#kyber — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #kyber, aggregated by home.social.
-
Uusimpana Ylen Vakoojat-sarjassa kybersodankäyntiä, https://areena.yle.fi/1-77447371
-
«Kyber Ransomware — Post-Quanten-Kryptografie:
Die Ransomware Kyber nutzt als erste ihrer Art Post-Quanten-Verschlüsselung. Doch Experten entlarven die Technik als psychologischen Marketing-Trick.»IT-Sicherheit ist einiges mehr als nur gewisse Stichworte und PQC ist auch nur so sicher wie es im ganzen eingesetzt wird. IT-Betrüger setzen immer auf Trends um die Menschen zu verunsichern und abzufangen.
🔏 https://www.it-daily.net/shortnews/kyber-ransomware
#kyber #mlkem #PQCryptography #pqc #itsec #ransomeware #betrug #it
-
OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
:Blobhaj: -
OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
:Blobhaj: -
OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
:Blobhaj: -
OK, si j'y arrive, je vais retenter de streamer du #StarWars #Battlefront2 avec le mod #Kyber J'ai tenté pendant 30 minutes avant de m'apercevoir que l'écran résultant était noir... Bien vu... Ou pas ;)
:Blobhaj: -
#Kyber #ransomware gang toys with post-quantum #encryption on #Windows
-
TLDR: I’ve implemented #QuantumResistant #Encryption into my #P2P messaging #webapp using #MLKEM (#Kyber) to protect against future #QuantumComputing threats. Read my latest #Blog post to see how I’m securing #DataPrivacy today.
My journey into #PostQuantum #Security
I’ve been working hard on my latest project update, focusing on how we can protect our #Privacy from the looming threat of "harvest now, decrypt later" attacks. I just finished writing a technical deep dive into how I’ve implemented #QuantumResistant #Cryptography into my #P2P messaging platform.The core of my approach involves using #MLKEM (formerly #Kyber) to ensure long-term #DataSecurity. I’m particularly proud of the #CascadingEncryption layer I’ve built; by combining #NIST standards with the #SignalProtocol, I'm ensuring that your #Communications remain #Secure even if a single algorithm is compromised in the future.
If you are into #OpenSource, #InfoSec, or #Decentralized #Tech, I’d love for you to read about my implementation and the challenges of bringing #QuantumResistance to the #Browser using #JavaScript.
Read my write-up here:
https://positive-intentions.com/blog/quantum-resistant-encryptionCrash course in ML-KEM: https://positive-intentions.com/blog/ml-kem-beginner-tutorial
I'm excited to hear what the #Developer and #CyberSecurity community thinks about this #PrivacyFirst milestone!
-
Das aktuelle #PGP4WIN 5.0.1 mit #GnuPG 2.5.17 unterstützt jetzt auch #PostQuantenKryptographie #PQC . Dazu wählt man (Hybridverschlüsselung) in #Kleopatra als Schlüssel #ky1024_bp384 , was eine Kombination aus #Kyber (PQC) und #Brainpool (elliptic) ist.
-
Just in case you didn’t know this legend from @videolan here’s his resume 🤘🏽
-
Le nouveau projet révolutionnaire de Jean-Baptiste Kempf
https://www.youtube.com/watch?v=0Vtg245ZDbU
#Kyber #Vidéo #Streaming #CloudGaming #JeuVidéo #Robotique #Latence
-
So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).
Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.
Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.
The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.
In any case, this is something that might be worthwhile for practical use-cases… 🤔
#cryptography #pqc #pqcrypto #steganography #crypto #MLKEM -
So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).
Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.
Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.
The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.
In any case, this is something that might be worthwhile for practical use-cases… 🤔
#cryptography #pqc #pqcrypto #steganography #crypto #MLKEM -
So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).
Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.
Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.
The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.
In any case, this is something that might be worthwhile for practical use-cases… 🤔
#cryptography #pqc #pqcrypto #steganography #crypto #MLKEM -
So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. #Kyber).
Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.
Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.
The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.
In any case, this is something that might be worthwhile for practical use-cases… 🤔
#cryptography #pqc #pqcrypto #steganography #crypto #MLKEM -
I made a beat. Check it out if you are so inclined. Quite mellow thing this time around. https://youtu.be/YgROEHBaN50 #beats #hiphop #instrumental #kyber #TPC #samplechallenge
-
Постквантовый TLS внедряют уже сейчас
Квантовый компьютер, который будет решать криптографические задачи (cryptographically-relevant quantum computer или CRQC в терминологии АНБ ), пока далёк от реальности. Но проблема в том, что создатели такого компьютера вряд ли сразу сообщат миру о его существовании, а могут тайно воспользоваться возможностью взлома мировой криптографической системы. Хуже всего, что с появлением CRQC можно будет расшифровать весь зашифрованный трафик, перехваченный и сохранённый в предыдущие годы (то есть сейчас). Записью и сохранением зашифрованного трафика сейчас занимаются хостинг-провайдеры, операторы мобильной связи, интернет-провайдеры и спецслужбы (стратегия harvest now, decrypt later ).
