#Cryptography

Tommaso Gagliardonitomgag@infosec.exchange
2025-07-14

I wish people would stop giving credit to "prominent cybersecurity/cryptography experts" just because they released some "cypherpunk" book or software of unproven impact 30 years ago and have since then retreated into golden tenure, writing technically empty but catchy preprints with provocative titles. These "Ludd grandpas" (you know at least a couple of names of who I'm referring to) are, unfortunately, still worshipped by a large number of semireligious followers, who contribute to the spread of their moldy ignorance.

Thinking deeper, maybe mine is a typical case of rejection for the image in the mirror: I hope I will never become like that in the future.

The world does not stop at your rants. Keep moving and stay open-minded, or become obsolete.

#cybersecurity #security #infosec #cryptography #crypto #academia #rant #luddism

2025-07-14

ETH professor Ueli Maurer has provided cryptography with a theoretical basis. Now he is retiring. However, his most important research project is yet to come. ‪@csateth.bsky.social‬ ethz.ch/en/news-and-... #Cryptography #Cybersecurity #DigitalSecurity

A clear plan for security

Brian Slettenbsletten
2025-07-13

Oh dear.

Researchers figure out how to undermine Fiat-Shamir and the Random Oracle Model to validate untrue inputs.

This has quite serious potential implications for blockchain trust although the full extent isn’t yet known.

quantamagazine.org/computer-sc

Alex H :firefox: VA7XF CN89ajh@indieweb.social
2025-07-13

Here's what I think, using discrete log math / Schnorr proofs.

Alice announces a QSO with Bob for a certain day and sends A1 = g^a, proves knowledge of a

Bob sends B1 = g^b, proves knowledge of b

Alice sends g3 = B1^a, Q_a = g3^x, proves knowledge of x

Bob sends g3' = A1^b, Q_b = g3'^x, proves knowledge of x

Hey presto!
Q_a = (g^b)^{a * x} = g^{a * b * x}
Q_b = (g^a)^{b * x} = g^{a * b * x}

Would love it if some #cryptography #programming people could comment. Does this make sense?

🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸schizanon
2025-07-13

And yet…the signer remains a ghost. An early pool operator? ’s long-lost buddy? Bitcoin’s not perfectly private, but it’s still pseudonymous enough that the world’s biggest money move can stay a whodunit.

marketwatch.com/story/sleeping

Diego Córdoba 🇦🇷d1cor@mstdn.io
2025-07-12

Crypto agility, qué importante es este concepto en el mundo de la criptografía actual, la facilidad de poder cambiar un algoritmo criptográfico vulnerable por otro, sin necesidad de cambiar detalles internos de los protocolos.

en.wikipedia.org/wiki/Cryptogr

#cryptoagility #criptografia #pqc #postquantumcryptography #cryptography

Least Authority GmbHLeastAuthority
2025-07-11

Least Authority CEO Liz Steininger, & Security Researcher Anna Kaplan, joined the SNARK Chocolate podcast team from Ingonyama to talk about our roots, how to become a security auditor, privacy-first audits, applied cryptography trends, and the limits of AI in security work. youtu.be/Rw-jRay0nGk?si=97byb0

The Snark Chocolate podcast logo is an illustration of a lion wearing sunglasses and a hoodie, sitting at a microphone in a recording studio. The background features soundproofing panels, and the text 'Snark Chocolate' appears in stylized lettering above.
Laurent Cheyluslcheylus@bsd.network
2025-07-10

pqcscan: a small utility, written in Rust, that allows users to scan SSH and TLS servers for their stated support of Post-Quantum Cryptography algorithms - Project by Anvil Secure #Cryptography #PQC anvilsecure.com/blog/scanning-

Lobsterslobsters
2025-07-10
Diego Córdoba 🇦🇷d1cor@mstdn.io
2025-07-10

Feliz cumpleaños a Adi Shamir, la "S" del algoritmo de cifrado asimétrico #RSA

¿Qué es RSA? ¿Cómo funciona? ¿Qué cálculos hace?

Acá te dejo toda la info 😉 👇

juncotic.com/rsa-como-funciona

#rsa #cryptography #encryption #juncotic

i thing that I am among the few lucky onew who are exploiting complexity. Most people are unhappy with the emergence of complexity, they would prefer it if the world were very simple, but then it would be a doom for a cryptographer like myself.
Alex H :firefox: VA7XF CN89ajh@indieweb.social
2025-07-10

Upon further research, it sounds like I'm describing the Socialist Millionaire Problem. Off to do some more #cryptography research.

Diego Córdoba 🇦🇷d1cor@mstdn.io
2025-07-09

Hoy aprendí sobre el algoritmo de hash #bcrypt, basado en el cifrador de bloques #Blowfish, revisando un artículo de @andrea_navarro sobre extensiones de #Flask... particularmente sobre las extensiones de seguridad.

Y acabo de descubrir que es uno de los algoritmos soportados para la creación de passwords en GNU/Linux :D

Habrá que hacer algunos experimentos.

#gnu #linux #cryptography #criptografía #ciberseguridad #infosec #encrypt #hash #python #flask

"man 5 crypt" donde se muestra la sección de bcrypt
2025-07-09

We're proud to be recognized by Wavestone on their 2025 Radar of French Cybersecurity Startups.

This recognition is a significant milestone that validates our core mission: building the essential developer tools for creating high-assurance software and formally verified cryptography. Making provably secure software accessible to all developers.

Full report (French): wavestone.com/fr/insight/radar

#Cybersecurity #Startup #DeepTech #DeveloperTools #FormalVerification #Cryptography #HighAssurance

Conan the Sysadminconansysadmin@mstdn.social
2025-07-08

A #cybersecurity warrior always has more to learn. Especially about the wizardry of #cryptography. cromwell-intl.com/cybersecurit

Alex H :firefox: VA7XF CN89ajh@indieweb.social
2025-07-08

Maybe this just isn't possible given the combinations of the shared secret are just too small:

* timestamp of +/- 30 minutes
* band (ie "20m")
* mode (ie "FM")
* callsign 1
* callsign 2

Also, there would have to be some infrastructure for sharing public keys.

Anyone into #cryptography want to comment?

2025-07-08

I remember reading a blog series claiming that popular cryptographic primitives (I think the example given was RSA?) even if they are not *mathematically* impossible to break, can nevertheless be so computationally difficult that they are *physically* impossible to break on current computers.

Does anyone know what I'm talking about?

#cryptography #security #computerscience #AskFedi #novice

Hacker Newsh4ckernews
2025-07-08
Lobsterslobsters
2025-07-08

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst