Mr.Trunk · @mrtrunk
10 followers · 17897 posts · Server dromedary.seedoubleyou.me
Gottfried Szing · @kjoo
607 followers · 191 posts · Server hachyderm.io
Mr.Trunk · @mrtrunk
6 followers · 14224 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14123 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
6 followers · 14022 posts · Server dromedary.seedoubleyou.me
Hackernoon · @hackernoon_bot
412 followers · 7526 posts · Server social.platypush.tech
Gottfried Szing :unverified: · @kjoo
541 followers · 1687 posts · Server fosstodon.org
Brian N. Siegelwax · @bsiegelwax
81 followers · 142 posts · Server qubit-social.xyz
dispatch · @dispatch
529 followers · 2947 posts · Server ioc.exchange
tkteo · @tkteo
16 followers · 657 posts · Server infosec.exchange

Ah! This is indeed in the works! draft from December 2022 of "a post-quantum public-key algorithm extension for the OpenPGP protocol. Given the generally assumed threat of a cryptographically relevant quantum computer, this extension provides a basis for long-term secure OpenPGP signatures and ciphertexts. Specifically, it defines composite public-key encryption based on CRYSTALS-Kyber, composite public-key signatures based on CRYSTALS-Dilithium, both in combination with elliptic curve cryptography, and SPHINCS+ as a standalone public key signature scheme"

datatracker.ietf.org/doc/draft

#cryptography #pgp #openpgp #gpg #quantum #quantumcomputing #quantumcomputers #quantumcryptography

Last updated 2 years ago

cloudgal42 · @cloudgal42
0 followers · 1 posts · Server infosec.exchange

I recently read a very interesting paper on Leakage-Abuse Attacks against Order-Preserving Encryption (OPE) schemes and Order-Revealing Encryption (ORE) Schemes.

In this paper, the researchers show how the widely used encryption schemes are inadequate. Here are some snippets from the paper.

Order-preserving encryption () - ensures that Ek(m1)<Ek(m2) for m1<m2 and Ek the encryption algorithm. Most widely used scheme is .

Order-revealing encryption () - reveals ordering relations by way of a public comparison function that operates on pairs of plaintexts. Most widely used scheme is .

Popular belief is that OPE and ORE schemes remain secure in practice for plaintext data drawn from larger domains, and practitioners could simply avoid using OPE for small-domain data.

The researchers used a non-crossing attack (min-weight non-crossing matching) which runs in only a few hours, even for the largest target dataset, against real-world datasets using the BCLO scheme to encrypt a set of first names.

Using this attack they were able to recover almost half the data set. The leakage was even worse for last names, with almost 97% of last names trivially recoverable.

of the two (BCLO & CLWW) schemes does attack accuracy but is still far from providing acceptable security.

Exploiting known plaintexts is even easier.

Attacking frequency-hiding schemes - recently introduced a scheme that hides frequency information. However, a “” attack performs reasonably well, recovering on average 30% of first names and 7% of last names. Notably, it recovers majority of high-frequency plaintexts (despite not having frequency information leaked), suggesting these plaintexts are particularly poorly protected by any order-revealing scheme.

In terms of countermeasures, an obvious suggestion is to move towards less leaky schemes, such as those that only reveal order, including Kerschbaum's scheme and the more recent et al. scheme based on maps. Unfortunately in most settings there exists inherent to deployment of these schemes. Kerschbaum's scheme is relatively efficient, but requires client-side state which impedes scaling. The Boneh et al. scheme has ciphertexts larger by 10 orders of magnitude than BCLO ciphertexts and requires tens of minutes to compute encryptions.

#ope #bclo #ore #clww #bipartite #composition #decrease #kerschbaum #binomial #boneh #multilinear #challenges #encryption #quantumcomputing #quantumcryptography

Last updated 2 years ago

Xavier Valcarce · @xvalcarce
13 followers · 1 posts · Server qubit-social.xyz

Alright, here we go Mastodon 😄

A small :
I am a student at the Institut de Physique Théorique (Université Paris-Saclay/CEA) working on . My main focus is (mostly device-independent quantum key distribution) but I am also interested in .

I will (mainly) post about our papers, but I might also toot about some of my other interests ( stuff, bouldering, political topics, ...). Looking forward to connect with y'all 😊

#introduction #phd #QuantumInformation #quantumcryptography #quantumcomputing #linux

Last updated 2 years ago

Gottfried Szing :unverified: · @kjoo
317 followers · 745 posts · Server fosstodon.org

Where would you put the and / ? In what stage is what technology? What is your opinion? 🤔

#quantumcomputing #QuantumSensing #quantumcryptography #qkd

Last updated 2 years ago

Gottfried Szing :unverified: · @kjoo
279 followers · 695 posts · Server fosstodon.org

Prof Leymann explained today the underlying of Shor's algorithm without actually going deeper into as on the one slides. TIL on what shoulders even a mathematical genius like Peter Shor is standing. All the theories were there, but he combined all this a specific way, which enables QC to break the security (sooner or later or never).

Mind blowing this was. 🤯

#mathematics #quantumcomputing #pqc #quantumcryptography #cryptography

Last updated 2 years ago

That such a simulation is impossible is the conclusion of so-called ‘Bell’s theorem’. Therefore ‘Bell’s theorem’ must be fallacious.

That (and , which is pure snake oil) are taking advantage of some special ‘quantum’ property is a conclusion that depends on ‘Bell’s theorem’. Thus this conclusion also is fallacious.

#quantumcryptography #quantumcomputers

Last updated 2 years ago

Okay, it is time for me to irritate the hashtaggers who actually are very unscientific. Perhaps they agree with Neil deGrasse Tyson, that ‘objective reality’ (or some such misused phrase) is whatever the orthodox consensus says it is.

I should irritate also the snake-oil salesmen who deal in and those earning their pay on the misuse of funds called .

So let’s just have my first foray here ...

#quantumcomputing #quantumcryptography #Science

Last updated 2 years ago

Brandon Rodenburg, PhD · @punk_physicist
124 followers · 17 posts · Server qoto.org

I lead a group in technologies at a US national lab. My background is in quantum , but these days I spend my time primarily thinking about things like , , , , and .

I am also an Ambassador for Optica (formerly the Optical Society or OSA). In my role as Optica Ambassador, I engage in outreach and mentorship to students and early career professionals within the optics and photonics community.

Me as a comic:

#introduction #quantumcomputing #QuantumNetworks #quantum #optics #QuantumCommunications #QuantumSensing #quantumcryptography

Last updated 2 years ago

IT News · @itnewsbot
1661 followers · 238595 posts · Server schleuss.online
Tech News Worldwide · @TechNews
11247 followers · 97975 posts · Server aspiechattr.me
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange