PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 41Mar 41
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
The Mighty CRCThe more I work in cryptography, the more I see the cross-over into areas of data communications. For example, in post quantum key…17h ago17h ago
Post Quantum Signatures in a Browser with JavaScriptNIST has now standardized Dilithium with FIPS 204 (Module-Lattice-Based Digital Signature Standard — ML-DSA) for a PQC signature. The…1d ago1d ago
Post Quantum Cryptography in a BrowserLike it or not, we need to move away from ECDH (Elliptic Curve Diffie Hellman) for key exchange and move towards using ML-KEM (aka Kyber)…3d ago13d ago1
First, You Have PowerShell, and Then It’s GoneAs someone brought up on Windows shell commands, the advancement of PowerShell was a great step forward. Unbelievable Windows shell is…4d ago4d ago
Microsoft’s Silly Root CertificatesI trust Apple for their usage of cryptography and in implementing it on their operating systems and devices. Overall, Apple has a long…4d ago14d ago1
Published inASecuritySite: When Bob Met AliceNo Room for Haraka Hashing in FIPS 205In tests, the Haraka hashing method for SPHINCS+ beats the SHA256 version by a considerable margin, and which also beats the SHAKE256…4d ago4d ago
Published inASecuritySite: When Bob Met AliceA Long Goodbye to RSA and ECDSA, and Quick Hello to SLH-DSASmall Keys, But Larger Signatures, and no Haraka hashes4d ago4d ago
Pretend AI, aka Microsoft Recall“If you want to keep a secret, you must also hide it from yourself.” ― George Orwell, 19845d ago75d ago7