`WARNING: connection is not using a post-quantum key exchange algorithm.`

Well that's a new one.

#ssh #OpenSSH #crypto #ActualCryptoNotStupidSpeculation #QuantumCryptography

He hates the "AI bubble," plays chess, and procrastinates until the last minute. Meet the undergrad decoding Zero-Knowledge proofs. https://hackernoon.com/meet-the-writer-yash-college-undergrad #quantumcryptography
Meet the Writer: Yash, College Undergrad | HackerNoon

He hates the "AI bubble," plays chess, and procrastinates until the last minute. Meet the undergrad decoding Zero-Knowledge proofs.

South Korea enters the era of physical AI infrastructure, with Hana Securities' Kim Hong-sik highlighting rapid revaluation of wireless equipment stocks amid rising focus on 5G standalone and quantum cryptography technologies.
#YonhapInfomax #PhysicalAIInfrastructure #HanaSecurities #5GStandalone #QuantumCryptography #WirelessEquipmentStocks #Economics #FinancialMarkets #Banking #Securities #Bonds #StockMarket
https://en.infomaxai.com/news/articleView.html?idxno=102965
[Financial Awards] 'Era of Physical AI Infrastructure—Wireless Equipment Stocks Poised for Revaluation' SW Best Analyst Kim Hong-sik of Hana Securities

South Korea enters the era of physical AI infrastructure, with Hana Securities' Kim Hong-sik highlighting rapid revaluation of wireless equipment stocks amid rising focus on 5G standalone and quantum cryptography technologies.

Yonhap Infomax

The Quantum Dragon isn't the newsletter you need right now, but it's the newsletter you deserve.

https://bsiegelwax.substack.com/p/what-does-mobile-qkd-look-like

#QuantumKeyDistribution #QuantumCryptography #QuantumComputing #HybridQuantumSystems

This article proves that quantum public‑key encryption from one‑way functions is impossible when using classical public keys and quantum ciphertexts.
https://hackernoon.com/blackbox-separation-for-quantum-pke-from-owf-with-classical-public-keys #quantumcryptography
Black‑Box Separation for Quantum PKE from OWF with Classical Public Keys | HackerNoon

This article proves that quantum public‑key encryption from one‑way functions is impossible when using classical public keys and quantum ciphertexts.

HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator #quantumcryptography
Quantum Photons Deliver the Ultimate Random Number Generator | HackerNoon

HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices

Verifying quantum randomness in a device-independent framework using tomography, CHSH inequality, and entanglement for safe cryptography. https://hackernoon.com/quantum-entanglement-unlocks-unbreakable-randomness-for-next-gen-cryptography #quantumcryptography
Quantum Entanglement Unlocks Unbreakable Randomness for Next-Gen Cryptography | HackerNoon

Verifying quantum randomness in a device-independent framework using tomography, CHSH inequality, and entanglement for safe cryptography.

In this article mentioned that NSA has broad quantum-computing capabilities for mass decryption
https://medium.com/@Forensic-Archive/42-000-intercepted-calls-the-nsa-files-putin-doesnt-know-about-b6e48b547533

Most of article describes that ruzzian military used mostly some obsolete soviet radios and Chinise clear-text radios and other no-encryption channels.

But somewhere deep in article mentioned these quantum computing capabilities suitable for mass decryption.

How much these claims close to reality?

#privacy #quantumCryptography #encryption #e2ee

42,000 Intercepted Calls — The NSA Files Putin Doesn’t Know About

Signal intelligence operations tracking Russian military communications and command structure

Medium
Explore the HPPK DS scheme: compact keys, strong entropy, and resilience against signature forgery and key recovery attacks. https://hackernoon.com/how-hppk-ds-balances-security-and-efficiency-across-nist-levels #quantumcryptography
How HPPK DS Balances Security and Efficiency Across NIST Levels | HackerNoon

Explore the HPPK DS scheme: compact keys, strong entropy, and resilience against signature forgery and key recovery attacks.