Tag

Cryptography

All articles tagged with #cryptography

Beyond Classical Bits: Building a Quantum-Input Complexity Theory
technology8 days ago

Beyond Classical Bits: Building a Quantum-Input Complexity Theory

Henry Yuen is building a fully quantum complexity theory to analyze problems whose inputs and outputs are quantum, something traditional theory can’t capture. By recasting issues through the lens of Uhlmann’s theorem, his work shows several quantum-input problems—bit commitments, black-hole decoding, quantum data compression—are actually equivalent, suggesting a unified, quantum-only framework. The project seeks to map these relationships and assess whether quantum-input problems are logically independent from classical complexity, while also sharing Yuen’s personal journey and research philosophy.

Researchers uncover 27 attack scenarios targeting cloud password managers
security9 days ago

Researchers uncover 27 attack scenarios targeting cloud password managers

Swiss researchers disclosed 27 attack scenarios across Bitwarden, LastPass, Dashlane and 1Password that could let attackers view or modify vaults, challenging the science of end-to-end encryption and exploiting issues in onboarding, key escrow, and item-level encryption. A notable attack demonstrated is ‘malicious auto-enrolment’ against Bitwarden, which could allow a server-controlled attacker to hijack a vault during organization onboarding. Vendors are patching (Bitwarden, LastPass, Dashlane) while 1Password defends its SRP-based design. The paper recommends stronger authentication, key separation and ciphertext integrity. Users should check remediation status with providers and ask for audits.)

Researchers expose 25 recovery attacks against leading cloud password managers
security9 days ago

Researchers expose 25 recovery attacks against leading cloud password managers

A joint ETH Zurich/USI study identifies 25 distinct password-recovery/related attacks across major cloud password managers (Bitwarden, Dashlane, LastPass; with 1Password also noted for some flaws). Attacks span four categories: exploiting key escrow in account recovery, weaknesses in item-level encryption and metadata, vulnerabilities in sharing features, and downgrades due to legacy code. In total, 12 attacks hit Bitwarden, 7 LastPass, and 6 Dashlane; 1Password was linked to item-level and sharing flaws as known limitations. Vendors have issued patches or mitigations (e.g., Dashlane removing legacy crypto, Bitwarden remediation, LastPass hardening, 1Password using SRP), and there’s no evidence these issues have been exploited in the wild.

Google Urges Speedy Move to Quantum-Safe Internet Security
technology18 days ago

Google Urges Speedy Move to Quantum-Safe Internet Security

Google warns that quantum computers could soon break current public-key cryptography and urges governments and industry to accelerate adoption of post-quantum cryptography, aligned with NIST’s PQC standards finalized in 2024. The company says it has been preparing since 2016, implementing crypto agility across its infrastructure, and outlines five policy steps: drive society-wide momentum across critical infrastructure; ensure PQC is embedded in AI systems; avoid fragmentation of standards; promote cloud-first modernization to ease migrations; and maintain ongoing engagement with technical experts to prevent strategic surprises.

technology2 months ago

GPG Failure Highlights Security Concerns

The article discusses concerns about GnuPG's security issues, including a significant vulnerability that allows plaintext recovery, and debates whether GPG signatures on git commits are secure or if alternatives like SSH keys or Signal should be used for secure communication and signing. It highlights the complexity and flaws in PGP's design, the challenges of key management, and the political and technical difficulties in replacing or improving upon existing cryptographic tools.

Preparing Finance for Quantum Computing and Its Cybersecurity Risks
finance7 months ago

Preparing Finance for Quantum Computing and Its Cybersecurity Risks

The BIS paper emphasizes the urgent need for the financial system to prepare for quantum computing's potential to break current encryption, advocating for early adoption of quantum-safe cryptographic measures, coordinated planning, and exploring long-term solutions like quantum key distribution to ensure security and resilience.

IBM Advances Quantum Computing, Heightening Bitcoin Security Concerns
technology8 months ago

IBM Advances Quantum Computing, Heightening Bitcoin Security Concerns

IBM is developing a fault-tolerant quantum computer called Starling, expected by 2029, which could accelerate the timeline for quantum threats to Bitcoin's security. Despite current skepticism, experts acknowledge that advancements in quantum error correction could eventually pose risks to cryptographic systems, prompting a need for quantum-resistant encryption. IBM's roadmap includes scaling up qubits and modular architectures to achieve practical quantum computing.

Google's Quantum Advances Could Make Breaking Encryption 20 Times Easier
technology9 months ago

Google's Quantum Advances Could Make Breaking Encryption 20 Times Easier

Google's latest research indicates that quantum computers could break RSA encryption 20 times faster than previously thought, raising concerns about the security of Bitcoin and other cryptographic systems. While current quantum computers are far from capable of such tasks, the findings accelerate the timeline for potential quantum threats, prompting the crypto community to develop quantum-resistant solutions. A Bitcoin bounty has been launched to test quantum vulnerabilities, highlighting the urgency of preparing for a post-quantum cryptographic era.

Google Unveils Willow: A Quantum Leap in Computing
technology1 year ago

Google Unveils Willow: A Quantum Leap in Computing

Google's new Willow quantum chip is not capable of breaking modern cryptography, according to the company's Quantum AI director. While the chip can solve complex problems much faster than traditional supercomputers, it lacks the millions of qubits needed to crack encryption codes like RSA. Despite concerns about quantum computers potentially undermining global security, experts estimate that such capabilities are at least a decade away. In response, efforts are underway to develop post-quantum cryptography standards to safeguard against future threats.

"Unraveling the Erotic Enigma of the Voynich Manuscript"
history1 year ago

"Unraveling the Erotic Enigma of the Voynich Manuscript"

The Voynich manuscript, a mysterious late-medieval document covered in illustrations of stars, planets, plants, and naked women, has long puzzled historians. In a recent article, researchers propose that the manuscript contains information about sex and conception, drawing on late-medieval gynaecology and sexology. They suggest that the largest illustration, the Rosettes, represents a late-medieval understanding of sex and conception, resolving many of the manuscript's contradictions. The proposal aligns with the patriarchal culture of the time and sheds light on the manuscript's enigmatic features, offering a new perspective for future research.