Encryption

36 Articles 0 Followers


Does Signal use End-to-End Encryption (E2EE) Or Transport-Layer Security/Encryption (TLS/E)?

27 Aug 2024 5 minute read 0 comments Great White Snark

Obligatory Disclaimer: I'm not a cryptographer by any means, so I'm not as clued-up on cryptography as I could/should be. My understanding could be mistaken and my explanations erroneous. Please DYOR if anything seems unclear or incorrect. TL;DR: Sig...

Emerging Technologies : Quantum Cryptography and Securing Communications in the Quantum Era

30 Mar 2023 4 minute read 1 comment kev_nag

Securing Communications with the Emergence of Quantum Computing Quantum Cryptography is an emerging technology that uses the principles of quantum mechanics to secure communications. Unlike classical cryptography, which relies on mathematical algor...

Quantum Encryption Replacement Algorithm Hacked by AI

22 Feb 2023 1 minute read 7 comments Matthew Rosenquist

Has the CRYSTALS-Kyber encryption algorithm, one of 4 quantum resistant methods that NIST has recommended to replace legacy encryption, fallen even before it has been rolled out?  There is news that researchers from the KTH Royal Institute of Techno...

DNS Privacy Features you should be using; Now!

25 Jan 2023 2 minute read 1 comment Keith Thuerk

DNS Privacy Features you should be using; Now! DNS is the core network service and overlooking security improvements in the protocol could expose your privacy to unintended parties. Two controversial techniques are currently available to encrypt more...

Chinese Scientists Claim They Found a Way to Break Encryption Using a Quantum Computer

9 Jan 2023 2 minute read 1 comment kev_nag

In a ‘scientific paper’ published by 24 Chinese Research Scientists in late December, 2022, claim was made that they could break the RSA algorithm utilizing a quantum computer with only 372 qubits. The RSA algorithm is the most common format for onli...

If cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl

19 Dec 2022 3 minute read 1 comment Great White Snark

"If cryptography is outlawed, only outlaws will have privacy." Fortunately, all outlaws and terrorists are law-abiding citizens and therefore have no objection to having their mail intercepted, stored and analysed! 😋 If you think that using WhatsA...

In a Nutshell: Post-Quantum Cryptography

7 Dec 2022 1 minute read 0 comments Basher17

Post-quantum cryptography, also known as quantum-resistant cryptography, is a branch of cryptography focused on developing cryptographic algorithms that are secure against quantum computers. This is a particularly important area of research because q...

How Quantum Computers will read your E-Mail (in the future)

5 Dec 2022 1 minute read 0 comments TheJan

A quantum computer is a type of computer that is based on the principles of quantum mechanics. It is a highly advanced and powerful computing system that is capable of processing vast amounts of data in parallel, using the unique properties of quantu...

Creating an Encrypted Local File System in a File

21 Sep 2022 4 minute read 0 comments TheJan

So you'd like to store your secrets in plain sight, and only want to decrypt and use them when you know it's safe? The Scenario Here's a use-case: You have access to a remote machine, which you do not have physical access to. At any point in time, s...

Nothing is Fully Secure

4 Jun 2022 3 minute read 0 comments wabinab

You think encrypted objects can be fully secure? Not really. Normal encryption used to be secure; but when computing power increases, it grows not. Pseudo-random number generator (PRNG) generating those numbers are based on either a "seed" (some valu...