home.social

#kyber — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #kyber, aggregated by home.social.

  1. «Kyber Ransomware — Post-Quanten-Kryptografie:
    Die Ransomware Kyber nutzt als erste ihrer Art Post-Quanten-Verschlüsselung. Doch Experten entlarven die Technik als psychologischen Marketing-Trick.»

    IT-Sicherheit ist einiges mehr als nur gewisse Stichworte und PQC ist auch nur so sicher wie es im ganzen eingesetzt wird. IT-Betrüger setzen immer auf Trends um die Menschen zu verunsichern und abzufangen.

    🔏 it-daily.net/shortnews/kyber-r

    #kyber #mlkem #PQCryptography #pqc #itsec #ransomeware #betrug #it

  2. OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
    :Blobhaj:

  3. OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
    :Blobhaj:

  4. OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
    :Blobhaj:

  5. OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
    :Blobhaj:

  6. TLDR: I’ve implemented #QuantumResistant #Encryption into my #P2P messaging #webapp using #MLKEM (#Kyber) to protect against future #QuantumComputing threats. Read my latest #Blog post to see how I’m securing #DataPrivacy today.

    My journey into #PostQuantum #Security
    I’ve been working hard on my latest project update, focusing on how we can protect our #Privacy from the looming threat of "harvest now, decrypt later" attacks. I just finished writing a technical deep dive into how I’ve implemented #QuantumResistant #Cryptography into my #P2P messaging platform.

    The core of my approach involves using #MLKEM (formerly #Kyber) to ensure long-term #DataSecurity. I’m particularly proud of the #CascadingEncryption layer I’ve built; by combining #NIST standards with the #SignalProtocol, I'm ensuring that your #Communications remain #Secure even if a single algorithm is compromised in the future.

    If you are into #OpenSource, #InfoSec, or #Decentralized #Tech, I’d love for you to read about my implementation and the challenges of bringing #QuantumResistance to the #Browser using #JavaScript.

    Read my write-up here:
    positive-intentions.com/blog/q

    Demo: cryptography.positive-intentio

    Crash course in ML-KEM: positive-intentions.com/blog/m

    I'm excited to hear what the #Developer and #CyberSecurity community thinks about this #PrivacyFirst milestone!

  7. Das aktuelle #PGP4WIN 5.0.1 mit #GnuPG 2.5.17 unterstützt jetzt auch #PostQuantenKryptographie #PQC . Dazu wählt man (Hybridverschlüsselung) in #Kleopatra als Schlüssel #ky1024_bp384 , was eine Kombination aus #Kyber (PQC) und #Brainpool (elliptic) ist.

  8. So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).

    Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.

    Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.

    The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.

    In any case, this is something that might be worthwhile for practical use-cases…
    🤔

    #cryptography #pqc #pqcrypto #steganography #crypto #MLKEM

  9. So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).

    Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.

    Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.

    The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.

    In any case, this is something that might be worthwhile for practical use-cases…
    🤔

    #cryptography #pqc #pqcrypto #steganography #crypto #MLKEM

  10. So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).

    Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.

    Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.

    The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.

    In any case, this is something that might be worthwhile for practical use-cases…
    🤔

    #cryptography #pqc #pqcrypto #steganography #crypto #MLKEM

  11. So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).

    Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.

    Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.

    The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.

    In any case, this is something that might be worthwhile for practical use-cases…
    🤔

    #cryptography #pqc #pqcrypto #steganography #crypto #MLKEM

  12. Постквантовый TLS внедряют уже сейчас

    Квантовый компьютер, который будет решать криптографические задачи (cryptographically-relevant quantum computer или CRQC в терминологии АНБ ), пока далёк от реальности. Но проблема в том, что создатели такого компьютера вряд ли сразу сообщат миру о его существовании, а могут тайно воспользоваться возможностью взлома мировой криптографической системы. Хуже всего, что с появлением CRQC можно будет расшифровать весь зашифрованный трафик, перехваченный и сохранённый в предыдущие годы (то есть сейчас). Записью и сохранением зашифрованного трафика сейчас занимаются хостинг-провайдеры, операторы мобильной связи, интернет-провайдеры и спецслужбы (стратегия harvest now, decrypt later ).

    habr.com/ru/companies/globalsi

    #Kyber #MLKEM #X25519Kyber768 #X25519 #Kyber_768 #TLS #постквантовое_шифрование #асимметричная_криптография #PKI #NIST #IETF #Chrome #RSA2048 #QUIC #TLS_13 #HTTPS

  13. What’s new? 🆕

    🔤 Improved grammar for the Zencode language, adding branching and for-each cycling. 🔬 Stable support for Quantum-proof (#Dilithium, #Kyber and #NTRU). New sigs: EDDSA, ECDSA and BBS+ ZK proofs. W3C scenario now supports DID.dyne.org

  14. New blog post "The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level." On a related note, announces a followup FOIA lawsuit filed today. blog.cr.yp.to/20231003-countco blog-cr-yp-to.viacache.net/202 #nist #addition #multiplication #ntru #kyber #fiasco

  15. amazing, NXP is working on ISA extensions for RISC-V to make the number theoretic transform (NTT) more efficient: eprint.iacr.org/2023/1505

    this makes #dilithium and #kyber more performant by reducing the cycle count by more than 80%.

    #crypto #eprint

  16. TIL: The Cryptographic Suite for Algebraic Lattices, #CRYSTALS(!) for short, includes the key encapsulation method #Kyber and the signature method #Dilithium. 😍

    #cryptography

  17. [DE] Ein bisschen Krikelkrakel für einen Kurzvortrag zu @rosenpass und postquantensicherer Kryptografie. Im Safe sind natürlich die sichersten Verfahren gegen regnerische post-quanten-Tage. :)

    [EN] A handful of chicken scratch for a short talk about #RosenPass and post-quantum secure cryptography. When quantum computers finally rain down on our information systems, there’s different levels of security you can have.

    #cryptography #shors #grovers #kyber #mceliece #chacha20

  18. Van apareciendo los primeros estándares de criptografía post-cuántica del #NIST!

    #kyber para cifrado, #Dilithium, #Falcon y #SPHINCS+ para auth y firma digital.

    La computación cuántica cada vez más lejos de ser una amenaza a la criptografía moderna :-)

    helpnetsecurity.com/2022/07/06