Tag: cryptography

  • Simon Willison’s Weblog: How some of the world’s most brilliant computer scientists got password policies so wrong

    Source URL: https://simonwillison.net/2024/Nov/21/password-policies/#atom-everything Source: Simon Willison’s Weblog Title: How some of the world’s most brilliant computer scientists got password policies so wrong Feedly Summary: How some of the world’s most brilliant computer scientists got password policies so wrong Stuart Schechter blames Robert Morris and Ken Thompson for the dire state of passwords today: The story…

  • Cisco Security Blog: Quantum Cryptography: What’s Coming Next

    Source URL: https://blogs.cisco.com/security/quantum-cryptography-whats-coming-next Source: Cisco Security Blog Title: Quantum Cryptography: What’s Coming Next Feedly Summary: NIST developed new quantum-resistant cryptographic standards, but operationalizing these standards will require more work. AI Summary and Description: Yes Summary: The development of quantum-resistant cryptographic standards by NIST is significant for professionals in security and compliance, as it underscores the…

  • Hacker News: Nothing-up-my-sleeve number

    Source URL: https://en.wikipedia.org/wiki/Nothing-up-my-sleeve_number Source: Hacker News Title: Nothing-up-my-sleeve number Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth exploration of “nothing-up-my-sleeve” numbers in cryptography, examining their importance in ensuring the integrity and security of cryptographic algorithms. This analysis is particularly relevant for professionals in security and compliance, as it highlights…

  • Hacker News: Will passkeys ever replace passwords? Can they? Here’s why they should

    Source URL: https://www.theregister.com/2024/11/17/passkeys_passwords/ Source: Hacker News Title: Will passkeys ever replace passwords? Can they? Here’s why they should Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the concept of passkeys as an alternative to traditional passwords, emphasizing their potential to enhance security against phishing attacks while addressing implementation challenges and user…

  • The Register: Will passkeys ever replace passwords? Can they?

    Source URL: https://www.theregister.com/2024/11/17/passkeys_passwords/ Source: The Register Title: Will passkeys ever replace passwords? Can they? Feedly Summary: Here’s why they really should Systems Approach I have been playing around with passkeys, or as they are formally known, discoverable credentials.… AI Summary and Description: Yes **Summary:** The text discusses the concept and implementation of passkeys, which are…

  • Hacker News: How Public Key Cryptography Works, Using Only Simple Math

    Source URL: https://www.quantamagazine.org/how-public-key-cryptography-really-works-20241115/ Source: Hacker News Title: How Public Key Cryptography Works, Using Only Simple Math Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive overview of public key cryptography, explaining its fundamental principles, historical development, and potential vulnerabilities posed by quantum computing. This is particularly relevant for security professionals…

  • Hacker News: Attestations: A new generation of signatures on PyPI

    Source URL: https://blog.trailofbits.com/2024/11/14/attestations-a-new-generation-of-signatures-on-pypi/ Source: Hacker News Title: Attestations: A new generation of signatures on PyPI Feedly Summary: Comments AI Summary and Description: Yes Summary: The announcement discusses a new security feature on the Python Package Index (PyPI): index-hosted digital attestations based on PEP 740. This feature enhances package provenance and security by integrating with Trusted…

  • Hacker News: Implementing Signal’s Double Ratchet algorithm (2020)

    Source URL: https://nfil.dev/coding/encryption/python/double-ratchet-example/ Source: Hacker News Title: Implementing Signal’s Double Ratchet algorithm (2020) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed exposition of the Double Ratchet algorithm and its implementation, emphasizing its benefits for end-to-end encryption (E2E) in securing communications. It highlights the algorithm’s key features such as forward…

  • Cloud Blog: Emerging Threats: Cybersecurity Forecast 2025

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2025/ Source: Cloud Blog Title: Emerging Threats: Cybersecurity Forecast 2025 Feedly Summary: Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission. This…

  • Cloud Blog: Emerging Threats: Cybersecurity Forecast 2025

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/emerging-threats-cybersecurity-forecast-2025/ Source: Cloud Blog Title: Emerging Threats: Cybersecurity Forecast 2025 Feedly Summary: Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission. This…