Top Mathematics discussions

NishMath - #cybersecurity

@medium.com //
References: medium.com , medium.com , medium.com ...
Medium is currently hosting a series of articles that delve into the core concepts and practical applications of cryptography. These articles aim to demystify complex topics such as symmetric key cryptography, also known as secret key or private key cryptography, where a single shared key is used for both encryption and decryption. This method is highlighted for its speed and efficiency, making it suitable for bulk data encryption, though it primarily provides confidentiality and requires secure key distribution. The resources available are designed to cater to individuals with varying levels of expertise, offering accessible guides to enhance their understanding of secure communication and cryptographic systems.

The published materials offer detailed explorations of cryptographic techniques, including AES-256 encryption and decryption. AES-256, which stands for Advanced Encryption Standard with a 256-bit key size, is a symmetric encryption algorithm renowned for its high level of security. Articles break down the internal mechanics of AES-256, explaining the rounds of transformation and key expansion involved in the encryption process. These explanations are presented in both technical terms for those with a deeper understanding and in layman's terms to make the concepts accessible to a broader audience.

In addition to theoretical explanations, the Medium articles also showcase the practical applications of cryptography. One example provided is the combination of OSINT (Open Source Intelligence), web, crypto, and forensics techniques in CTF (Capture The Flag) challenges. These challenges offer hands-on experience in applying cryptographic principles to real-world scenarios, such as identifying the final resting place of historical figures through OSINT techniques. The series underscores the importance of mastering cryptography in the evolving landscape of cybersecurity, equipping readers with the knowledge to secure digital communications and protect sensitive information.

Recommended read:
References :
  • medium.com: Understanding AES-256 Encryption and Decryption: A Detailed Guide for All Levels
  • medium.com: Understanding Cryptography: The Art of Secure Communication
  • mraviteja9949.medium.com: Symmetric Key Cryptography
  • medium.com: Zero-knowledge proofs (ZKPs) let a saver prove that funds follow a rule — such as “stay locked for six monthsâ€â€Šâ€” without showing the 
  • medium.com: Article on how cryptographic hash functions actually work.
  • medium.com: Quantum-Resistant Cryptography: Preparing Your Code for Post-Quantum Era
  • medium.com: News story about Demystifying ECC, Web3 Cryptography and Their Evolving Threats
  • medium.com: Hello everyone! I’m a pen tester and today we will discuss about cryptography.
  • renanikeda.medium.com: The Diffie-Hellman Key Exchange is one of the most interesting mathematical techniques to guarantee that both parties share the same…
  • medium.com: Dissecting Cryptography: From the Eliptic Curve (ECC) to the Web3 Era

@www.microsoft.com //
Microsoft is taking a proactive approach to future cybersecurity threats by integrating post-quantum cryptography (PQC) into its Windows and Linux systems. This move is designed to protect against the potential for quantum computers to break current encryption methods like RSA, which secure online communications, banking transactions, and sensitive data. Quantum computers, leveraging quantum mechanics, can solve complex problems far faster than classical computers, posing a significant threat to existing cryptographic schemes. Microsoft's initiative aims to safeguard data from a "harvest now, decrypt later" scenario, where hackers steal encrypted data today with the intent of decrypting it once quantum technology becomes advanced enough.

Microsoft's PQC implementation includes the addition of two key algorithms: ML-KEM (Module Lattice-Based Key Encapsulation Mechanism) and ML-DSA (Module Lattice-Based Digital Signature Algorithm). ML-KEM, also known as CRYSTALS-Kyber, secures key exchanges and prevents attacks by protecting the start of secure connections. ML-DSA, formerly CRYSTALS-Dilithium, ensures data integrity and authenticity through digital signatures. These algorithms are being introduced in Windows Insider builds (Canary Build 27852+) and Linux via SymCrypt-OpenSSL v1.9.0, allowing developers and organizations to begin testing and preparing for a quantum-secure future.

This update to Windows 11 is a critical step in what Microsoft views as a major technological transition. By making quantum-resistant algorithms available through SymCrypt, the core cryptographic code library in Windows, and updating SymCrypt-OpenSSL, Microsoft is enabling the widely used OpenSSL library to leverage SymCrypt for cryptographic operations. The new algorithms, selected by the National Institute of Standards and Technology (NIST), represent a move towards replacing vulnerable cryptosystems like RSA and elliptic curves. This signifies a broader effort to bolster cybersecurity against the emerging threat of quantum computing.

