How does the SSL/TLS protocol determine if a certificate is expired or not?

I already tried googling but no luck. All search results always tell you how to check cert expiration manually, but that is not my question. Yes I can use OpenSSL for example, but what I am asking is how the SSL/TLS protocol does it, not h… Continue reading How does the SSL/TLS protocol determine if a certificate is expired or not?

Cybersecurity trends: IBM’s predictions for 2024

From world events to the economy, 2023 was an unpredictable year. Cybersecurity didn’t stray far from this theme, delivering some unexpected twists. As organizations begin planning their security strategies for 2024, now is the time to look back on the year before and extrapolate what the future may hold. The year kicked off with Generative […]

The post Cybersecurity trends: IBM’s predictions for 2024 appeared first on Security Intelligence.

Continue reading Cybersecurity trends: IBM’s predictions for 2024

Improving Shor’s Algorithm

We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are actually feasible—could break both the RSA and Diffie-Hellman public-key algorithms.

Now, computer scientist Oded Regev has a significant speed-up to Shor’s algorithm, at the cost of more storage.

Details are in this article. Here’s the result:

The improvement was profound. The number of elementary logical steps in the quantum part of Regev’s algorithm is proportional to …

Continue reading Improving Shor’s Algorithm

Is it possible to securely use a remote service in a completely hostile network environment

A worldbuilding technical question!
I am an extremely evil power-mongering country government. There is a company S under my jurisdiction, physically located completely inside the borders. This company provides services worldwide, includin… Continue reading Is it possible to securely use a remote service in a completely hostile network environment

cryptography – BitBox02 firmware signed & public key attached to firmware image for verification

Bootloader of the BitBox02 crypto wallet verifies the main application with the public keys that are attached to the firmware update itself. Next to that, there are signatures of the public keys, signed by the company’s private key.

Devic… Continue reading cryptography – BitBox02 firmware signed & public key attached to firmware image for verification