#Bitcoin y #PQC #Post #Quantim #Cryptography :

"Evita reutilizar direcciones de #bitcoin". Explica que "en las direcciones modernas ( #P2PKH o #SegWit), la #clave #pública no se revela hasta que gastas los fondos "

"Si usas una #dirección #nueva para cada cobro, tu candado permanece oculto a ojos de un #atacante #cuántico hasta el momento de la #transacción".

https://www.expansion.com/mercados/criptomonedas/2026/02/12/698c6dca468aeb0f6a8b4574.html

¿La computación cuántica es una amenaza real para bitcoin?

"El riesgo es real", y dado que el mercado cotiza expectativas más que realidades, algunos inversores han incluido la computación cuántica como factor bajista...

EXPANSION
#Bitcoin y #PQC #Post #Quantim #Cryptography : "Evita reutilizar direcciones de #bitcoin". Explica que "en las direcciones modernas ( #P2PKH o #SegWit), la #clave #pública no se revela hasta que gastas los fondos " www.expansion.com/mercados/cri...

¿La computación cuántica es un...
¿La computación cuántica es una amenaza real para bitcoin?

"El riesgo es real", y dado que el mercado cotiza expectativas más que realidades, algunos inversores han incluido la computación cuántica como factor bajista...

EXPANSION

#cryptography #diffiehellman
Today @docta_gervais asked me to look at his article on encryption, and all of a sudden I was like: "Why the hell do we still use Diffie-Hellman?"

Alice
- creates a new keypair (like DH)
- signs her public key with her long-term public key (like DH)
- sends her public key to Bob (like DH)

Bob
- encrypts a random symmetric key with Alice's key (NEW)
- sends it to Alice (like DH)

Alice
- decrypts the symmetric key and uses it for communication (NEW)

Quantum computing leverages qubits, superposition, and entanglement to revolutionize drug discovery, AI, cryptography, and complex data processing globally.
#QuantumComputing #Qubits #Superposition #Entanglement #ArtificialIntelligence #DrugDiscovery #Cryptography #FutureTechnology #DeepTech #BioResire

Security (b)log: Receipt required
Receipts with cryptographic information on them scream for an explanation.

#cryptography #signing

News from the big bad world: telco client data stolen | return of the Nigerian prince | Belgians get guardian angel | more

https://securityblogpatrick-english.blogspot.com/

Yeah, end to end encryption. That will help... Anyone seen this before? Just popped up in a conversation on #Facebook.

Translation: "An unknown device has been detected on your account. We recommend that you compare your keys with your connections to secure the chat".

#CRYPTOGRAPHY DOES NOT EXIST IN A VACUUM.

Where can I find the French government's recommendations for cryptographic algorithms? Which algorithms to use, which key sizes, parameters and so on, and until when they are recommended to be used. Much like the U.S. NIST SP 800-175 or the German BSI TR-02102. Which institution is publishing these recommendations?

#InfoSec #France #AppliedCryptography #cryptography

https://www.bsi.bund.de/dok/1192230

BSI empfiehlt Ende klassischer asymmetrischer Verschlüsselungsverfahren

In der jährlichen Aktualisierung seiner kryptographischen Empfehlungen (TR-02102) spricht sich das BSI erstmals für ein Ablaufdatum klassischer asymmetrischer Verschlüsselungsverfahren aus.

Bundesamt für Sicherheit in der Informationstechnik

Curated Cryptology Compendium

A massive curated catalog of foundational, historical, and technical cryptology resources with 706 free downloadable PDFs covering cryptography, attacks, protocols, and standards.

https://cryptosystemsjournal.com/curated-cryptology-compendium.html

#cryptography

I started to get on a kick looking at OPRF(RFC9497) and HashToCurve(RFC9380) after reading the OPAQUE paper.

I get the OPRF side of resulting with a hash if you are going to use that further on for other usages like in the OPAQUE paper, but wondering about other ways of using the integers produced by the flow before the final hashing. If anyone in #cryptography had other interesting papers they could point me to I'd love to see them.

“Our servers are secure” is only half the truth. ☁️🚫 When you move to the cloud, you're not just trusting one server, but a long chain of providers, employees, and errors.

In quantum computing, encryption is the only thing that truly remains yours. That's why we created Cipher Zenith: advanced post-quantum protection for what matters most. 🛡️🔐

Control your keys; you are the guardian of your security.

#PostQuantum #Cryptography #Cybersecurity #PQC #Privacy #CipherZenith #InfoSec #OpenSource