The Quantum Dragon isn't the newsletter you need right now, but it's the newsletter you deserve.

https://bsiegelwax.substack.com/p/what-does-mobile-qkd-look-like

#QuantumKeyDistribution #QuantumCryptography #QuantumComputing #HybridQuantumSystems

This article proves that quantum public‑key encryption from one‑way functions is impossible when using classical public keys and quantum ciphertexts.
https://hackernoon.com/blackbox-separation-for-quantum-pke-from-owf-with-classical-public-keys #quantumcryptography
Black‑Box Separation for Quantum PKE from OWF with Classical Public Keys | HackerNoon

This article proves that quantum public‑key encryption from one‑way functions is impossible when using classical public keys and quantum ciphertexts.

HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator #quantumcryptography
Quantum Photons Deliver the Ultimate Random Number Generator | HackerNoon

HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices

Verifying quantum randomness in a device-independent framework using tomography, CHSH inequality, and entanglement for safe cryptography. https://hackernoon.com/quantum-entanglement-unlocks-unbreakable-randomness-for-next-gen-cryptography #quantumcryptography
Quantum Entanglement Unlocks Unbreakable Randomness for Next-Gen Cryptography | HackerNoon

Verifying quantum randomness in a device-independent framework using tomography, CHSH inequality, and entanglement for safe cryptography.

In this article mentioned that NSA has broad quantum-computing capabilities for mass decryption
https://medium.com/@Forensic-Archive/42-000-intercepted-calls-the-nsa-files-putin-doesnt-know-about-b6e48b547533

Most of article describes that ruzzian military used mostly some obsolete soviet radios and Chinise clear-text radios and other no-encryption channels.

But somewhere deep in article mentioned these quantum computing capabilities suitable for mass decryption.

How much these claims close to reality?

#privacy #quantumCryptography #encryption #e2ee

42,000 Intercepted Calls — The NSA Files Putin Doesn’t Know About

Signal intelligence operations tracking Russian military communications and command structure

Medium
Explore the HPPK DS scheme: compact keys, strong entropy, and resilience against signature forgery and key recovery attacks. https://hackernoon.com/how-hppk-ds-balances-security-and-efficiency-across-nist-levels #quantumcryptography
How HPPK DS Balances Security and Efficiency Across NIST Levels | HackerNoon

Explore the HPPK DS scheme: compact keys, strong entropy, and resilience against signature forgery and key recovery attacks.

Explore the HPPK digital signature scheme—quantum-ready, non-commutative encryption with secure signing and verification. https://hackernoon.com/a-beginners-guide-to-the-hppk-digital-signature-scheme #quantumcryptography
A Beginner’s Guide to the HPPK Digital Signature Scheme | HackerNoon

Explore the HPPK digital signature scheme—quantum-ready, non-commutative encryption with secure signing and verification.

From DPPK to HPPK, explore how polynomial public key cryptography evolved into a homomorphic scheme shaping future digital security. https://hackernoon.com/what-you-should-know-about-the-next-generation-of-encryption #quantumcryptography
What You Should Know About the Next Generation of Encryption | HackerNoon

From DPPK to HPPK, explore how polynomial public key cryptography evolved into a homomorphic scheme shaping future digital security.

A quantum-safe digital signature scheme built on homomorphic polynomial public keys and Barrett reduction, securing cryptography beyond quantum threats. https://hackernoon.com/the-barrett-algorithm-reimagined-for-post-quantum-signatures #quantumcryptography
The Barrett Algorithm Reimagined for Post-Quantum Signatures | HackerNoon

A quantum-safe digital signature scheme built on homomorphic polynomial public keys and Barrett reduction, securing cryptography beyond quantum threats.