Encrypting Files with Passkeys and age

Encrypting files with passkeys, using the WebAuthn prf extension and the TypeScript age implementation.

This isn't any crazy cryptography algorithm (AES, DES, RC4), it was done with paper and pencil. If you like puzzles, have a go at it. If not, feel free to share it.

Kudos to who solves it first.

#crypotogram #puzzle #cryptograpy #amateurCryptography

Learning how to create #ssh keys from my #gpg #pgp keys so that I can use #age for #sops #sops-nix so I don't have to enter my email password manually if I even were to nuke my system

#NixOS #homemanager #cryptograpy

Great explanation of quantum proof crypto

https://youtu.be/6qD-T1gjtKw

#cryptograpy #qpc

Understanding and Explaining Post-Quantum Crypto with Cartoons

YouTube
EU bets on quantum tech to boost its cybersecurity needs

The EU has launched the Nostradamus project, aiming to enable high-level cybersecurity with quantum tech. Led by Deutsche Telekom, Nostradamus is an industry consortium, including ...

The Next Web
"Defending against Adversarial Audio via Diffusion Model" — Using diffusion models to purify/remove adversarial audio which can cause abnormal behaviour in acoustic systems.

Paper: https://arxiv.org/abs/2303.01507
Code: https://github.com/cychomatica/AudioPure

#AI #NewPaper #DeepLearning #MachineLearning #Sound #Security #Audio #Cryptograpy

<<Find this useful? Please boost so that others can benefit too 🙂>>
The architecture of the whole a…
Defending against Adversarial Audio via Diffusion Model

Deep learning models have been widely used in commercial acoustic systems in recent years. However, adversarial audio examples can cause abnormal behaviors for those acoustic systems, while being hard for humans to perceive. Various methods, such as transformation-based defenses and adversarial training, have been proposed to protect acoustic systems from adversarial attacks, but they are less effective against adaptive attacks. Furthermore, directly applying the methods from the image domain can lead to suboptimal results because of the unique properties of audio data. In this paper, we propose an adversarial purification-based defense pipeline, AudioPure, for acoustic systems via off-the-shelf diffusion models. Taking advantage of the strong generation ability of diffusion models, AudioPure first adds a small amount of noise to the adversarial audio and then runs the reverse sampling step to purify the noisy audio and recover clean audio. AudioPure is a plug-and-play method that can be directly applied to any pretrained classifier without any fine-tuning or re-training. We conduct extensive experiments on speech command recognition task to evaluate the robustness of AudioPure. Our method is effective against diverse adversarial attacks (e.g. $\mathcal{L}_2$ or $\mathcal{L}_\infty$-norm). It outperforms the existing methods under both strong adaptive white-box and black-box attacks bounded by $\mathcal{L}_2$ or $\mathcal{L}_\infty$-norm (up to +20\% in robust accuracy). Besides, we also evaluate the certified robustness for perturbations bounded by $\mathcal{L}_2$-norm via randomized smoothing. Our pipeline achieves a higher certified accuracy than baselines.

arXiv.org

Does anyone have a recommended 512-bit cipher? Preferably stream, yet I can tolerate block.

I do know how to type Blake2b-512(seed, counter). I prefer not to.

#cryptograpy #encryption

White House Begins to Push Federal Post-Quantum Cryptography Migration

The Office of Management and Budget released new guidance to begin the governmentwide effort to safeguard digital infrastructure from quantum attacks.

Nextgov.com