Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis.
This is important, because a bunch of NIST’s post-quantum options base their security on lattice problems.
I worry about standard… Continue reading Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

topic for thesis in the specialty software-secure infocommunications [closed]

Can you suggest a relevant topic for a thesis in the specialty of software-secure infocommunications?
The topic could be related to cryptography, software vulnerability analysis, corporate security, VPN, network protocol analysis, or anyth… Continue reading topic for thesis in the specialty software-secure infocommunications [closed]

Securely storing derived key in web app and handling user identity

I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can decrypt this data.
Unfortunately, I am stuck … Continue reading Securely storing derived key in web app and handling user identity

DORA and your quantum-safe cryptography migration

Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector. The Digital Operational Resilience Act (DORA) is a regulatory framework that introduces uniform requirements across the European Union (EU) to achieve a “high […]

The post DORA and your quantum-safe cryptography migration appeared first on Security Intelligence.

Continue reading DORA and your quantum-safe cryptography migration

The CISO’s guide to accelerating quantum-safe readiness

Quantum computing presents both opportunities and challenges for the modern enterprise. While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional cryptographic systems, particularly public-key encryption. To ensure their organization’s data remains secure now and in the future, chief information security officers (CISOs) […]

The post The CISO’s guide to accelerating quantum-safe readiness appeared first on Security Intelligence.

Continue reading The CISO’s guide to accelerating quantum-safe readiness

How does the SSL/TLS protocol determine if a certificate is expired or not?

I already tried googling but no luck. All search results always tell you how to check cert expiration manually, but that is not my question. Yes I can use OpenSSL for example, but what I am asking is how the SSL/TLS protocol does it, not h… Continue reading How does the SSL/TLS protocol determine if a certificate is expired or not?