-
Infosec Global & Cryptomathic Partner for Cryptographic Asset Security
The new partnership aims to create a seamless process for companies to discover, inventory, and manage cryptographic assets. The new partnership aims to create a seamless process for companies to discover, inventory, and manage cryptographic assets. Go to Source
-
New Outlook’s security issues: Businesses should avoid switching!
Microsoft’s “new Outlook” (introduced in 2022) has been promoted as an upgrade, but its implementation introduces severe data protection concerns – so severe that it’s fair to say it’s a downgrade rather than an upgrade. Regardless, Microsoft increasingly pushes personal and business Outlook users to switch to the new Outlook. But IT admins should be…
-
Free secure desktop email client for Linux, Windows and macOS
The Tuta desktop email client for Linux, Windows, and macOS is an amazing tools that offers many benefits compared to accessing Tuta Mail and Tuta Calendar via web browser. Check here how our end-to-end encrypted, open source desktop clients for Linux, Windows and macOS make your experience with Tuta even more secure, and how the…
-
How to prove false statements? (Part 1)
Trigger warning: incredibly wonky theoretical cryptography post (written by a non-theorist)! Also, this will be in two parts. I plan to be back with some more thoughts on practical stuff, like cloud backup, in the near future. If you’ve read my blog over the years, you should understand that I have basically two obsessions. One…
-
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool
ePrint Report: Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool Jianing Zhang, Haoyang Wang Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al. in 2014, there have been no substantial advancements in the key recovery…
-
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis
ePrint Report: Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek Physical side-channel analysis (SCA) operates on the foundational assumption of access to known plaintext or ciphertext. However, this assumption can be easily invalidated in various scenarios, ranging from common encryption modes like Cipher Block Chaining…
-
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee
ePrint Report: TallyGuard: Privacy Preserving Tallied-as-cast Guarantee Athish Pranav Dharmalingam, Sai Venkata Krishnan, KC Sivaramakrishnan, N.S. Narayanaswamy This paper presents a novel approach to verifiable vote tallying using additive homomorphism, which can be appended to existing voting systems without modifying the underlying infrastructure. Existing End-to-End Verifiable (E2E-V) systems like Belenios and ElectionGuard rely on distributed…
-
Cycles and Cuts in Supersingular L-Isogeny Graphs
ePrint Report: Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan Supersingular elliptic curve isogeny graphs underlie isogeny-based cryptography. For isogenies of a single prime degree $ell$, their structure has been investigated graph-theoretically. We generalise the notion of $ell$-isogeny graphs to $L$-isogeny graphs (studied…
-
Error floor prediction with Markov models for QC-MDPC codes
ePrint Report: Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not well-understood.…
-
Shadowfax: Combiners for Deniability
ePrint Report: Shadowfax: Combiners for Deniability Phillip Gajland, Vincent Hwang, Jonas Janneck As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining pre-quantum and post-quantum assumptions. However, this shift often introduces trade-offs in terms of efficiency, compactness, and in some cases, even security. One such example is deniability, which enables users, such as…