Recommended read:
References :
  • www.microsoft.com: FrodoKEM: A conservative quantum-safe cryptographic algorithm
  • medium.com: Welcome to the Quantum Era, where even the strongest locks we use to protect our digital lives might soon be breakable. However, don’t…
  • arstechnica.com: Here’s how Windows 11 aims to make the world safe in the post-quantum era
  • medium.com: Quantum Computing and Encryption Breakthroughs in 2025: A New Era of Innovation
  • medium.com: Cracking RSA with Fewer Qubits: What Google’s New Quantum Factoring Estimate Means for…
  • medium.com: Google’s quantum leap just changed everything: They can now break encryption 20x faster than…
  • medium.com: On August 13, 2024, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) announced the approval of…
  • medium.com: As our world becomes increasingly interconnected, the Internet of Things (IoT) is transforming industries, homes, and entire cities. From…
  • : Post-Quantum Cryptography Coalition (PQCC) Publishes Comprehensive Roadmap for Post-Quantum Cryptography Migration
  • www.techradar.com: Breaking encryption with quantum computers may be easier than we thought

@www.first.org //
Researchers from the U.S. National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) have collaborated to develop a new security metric designed to better assess the likelihood of vulnerability exploitation. This metric aims to enhance the existing Exploit Prediction Scoring System (EPSS) and CISA's Known Exploited Vulnerabilities (KEV) catalog, providing a more refined approach to identifying vulnerabilities that are at high risk of being exploited in the wild. Peter Mell, formerly of NIST, and Jonathan Spring from CISA are credited with outlining this vulnerability exploit metric.

This new metric, detailed in a NIST White Paper titled "Likely Exploited Vulnerabilities," seeks to improve the accuracy with which vulnerabilities are prioritized for remediation. By augmenting the EPSS and KEV lists, the metric intends to provide a clearer understanding of a vulnerability's exploitability. The researchers propose this augmentation as a means to better express how likely a vulnerability is to be exploited, which can aid organizations in focusing their security efforts on the most critical threats.

Meanwhile, CISA has recently added six new vulnerabilities to its Known Exploited Vulnerabilities catalog, underscoring the importance of addressing actively exploited flaws. In a related development, Wiz Research has observed in-the-wild exploitation of CVE-2025-4427 and CVE-2025-4428, two recently disclosed vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These Ivanti EPMM vulnerabilities, which involve a chain of exploits leading to remote code execution, highlight the need for organizations to promptly apply security patches and mitigate potential risks.

Recommended read:
References :
  • Metacurity: Peter Mell from NIST and Tom Spring from CISA propose an alternative/augmentation to the Exploit Prediction Scoring System (EPSS) and Known Exploited Vulnerability (KEV) lists to better express a vulnerability's exploitability.
  • thecyberexpress.com: Researchers from the U.S. National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) have developed a new security metric to determine the likelihood that a vulnerability has been exploited. In a published this week, Peter Mell, formerly of NIST, and CISA’s Jonathan Spring outlined their vulnerability exploit metric that augments the work of the Exploit Prediction Scoring System ( ) and CISA’s Known Exploited Vulnerabilities ( ) catalog.

@crypto.ku.edu.tr //
Koç University's Cryptography, Security & Privacy Research Group is offering scholarships and internships in the field of cryptography, security, and privacy, including positions at the post-doctoral level. These opportunities are available for Ph.D. and M.Sc. students, as well as post-doctoral researchers interested in contributing to cutting-edge research. The project funding is specifically related to applied cryptography, with a focus on privacy-preserving and adversarial machine learning. This initiative aims to foster talent and innovation in these critical areas of computer science and engineering.

The research group is also offering summer internships to undergraduates and graduates to improve their research skills and plan to attend graduate school. This experience can help them decide if they want to pursue graduate education or a research career. The program is available for international students, which takes place between June 30 and August 15th. The application deadline is May 16, 2025 and the applications opened March 12, 2025.

The Koç University Summer Research Program is also open to motivated high school students. The program aims to help students experience a university environment, gather information on undergraduate areas they would like to study, and learn how to conduct academic research. Applicants must have completed Year 8. All applicants should have good academic standings and be sufficient in English Language as the medium of instruction is English.

Recommended read:
References :
  • crypto.ku.edu.tr: Post-Doctoral Researcher Position at the Cryptography, Security & Privacy Research Group
  • gsse.ku.edu.tr: Ph.D. and M.Sc. Scholarships at the Cryptography, Security & Privacy Research Group
  • research.ku.edu.tr: Summer Internships on Cryptography, Security, and Privacy
  • IACR News: Summer Internships on Cryptography, Security, and Privacy
  • IACR News: Ph.D. and M.Sc. Scholarships at the Cryptography, Security & Privacy Research Group

@medium.com //
Quantum computing is rapidly advancing, bringing both immense potential and significant cybersecurity risks. The UK’s National Cyber Security Centre (NCSC) and experts across the globe are warning of a "colossal" overhaul needed in digital defenses to prepare for the quantum era. The concern is that powerful quantum computers could render current encryption methods obsolete, breaking security protocols that protect financial transactions, medical records, military communications, and blockchain technology. This urgency is underscored by the threat of "harvest now, decrypt later" attacks, where sensitive data is collected and stored for future decryption once quantum computers become powerful enough.

Across the globe, governments and organizations are scrambling to prepare for a quantum future by adopting post-quantum cryptography (PQC). PQC involves creating new encryption algorithms resistant to attacks from both classical and quantum computers. The U.S. National Institute of Standards and Technology (NIST) has already released several algorithms believed to be secure from quantum hacking. The NCSC has issued guidance, setting clear timelines for the UK’s migration to PQC, advising organizations to complete the transition by 2035. Industry leaders are also urging the U.S. Congress to reauthorize and expand the National Quantum Initiative to support research, workforce development, and a resilient supply chain.

Oxford Ionics is one of the companies leading the way in quantum computing development. Oxford has released a multi-phase roadmap focused on achieving scalability and fault tolerance in their trapped-ion quantum computing platform. Their strategy includes the 'Foundation' phase, which involves deploying QPUs with 16-64 qubits with 99.99% fidelity, already operational. The second phase introduces chips with 256+ qubits and error rates as low as 10-8 via quantum error correction (QEC). The goal is to scale to over 10,000 physical qubits per chip, supporting 700+ logical qubits with minimal infrastructure change. There are also multiple bills introduced in the U.S. Congress and the state of Texas to foster the advancement of quantum technology.

Recommended read:
References :
  • medium.com: Post‑Quantum Cryptography: Safeguarding the Digital World Beyond Quantum Supremacy
  • Peter Bendor-Samuel: The Realistic Path To Quantum Computing: Separating Hype From Reality
  • www.techradar.com: Safeguarding data for the quantum era

Siôn Geschwindt@The Next Web //
References: The Next Web , medium.com ,
Quantum computing is rapidly advancing, presenting both opportunities and challenges. Researchers at Toshiba Europe have achieved a significant milestone by transmitting quantum-encrypted messages over a record distance of 254km using standard fiber optic cables. This breakthrough, facilitated by quantum key distribution (QKD) cryptography, marks the first instance of coherent quantum communication via existing telecom infrastructure. QKD leverages the principles of quantum mechanics to securely share encryption keys, making eavesdropping virtually impossible, as any attempt to intercept the message would immediately alert both parties involved.

This advance addresses growing concerns among European IT professionals, with 67% fearing that quantum computing could compromise current encryption standards. Unlike classical computers, which would take an impractical amount of time to break modern encryption, quantum computers can exploit phenomena like superposition and entanglement to potentially crack even the most secure classical encryptions within minutes. This has prompted global governments and organizations to accelerate the development of robust cryptographic algorithms capable of withstanding quantum attacks.

Efforts are underway to build quantum-secure communication infrastructure. Heriot-Watt University recently inaugurated a £2.5 million Optical Ground Station (HOGS) to promote satellite-based quantum-secure communication. In July 2024, Toshiba Europe, GÉANT, PSNC, and Anglia Ruskin University demonstrated cryogenics-free QKD over a 254 km fiber link, using standard telecom racks and room temperature detectors. Initiatives such as Europe’s EuroQCI and ESA’s Eagle-1 satellite further underscore the commitment to developing and deploying quantum-resistant technologies, mitigating the silent threat that quantum computing poses to cybersecurity.

