This is a newly unclassified NSA history of its reaction to academic cryptography in the 1970s: “NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era,” Cryptographic Quarterly, Spring 1996, author still classifi…
Today, in the crypto industry, much focus is placed on Bitcoin (BTC) thanks to its global status as the king of crypto coins. In fact, it is the most accepted crypto coin around. However, this should not deter investors from other valuable altcoins, such as Litecoin (LTC), which is also popular in various circles. This […]
No IT technology feels quite as much of a double-edged sword as encryption.
Latest episode – listen now!
The bug that broke security when you turned STRICT mode on…
Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled reseller.
A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers’ bank accounts.
I have been seeing this paper by cryptographer Peter Schnorr making the rounds: “Fast Factoring Integers by SVP Algorithms.” It describes a new factoring method, and its abstract ends with the provocative sentence: “This destroys the RSA cryptosystem.”
It does not. At best, it’s an improvement in factoring — and I’m not sure it’s even that. The paper is a preprint: it hasn’t been peer reviewed. Be careful taking its claims at face value.
Some discussion here.
I’ll append more analysis links to this post when I find them.
EDITED TO ADD (3/12): The latest version of the paper does not have the words “This destroys the RSA cryptosystem” in the abstract. …
Lastest episode – listen now. (And tell your friends!)
The hotly anticipated ray-tracing, advanced gaming graphics chip will throttle Ethereum mining.