Side-Channel Attack against CRYSTALS-Kyber

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.

Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack.

The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to exploit the side channel…

Continue reading Side-Channel Attack against CRYSTALS-Kyber

AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.
The post AI Helps Crack NIST-Recommended Post-Quantum Encryption Alg… Continue reading AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm

What the New Federal Cybersecurity Act Means for Businesses

On December 21, 2022, President Biden signed the Quantum Computing Cybersecurity Preparedness Act. The risk of quantum-powered password decryption is increasing exponentially. The new legislation is designed to help federal agencies proactively shift to a post-quantum security posture. Agencies have until May 4, 2023, to submit an inventory of potentially vulnerable systems, and the Act […]

The post What the New Federal Cybersecurity Act Means for Businesses appeared first on Security Intelligence.

Continue reading What the New Federal Cybersecurity Act Means for Businesses

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over […]

The post Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today appeared first on Security Intelligence.

Continue reading Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for […]

The post Transitioning to Quantum-Safe Encryption appeared first on Security Intelligence.

Continue reading Transitioning to Quantum-Safe Encryption

Mastercard’s New Card: Safer From Quantum Attacks?

Quantum computers present a unique threat to many aspects of modern information technology. In particular, many cryptographic systems could be at risk of compromise in the event a malicious actor …read more Continue reading Mastercard’s New Card: Safer From Quantum Attacks?

Prepare for Quantum Encryption Today

Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in smoke. With every tool that could change the world comes questions of scale and mass […]

The post Prepare for Quantum Encryption Today appeared first on Security Intelligence.

Continue reading Prepare for Quantum Encryption Today

NIST’s Post-Quantum Cryptography Standards

Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but something much more complicated. In theory, such a computer can solve problems too complex for conventional computers.

Current quantum computers are still toy prototypes, and the engineering advances required to build a functionally useful quantum computer are somewhere between a few years away and impossible. Even so, we already know that that such a computer could potentially factor large numbers and compute discrete logs, and break the RSA and Diffie-Hellman public-key algorithms in all of the useful key sizes…

Continue reading NIST’s Post-Quantum Cryptography Standards

Self-styled “Crocodile of Wall Street” arrested with husband over Bitcoin megaheist

The cops say they’ve recovered 80% of a $72 million cryptocoin heist… but the recovered funds alone are now worth over $4 billion! Continue reading Self-styled “Crocodile of Wall Street” arrested with husband over Bitcoin megaheist

The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare

Have you ever sat in traffic and cursed the town planners? For years, you may have watched as the town approved new subdivisions and stores along the roads you drive often. And you wondered when they would add a new lane, extend a road or install a new stoplight. But think about this: If you’re […]

The post The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare appeared first on Security Intelligence.

Continue reading The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare