Where and how post-quantum cryptography is being used in 2024
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
21 articles
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
We explore how encryption protects your data and why quantum computers might shake things up.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
According to recent news, quantum supremacy is reached. What should we do about it?
Want to protect your intimate photos from ever going public? Facebook has a suggestion: Upload them yourself!
Until very recently, news of blockchain was all around. Now that the hype has passed, let’s contemplate blockchain’s future.
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.