#Cryptography

2026-01-26

OTD in 1996 Peter Shor published "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", now we have #QuantumSafe #cryptography as a defense cromwell-intl.com/open-source/ #PQC #cybersecurity

🦠Toxic Flange (Gurjeet)🔬⚱️🌚Toxic_Flange@infosec.exchange
2026-01-25
2026-01-25

OTD in 1996 Peter Shor published "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", now we have #QuantumSafe #cryptography as a defense cromwell-intl.com/open-source/ #PQC #cybersecurity

Ԏєηυкι, 手抜き🚀🐧♏ 🔭 ⚫⚪enigma@norden.social
2026-01-25

RE: mstdn.social/@archaeology/1159

the article didnot resolve or decipher any chapter, paragraph or sentence. It describes the way of setting up cipher tables in a medieval manner. However to my surprise no AI is ever mentioned with Voynich for solving the mix of images and glyphs in the manuscript. Isn't that curious or even silly ? If s.th today was accomplished by AI holy wows to AI cannot be big enough. If it fails or is not applied nobody cares or dares to mention AI any time for enigmatic #cryptography

table of letters and phrases combined with medieval glyphs. Starting by 'a' , 'd' and 'e' and ending by k and t and 4 phonetic sets as cfh, cph, ckh and finally cth
Lobsterslobsters
2026-01-25

I think it goes without saying that if an entity has your encryption key, they can be compelled to turn that key over to the government. Your Microsoft encrypted drive is not immune to this.

techcrunch.com/2026/01/23/micr

#2600 #windows #cryptography #eff #civilrights

2026-01-24

godot ceasar cipher
now even you can hide your military plans in plain sight

class_name CeasarCipher
extends Node


const ALPHABET: Array = ["a","b",'c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z']


func _ready():
	print(encrypt("Hello! My name is George. Don't say my name wrongly! Why would you do that??? I hope if you do, it will be a very valuable lesson... !@#$%^&*()_+"))
	print(decrypt("khoor! pb qdph lv jhrujh. grq'w vdb pb qdph zurqjob! zkb zrxog brx gr wkdw??? l krsh li brx gr, lw zloo eh d yhub ydoxdeoh ohvvrq... !@#$%^&*()_+"))


func encrypt(string: String, displacement_amount: int = 3) -> String:
	var encrypted_string: String = ""

	for i in string.length():
		for e in ALPHABET.size():
			if string[i].to_lower() == ALPHABET[e].to_lower():
				encrypted_string += ALPHABET[(e + displacement_amount) % 26]
				break
		if !string[i].to_lower() in ALPHABET:
			encrypted_string += string[i]

	return encrypted_string


func decrypt(string: String, displacement_amount: int = 3) -> String:
	var decrypted_string: String = ""

	for i in string.length():
		for e in ALPHABET.size():
			if string[i].to_lower() == ALPHABET[e].to_lower():
				decrypted_string += ALPHABET[(e - displacement_amount + 26) % 26]
				break
		if !string[i].to_lower() in ALPHABET:
			decrypted_string += string[i]

	return decrypted_string
#godot #gdscript #indiedev #cryptography

Lobsterslobsters
2026-01-23

Public Key Directory - Key Transparency for the Fediverse via @arch lobste.rs/s/db0gv4
publickey.directory/

@reiver ⊼ (Charles) :batman:reiver
2026-01-23

Cryptographic public-keys are one way that one can have an identity (on the Fediverse, and elsewhere) while also having privacy — through a pseudonymous identity.

Yes, we have Fediverse IDs such as:

@joeblow@example.com

But a (non-delegated) public-key can function as a PORTABLE form of identity on the Fediverse.

@reiver ⊼ (Charles) :batman:reiver
2026-01-23

3/

All that requires that a Fediverse user can have multiple public-keys specified for them.

...

Although w3id.org/security/v1 seems to allow for multiple public-keys —

I wonder how much Fediverse software could actually handle multiple public-keys (rather than just one)?

(And, don't just assume one public-key?)

How mucg Fediverse software could handle public-keys changing over time?

Etc?

@reiver ⊼ (Charles) :batman:reiver
2026-01-23

2/

To handle public-key cryptography safely, often a user should be able to have multiple public-keys.

For example, a user might have a different public-key on each device, rather than sharing public-keys.

A user might delegate to a 3rd party — and there may be a delegated versus non-delegated public-key distinction.

Key-rotation is also often necessary for safety reasons.

Etc.

...

@reiver ⊼ (Charles) :batman:reiver
2026-01-23

1/

One way ActivityPub can be extended is — through JSON-LD namespaces.

For example, many Fediverse servers use the following JSON-LD namespace to specify cryptographic public-key(s) for the user.

w3id.org/security/v1

(This particular namespace is an HTTPS URL.)

...

But, does extant Fediverse software support cryptographic public-key(s) well?

...

2026-01-23

Really have enjoyed The Code Book by Simon Singh #Cryptography #cryptanalysis

Have ordered the David Kahn first edition of The Codebreakers from eBay to read next.

The Code Book by Simon Singh. The science of secrecy from ancient Egypt to Quantum Cryptography
2026-01-23

🚀 **BitRep - Hệ thống uy tín mã nguồn mở**
Gồm đầy đủ tính năng: định danh mật mã, xác thực chữ ký số, tính điểm uy tín bằng thuật toán PageRank, cơ chế quản trị DAO và tích hợp ZKP cho bảo mật. Hỗ trợ tích hợp với GitHub, LinkedIn...

Dành cho dev đam mê:
✔️ Thiết kế module dễ mở rộng
✔️ Tài liệu chi tiết + 28/28 test cases
✔️ Sẵn sàng đóng góp/phản hồi

#OpenSource #ReputationSystem #Cryptography #ZeroKnowledgeProof #VietnameseTech #Blockchain #DAO #Developers #LậpTrìnhViệt

https

2026-01-23
How to Upgrade GnuPG to Generate Kyber and Goldilocks Keys

I see some people still using ancient PGP keys. GnuPG offers Linux repositories for updating to the latest versions of GnuPG with new expert features for key generation. Recent versions support both Kyber1024 and Goldilocks448 keys (and more).

Once installed run: :~$ gpg --full-generate-key --expert

New GnuPG Repositories for Debian, Ubuntu, and Devuan: Stable and Development Branches Available

https://www.gnupg.org/blog/20250827-new-repository.html

#PGP #GPG #PQC #GnuPG #Encryption #Cryptography #Privacy #Signatures #Kyber #Goldilocks #ED448 #Keys #PublicKey
N-gated Hacker Newsngate
2026-01-23

🔒✨ Behold, a magical proxy with superpowers to encrypt your woes and save you from the horrors of code changes! Because who wouldn’t want to juggle OpenSSL’s cryptographic circus 🤹 without actually understanding it? 🚀🙃
stunnel.org/

Orhun Parmaksız 👾orhun@fosstodon.org
2026-01-22

Just you, your terminal and your passwords... 🔐

🗝️ **veiled** — A local-first TUI password manager

⚡ Encrypted local vault, zero cloud, modern encryption & more!

🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: github.com/shibu0x/veiled

#rustlang #ratatui #tui #security #passwords #cryptography #privacy #cli

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst