-
Navigating the Future of Secure Code Signing and Cryptography
In today’s interconnected world, the integrity of software has never been more critical. With the increasing reliance on open-source components and the complexities introduced by containerized applications, ensuring trust in software has become a cornerstone of modern security practices. I […] The post Navigating the Future of Secure Code Signing and Cryptography appeared first on…
-
CISO Challenges for 2025: Overcoming Cybersecurity Complexities
As organizations recognize the immense value and criticality of your data and systems, cybersecurity has become intrinsically linked to business strategy. Chief Information Security Officers (CISOs) are increasingly expected to play a central role in shaping business decisions, assessing and mitigating risks, and ensuring that security strategies align with overall business objectives. This requires a…
-
Simson Garfinkel on Spooky Cryptographic Action at a Distance
Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an…
-
Practical Advice for PQC Migration for TLS 1.3
Numerous blogs and articles are urging security professionals to start migrating to quantum-resistant algorithms immediately. This urgency was heightened on August 13, 2024, when NIST finalized the FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) standards. In this article, I present a simplified example of a client establishing a TLS 1.3 connection to…
-
What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks
As quantum computing leapfrogs at great speed, the spotlight is now on post-quantum cryptography (PQC). Recently, NIST released the first three PQC encryption algorithm standards, urging organizations to test the new algorithms and prepare their cryptographic infrastructures for the inevitable shift to quantum-resistant methods. This push for PQC readiness is driven by a growing concern…
-
Friends don’t let friends reuse nonces
By Joe Doyle If you’ve encountered cryptography software, you’ve probably heard the advice to never use a nonce twice—in fact, that’s where the word nonce (number used once) comes from. Depending on the cryptography involved, a reused nonce can reveal encrypted messages, or even leak your secret key! But common knowledge may not cover every…
-
Microsoft Is Adding New Cryptography Algorithms
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article: The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST). The…