Recommended read:
References :
  • The Next Web: Researchers at Toshiba Europe have used quantum key distribution (QKD) cryptography to send messages a record 254km using a traditional fiber optic cable network.
  • medium.com: Rethinking Cybersecurity in the Face of Emerging Threats
  • medium.com: Quantum Security: The Silent Threat Coming for Your Business

@medium.com //
References: medium.com , medium.com , medium.com ...
The convergence of quantum computing and cryptography is rapidly evolving, presenting both opportunities and threats to the digital landscape. EntropiQ, a startup specializing in quantum solutions, has launched Quantum Entropy as a Service (QEaaS), offering on-demand, crypto-agile quantum entropy distribution. This service is designed for critical infrastructure and integrates with existing systems via API, aligning with NIST SP 800-90 guidelines. To bolster deployment and operational validation, EntropiQ has partnered with Equinix and GIS QSP, demonstrating its platform in secure, scalable environments across various locations, including Silicon Valley and Washington, D.C.

The imminent threat posed by quantum computers to current cryptographic systems is driving the need for innovative security measures. Algorithms like RSA and ECC, which underpin much of today's digital security, are vulnerable to quantum algorithms like Shor's, which can efficiently factor large integers. This has prompted significant research into post-quantum cryptography (PQC), with solutions like SPQR-AC emerging to leverage hybrid cryptographic frameworks combining lattice-based and code-based primitives. The UK’s National Cyber Security Centre (NCSC) has issued guidance, urging organizations to plan their transition to quantum-safe cryptography by 2028 and complete migration of high-criticality systems by 2031.

Artificial intelligence (AI) is increasingly being integrated into quantum cryptography to enhance security and build resilience against emerging quantum threats. This fusion of AI and quantum-resistant encryption is aimed at protecting data in the post-quantum era, as AI can aid in developing more robust and adaptive cryptographic solutions. The NCSC's recommendations emphasize the importance of understanding the risks and taking proactive steps to secure digital infrastructure. Furthermore, the concept of "crypto agility" is gaining traction, encouraging businesses to develop the capacity to rapidly adapt encryption standards as quantum computers advance, ensuring continuous protection against evolving threats.

Recommended read:
References :
  • medium.com: AI Meets Quantum Cryptography: Securing Our Digital Future
  • medium.com: How Quantum Computing is a Threat to Cryptography
  • medium.com: Quantum Security: The Silent Threat Coming for Your Business
  • medium.com: Blog post about Post‑Quantum Cryptography.
  • The Next Web: UK’s digital defences need ‘colossal’ overhaul for quantum era

@thequantuminsider.com //
Heriot-Watt University has launched a £2.5 million Optical Ground Station (HOGS) at its Research Park in Edinburgh, marking a significant advancement in satellite-based quantum-secure communication. The facility, developed under the UK Quantum Communications Hub, features a 70-cm precision telescope equipped with adaptive optics and quantum detectors. This investment positions Heriot-Watt at the forefront of quantum communication research and development.

The HOGS facility will enable quantum key distribution (QKD) experiments with satellites, facilitating secure communication channels resistant to future decryption by quantum computers. The station is equipped to monitor space debris and test ultra-high-speed optical communications for next-generation networks. This is the UK’s first major infrastructure investment in free-space quantum key distribution research, as it will serve as a testbed for space-to-ground optical links that use quantum-secure protocols to exchange encryption keys via single photons.

The project marks a major step in the UK’s efforts to build a quantum-secure internet, offering a unique testbed for industry and academia. Connected via dark fibre to Heriot-Watt’s quantum labs, HOGS enables real-time simulation and validation of urban to intercontinental optical quantum networks. HOGS is part of Heriot-Watt’s leadership in the new Integrated Quantum Networks (IQN) Hub, positioning the university as a central player in the development of quantum-secure communications. The facility aims to grow Scotland’s space economy and future workforce, partnering with universities, national laboratories, and businesses, including STEM programs for students.

Recommended read:
References :
  • quantumcomputingreport.com: Heriot-Watt University Opens £2.5M ($3.3M USD) Quantum Optical Ground Station to Advance Secure Satellite Communications
  • : Heriot-Watt University Opens £2.5M ($3.3M USD) Quantum Optical Ground Station to Advance Secure Satellite Communications
  • thequantuminsider.com: Heriot-Watt Opens $3M Quantum Satellite Research Facility, UK’s First Optical QKD Station
  • thequantuminsider.com: Congress will ultimately decide how much quantum funding is preserved or expanded. But the White House’s proposal seems to be signaling that quantum matters, but it must compete with a number of other priorities.