

Inside the Multimillion-Dollar Plan to Make Mobile Voting Happen

Joe Kiniry, a security expert specializing in elections, was attending an annual conference on voting technology in Washington, DC, when a woman approached him with an unusual offer. She said she represented a wealthy client interested in funding voting systems that would encourage bigger turnouts. Did he have any ideas? "I told her you should stay away from internet voting, because it's really, really hard," he says.
US politics
fromInfoWorld
5 months ago

Microsoft's .NET 10 arrives with AI, runtime, and language improvements

For cryptography, .NET 10 introduces extensive new APIs across cryptography, globalization, numerics, serialization, collections, and diagnostics. Also, with quantum computing on the horizon, .NET 10 expands post-quantum cryptography support with Windows Cryptography API: Next Generation (CNG) support, enhanced ML-DSA with simplified APIs, and HashML-DSA support, plus Composite ML-DSA for hybrid approaches. Additional cryptography enhancements include AES KeyWrap with Padding support for secure key wrapping scenarios.
Information security
#privacy
fromenglish.elpais.com
7 months ago

The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity

It may sound anachronistic to use terms like espionage, counterintelligence, secret services, or double agents in relation to ancient times. But activities, organizations, and personnel that largely fit our current concepts were widely deployed by the civilizations of the ancient world, giving truth to the saying that there is nothing new under the Sun (or, in this case, the shadows). To provide a few examples: Ramses II was nearly defeated at the Battle of Kadesh (which ended in a stalemate)
History
fromGSMArena.com
8 months ago

UK drops its request for encrypted iCloud data backdoor

Over six months after these events, U.S. Director of National Intelligence Tulsi Gabbard confirmed that the UK has withdrawn its requests following months of talks between the two governments.
Privacy technologies
fromHackernoon
2 years ago

Cryptography's Developer Dilemma: An Urgent Call for API Research | HackerNoon

We clustered 91,954 cryptography-related questions on Stack Overflow and manually analyzed 383 to comprehend the crypto challenges developers face. Developers showed a lack of knowledge of fundamental concepts.
Cryptocurrency
fromTheregister
9 months ago

The EFF turns 35, but there's plenty more to do

The organization has since been prominent in some of the most important legal battles for privacy, online operations, and legislative correction.
Privacy professionals
Cryptocurrency
fromInfoWorld
10 months ago

Bringing post-quantum cryptography to Windows

Post-quantum cryptography addresses vulnerabilities of conventional and quantum computing, focusing on securing valuable information.
Privacy technologies
fromHackernoon
11 months ago

Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon

The proposed backup methods provide enhanced security and reliability for private key recovery.
Trustees have only permission, while the owner retains possession, improving overall security.
Cryptocurrency
fromTechzine Global
11 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
fromInfoQ
11 months ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

JEP 510 proposes the finalization of the Key Derivation Function API after one round of preview, enhancing cryptographic capabilities in Java.
Java
Scala
fromHackernoon
1 year ago

Go 1.22: Bringing Math/rand and Crypto/rand together | HackerNoon

Go 1.22 enhances random number generation by integrating cryptographic sources into the math/rand package, improving randomness and mitigating misuse risks.
fromComputerWeekly.com
11 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

The transformation needed for organisations in the UK to be ready for the threat of post-quantum computing will make preparations for the millennium bug look easy, cyber chiefs said today.
Information security
Privacy professionals
fromNextgov.com
11 months ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
Information security
fromTechiediaries
11 months ago

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
fromInfoWorld
1 year ago

Oracle releases FIPS-validated crypto module for Java

Oracle's Jipher introduces a FIPS-140 validated OpenSSL module for Java developers, enhancing security within the standard Java Cryptography Architecture framework.
Java
Java
fromOracle
1 year ago

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
London startup
fromHackernoon
2 years ago

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
OMG science
fromwww.scientificamerican.com
1 year ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
NYC startup
fromSilicon Canals
1 year ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Invest-NL has acquired a stake in Fox Crypto to enhance the Netherlands' cryptographic capabilities at the request of various Dutch ministries.
[ Load more ]