The security of many current cryptography systems is based on factoring, which quantum computers will do well. Lattice cryptography avoids this vulnerability.
Here's how it works:
Steve Weis
@sweis
Security Engineer at Databricks. Interested in cryptography, information security, & privacy engineering.
Steve Weis’s Tweets
NEW EPISODE! THREEEEEMAAAAAAAA
We recorded this almost two weeks ago, yay it's out!
With special guests
2
13
28
The NSA found and disclosed a Windows CryptoAPI bug (CVE-2022-34689) that was patched last August.
A cache was using MD5 to index entries, which allowed for collisions.
1
10
NYT Wirecutter article about PassKeys:
2
3
The op-ed also claims that "criminals" are storing encrypted data today with the hope of decrypting it in 7+ years for some gain.
Practically, this is only relevant to TLS handshakes. There is no evidence that anyone outside the IC would store network traffic indefinitely.
2
7
Show this thread
The current factoring record for Shor's algorithm (which cheats by knowing the answer a priori) is 5 bits.
In the last 20 years, this has improved by 1 bit.
Hidary's article implies that in the next 7 years, this will jump to at least 1024 bits.
1
7
Show this thread
To do so, QCs would need to improve the number of qubits by 10x every year for the next 7 years while becoming 100 times more reliable:
sam-jaques.appspot.com/quantum_landsc
1
4
Show this thread
I think CEO really exaggerates the risk of quantum computers in this op-ed.
He repeats a claim that it will be feasible to decrypt RSA by 2030. I don't know any cryptographers who would agree.
3
3
17
Show this thread
Cuckoo hashing hashes elements into 2 random slots, eventually allocating each element to 1 slot. If the allocation fails, we can stash the overflows. Our IPL paper with Brice Minaud enhances a prior analysis & derives negligible failure probability bounds useful in cryptography!
1
3
22
3
10
We ( and I) are happy to show you zkalc! A crypto benchmarking website created to instantly answer questions like "How quickly can I compute a BLS12-381 MSM of size 32156 on an M1 pro?"! (1/N)
crypto.ethereum.org/blog/zkalc
4
46
143
Show this thread
Three computer scientists have discovered a fast algorithm for finding shortest paths between points on graphs with negative weights, a long-standing optimization problem. reports:
1
53
136
The virtual three-day conference starts today!
Tune in to hear from thought leaders on #quantum innovation in Canada, including some familiar faces from IQC, as they explore quantum processors, interfaces, and materials.
2023.quantumdays.ca/en/program/
#QuantumDays
read image description
ALT
10
18
The schedule for is now live:
satml.org/schedule/
There are still a handful of seats available to attend the event on Feb 8-10
7
11
Hot update to Boneh & Shoup’s “Graduate Course in Applied Crypto” just dropped: toc.cryptobook.us
2
6
40
Amazon released a "Cryptographic Computing for Clean Rooms" (c3r) library for a new preview clean room feature.
Code: github.com/aws/c3r
Docs: docs.aws.amazon.com/clean-rooms/la
1
5
Zero knowledge proof online course starting Spring 2023 and taught by Shafi Goldwasser, , , , & :
1
13
57
Croatia summer school on real-world crypto and privacy continues in 2023 on another location: summerschool-croatia.cs.ru.nl/2023/index.html
This year we have for the first time call for tutorials, deadline is Jan. 15
summerschool-croatia.cs.ru.nl/2023/call-for-
15
35
Did you ever hear about these fancy-shmancy elliptic curves with “pairings” or “bilinear maps”? Did you know *S*NARKs would not be possible without them? Or that jail time can be conducive to great mathematical results?
If so, this blog post is for you: alinush.github.io/2022/12/31/pai
14
65
223
Show this thread
Quantum supremacy is not happening soon with the intentionally chosen QC-friendly problem that Google picked:
1
1
5
We ( and I) took a deep dive on Threema, a Swiss-made secure messaging app. We found 6 new cryptographic vulnerabilities. Full paper at breakingthe3ma.app; mini-thread follows. #threema
6
153
352
Show this thread
Official ACM CCS 2023 Call for Papers is out: ccs2023a.hotcrp.com
The first cycle's submission deadline is Jan 19, 2023!
18
18
NEW EPISODE!
and gab about Tailscale's new Tailnet Lock, the Okta breach, what the fuck CISOs are for anyway, Rust in Android and Chrome, passkeys support, and of course, SBF.
13
27
Been working on a tool for visualizing neural networks using python code. Here is a visualization of a convolutional neural network. It is built on top of the library.
0:20
70.5K views
28
338
2,315
Show this thread
"What Do the Theory of Computing and the Movies Have in Common?"
Alvy Ray Smith (co-founder of Pixar)
Tues., Feb. 21, 2023
6–7:30 pm PT
Location: David Brower Center, Berkeley, CA
simons.berkeley.edu/events/theoret
Join us for this talk in our Theoretically Speaking lecture series!
3
6
I will be looking for at least 1 PhD student (prob 2) in provable crypto next September. (Postquantum, real world, ...).
It can also be for a postdoc.
It's in Palaiseau (Paris suburbs), in a nice, friendly team. (There are several offices with plushes!)
GIF
read image description
ALT
3
48
63
Google open sourced a privacy-enhancing image blurring library and improvements to their fully homomorphic encryption transpiler:
16
48
I am impressed how well Passkeys (FIDO2 multi-device support) work. I think it will be a security & usability gain over the status quo.
Support is baked into Chrome and iOS now:
blog.chromium.org/2022/12/introd
developer.apple.com/passkeys/
Here's a demo site: passkeys.io
3
13
46
Nice to see callouts for cryptographers Sarah Meiklejohn and in ’s “Tracers in the Dark”.
1
3
22
I can’t even put it in a tweet.
infosec exchange / sweis
6
14
59
Show this thread
I tried to put my mastodon link in my profile and Twitter calls it malware.
3
24
53
Show this thread
Time to up your secure hash algorithm game. NIST is phasing out the use of SHA-1, one of the first widely used methods of securing electronic information.
See what comes next: nist.gov/news-events/ne
read image description
ALT
1
72
88
WTF. Can’t get more racist than this administrator. Who is this person? #AntiAsianHate #StopAsianHate
0:18
1.1M views
420
1,522
2,886
Show this thread
IARPA gonna IARPA
Quote Tweet
The #IntelligenceCommunity often requires the ability to identify or recognize individuals under challenging scenarios -such as at long-range, through atmospheric turbulence, or from elevated and/or aerial sensor platforms...(1 of 2)
Show this thread
1
















