Side-Channel Attack against CRYSTALS-Kyber

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.

Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack.

The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to exploit the side channel…

February 28, 2023
Read More >>

CEO of WhatsApp Criticized Telegram for Misleading its Users

As online communication has become the primary mode of connection today, safeguarding privacy and security has become imperative. Messaging apps like WhatsApp and Telegram offer end-to-end encryption to secure the messages of their users. However, recently, the CEO of WhatsApp Criticized Telegram for Misleading its Users. It has sparked a debate on the security and […]

The post CEO of WhatsApp Criticized Telegram for Misleading its Users first appeared on Internet Security Blog – Hackology.

February 18, 2023
Read More >>

Bkcrack : Crack legacy zip encryption with Biham and Kocher’s known plaintext attack.

Bkcrack is a Crack legacy zip encryption with Biham and Kocher’s known plaintext attack. A ZIP archive may contain many entries whose content can be compressed and/or encrypted. In particular, entries can be encrypted with a password-based symmetric encryption algorithm referred to as traditional PKWARE encryption, legacy encryption or ZipCrypto. This algorithm generates a pseudo-random […]

February 18, 2023
Read More >>

Expected advancements in quantum cryptography

Quantum computing has surged in popularity recently, with its revolutionary computational capabilities transforming the technology sector. While some are skeptical of its real-world potential, others are more visionary about its future. In this Help Ne…

February 16, 2023
Read More >>

Will Quantum Computing Bring a Cryptopocalypse?

“The waiting time for general purpose quantum computers is getting shorter, but they are still probably decades away,” notes Security Week.

But “The arrival of cryptanalytically-relevant quantum computers that will herald the cryptopocalypse will be …

February 12, 2023
Read More >>

Personal data encryption in Windows 11

There’s a new, more secure way to encrypt files in Windows 11, but it’s only an option for building secure applications, not a replacement for BitLocker.
The post Personal data encryption in Windows 11 appeared first on TechRepublic.

February 9, 2023
Read More >>

Mary Queen of Scots Letters Decrypted

This is a neat piece of historical research.

The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch of encoded documents related to Italy, because that was how they were filed at the Bibliothèque Nationale de France.

However, they quickly realised the letters were in French. Many verb and adjectival forms being feminine, regular mention of captivity, and recurring names—such as Walsingham—all put them on the trail of Mary. Sir Francis Walsingham was Queen Elizabeth’s spymaster…

February 9, 2023
Read More >>