https://habr.com/ru/companies/globalsign/articles/832078/
#Kyber #MLKEM #X25519Kyber768 #X25519 #Kyber_768 #TLS #постквантовое_шифрование #асимметричная_криптография #PKI #NIST #IETF #Chrome #RSA2048 #QUIC #TLS_13 #HTTPS
-
What’s new? 🆕
🔤 Improved grammar for the Zencode language, adding branching and for-each cycling. 🔬 Stable support for Quantum-proof (#Dilithium, #Kyber and #NTRU). New sigs: EDDSA, ECDSA and BBS+ ZK proofs. W3C scenario now supports DID.dyne.org
-
New blog post "The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level." On a related note, announces a followup FOIA lawsuit filed today. https://blog.cr.yp.to/20231003-countcorrectly.html https://blog-cr-yp-to.viacache.net/20231003-countcorrectly.html #nist #addition #multiplication #ntru #kyber #fiasco
-
amazing, NXP is working on ISA extensions for RISC-V to make the number theoretic transform (NTT) more efficient: https://eprint.iacr.org/2023/1505
this makes #dilithium and #kyber more performant by reducing the cycle count by more than 80%.
-
TIL: The Cryptographic Suite for Algebraic Lattices, #CRYSTALS(!) for short, includes the key encapsulation method #Kyber and the signature method #Dilithium. 😍
-
[DE] Ein bisschen Krikelkrakel für einen Kurzvortrag zu @rosenpass und postquantensicherer Kryptografie. Im Safe sind natürlich die sichersten Verfahren gegen regnerische post-quanten-Tage. :)
[EN] A handful of chicken scratch for a short talk about #RosenPass and post-quantum secure cryptography. When quantum computers finally rain down on our information systems, there’s different levels of security you can have.
-
A good article on post-quantum cryptography (featuring Kyber and Dilithium, along with explanations of other promising schemes).
https://blog.cloudflare.com/nist-post-quantum-surprise/
#postQuantumCryptography #quantumComputing #cryptography #keyExchange #signatures #kyber #dilithium
-
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO - The CEO of Bitgo stated that the Alameda representative failed th... - https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo #decentralizedapplications #arkhamintelligence #alamedaresearch #wrappedbitcoin #smartcontracts #wrappedtokens #mikebelshe #chrisblec #etherscan #wbtcdao #bitgo #kyber #mint #burn #ren
-
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO - The CEO of Bitgo stated that the Alameda representative failed th... - https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo #decentralizedapplications #arkhamintelligence #alamedaresearch #wrappedbitcoin #smartcontracts #wrappedtokens #mikebelshe #chrisblec #etherscan #wbtcdao #bitgo #kyber #mint #burn #ren
-
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO - The CEO of Bitgo stated that the Alameda representative failed th... - https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo #decentralizedapplications #arkhamintelligence #alamedaresearch #wrappedbitcoin #smartcontracts #wrappedtokens #mikebelshe #chrisblec #etherscan #wbtcdao #bitgo #kyber #mint #burn #ren
-
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO - The CEO of Bitgo stated that the Alameda representative failed th... - https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo #decentralizedapplications #arkhamintelligence #alamedaresearch #wrappedbitcoin #smartcontracts #wrappedtokens #mikebelshe #chrisblec #etherscan #wbtcdao #bitgo #kyber #mint #burn #ren
-
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO
https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo
#DecentralizedApplications #ArkhamIntelligence #AlamedaResearch #WrappedBitcoin #SmartContracts #WrappedTokens #MikeBelshe #ChrisBlec #Etherscan #wBTCDAO #Bitgo #Kyber #Mint #Burn #Ren -
Alameda tried to redeem 3,000 wBTC days before bankruptcy: BitGo CEO
https://cointelegraph.com/news/alameda-tried-to-redeem-3-000-wbtc-days-before-bankruptcy-bitgo-ceo
#DecentralizedApplications #ArkhamIntelligence #AlamedaResearch #WrappedBitcoin #SmartContracts #WrappedTokens #MikeBelshe #ChrisBlec #Etherscan #wBTCDAO #Bitgo #Kyber #Mint #Burn #Ren -
Van apareciendo los primeros estándares de criptografía post-cuántica del #NIST!
#kyber para cifrado, #Dilithium, #Falcon y #SPHINCS+ para auth y firma digital.
La computación cuántica cada vez más lejos de ser una amenaza a la criptografía moderna :-)
https://www.helpnetsecurity.com/2022/07/06/quantum-resistant-encryption/