Top Mathematics discussions

NishMath - #encryption

@medium.com //
References: medium.com , medium.com , medium.com ...
Medium is currently hosting a series of articles that delve into the core concepts and practical applications of cryptography. These articles aim to demystify complex topics such as symmetric key cryptography, also known as secret key or private key cryptography, where a single shared key is used for both encryption and decryption. This method is highlighted for its speed and efficiency, making it suitable for bulk data encryption, though it primarily provides confidentiality and requires secure key distribution. The resources available are designed to cater to individuals with varying levels of expertise, offering accessible guides to enhance their understanding of secure communication and cryptographic systems.

The published materials offer detailed explorations of cryptographic techniques, including AES-256 encryption and decryption. AES-256, which stands for Advanced Encryption Standard with a 256-bit key size, is a symmetric encryption algorithm renowned for its high level of security. Articles break down the internal mechanics of AES-256, explaining the rounds of transformation and key expansion involved in the encryption process. These explanations are presented in both technical terms for those with a deeper understanding and in layman's terms to make the concepts accessible to a broader audience.

In addition to theoretical explanations, the Medium articles also showcase the practical applications of cryptography. One example provided is the combination of OSINT (Open Source Intelligence), web, crypto, and forensics techniques in CTF (Capture The Flag) challenges. These challenges offer hands-on experience in applying cryptographic principles to real-world scenarios, such as identifying the final resting place of historical figures through OSINT techniques. The series underscores the importance of mastering cryptography in the evolving landscape of cybersecurity, equipping readers with the knowledge to secure digital communications and protect sensitive information.

Recommended read:
References :
  • medium.com: Understanding AES-256 Encryption and Decryption: A Detailed Guide for All Levels
  • medium.com: Understanding Cryptography: The Art of Secure Communication
  • mraviteja9949.medium.com: Symmetric Key Cryptography
  • medium.com: Zero-knowledge proofs (ZKPs) let a saver prove that funds follow a rule — such as “stay locked for six monthsâ€â€Šâ€” without showing the 
  • medium.com: Article on how cryptographic hash functions actually work.
  • medium.com: Quantum-Resistant Cryptography: Preparing Your Code for Post-Quantum Era
  • medium.com: News story about Demystifying ECC, Web3 Cryptography and Their Evolving Threats
  • medium.com: Hello everyone! I’m a pen tester and today we will discuss about cryptography.
  • renanikeda.medium.com: The Diffie-Hellman Key Exchange is one of the most interesting mathematical techniques to guarantee that both parties share the same…

@www.iansresearch.com //
The increasing capabilities of quantum computers are posing a significant threat to current encryption methods, potentially jeopardizing the security of digital assets and the Internet of Things. Researchers at Google Quantum AI are urging software developers and encryption experts to accelerate the implementation of next-generation cryptography, anticipating that quantum computers will soon be able to break widely used encryption standards like RSA. This urgency is fueled by new estimates suggesting that breaking RSA encryption may be far easier than previously believed, with a quantum computer containing approximately 1 million qubits potentially capable of cracking it. Experts recommend that vulnerable systems should be deprecated after 2030 and disallowed after 2035.

Last week, Craig Gidney from Google Quantum AI published research that significantly lowers the estimated quantum resources needed to break RSA-2048. Where previous estimates projected that cracking RSA-2048 would require around 20 million qubits and 8 hours of computation, the new analysis reveals that it could be done in under a week using fewer than 1 million noisy qubits. This more than 95% reduction in hardware requirements is a seismic shift in the projected timeline for "Q-Day," the hypothetical moment when quantum computers can break modern encryption.

RSA encryption, used in secure web browsing, email encryption, VPNs, and blockchain systems, relies on the difficulty of factoring large numbers into their prime components. Quantum computers, leveraging Shor's algorithm, can exponentially accelerate this process. Recent innovations, including Approximate Residue Arithmetic, Magic State Cultivation, Optimized Period Finding with Ekerå-Håstad Algorithms, and Yoked Surface Codes & Sparse Lookups, have collectively reduced the physical qubit requirement to under 1 million and allow the algorithm to complete in less than 7 days.

Recommended read:
References :
  • medium.com: Cracking RSA with Fewer Qubits: What Google’s New Quantum Factoring Estimate Means for…
  • Security Latest: See How Much Faster a Quantum Computer Will Crack Encryption
  • www.techradar.com: Breaking encryption with quantum computers may be easier than we thought
  • Tenable Blog: Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
  • quantumcomputingreport.com: Carahsoft and QuSecure Partner to Expand Public Sector Access to Post-Quantum Cybersecurity Solutions
  • www.quantamagazine.org: New Quantum Algorithm Factors Numbers With One Qubit
  • Quanta Magazine: New Quantum Algorithm Factors Numbers With One Qubit
  • quantumcomputingreport.com: Alice & Bob has integrated NVIDIA’s CUDA-Q quantum development platform into its open-source Dynamiqs simulation library.
  • quantumcomputingreport.com: Commvault has expanded its post-quantum cryptography (PQC) framework by adding support for the Hamming Quasi-Cyclic (HQC) algorithm, recently selected by the National Institute of Standards and Technology (NIST) as a backup key encapsulation mechanism (KEM) standard alongside ML-KEM (CRYSTALS-Kyber).

@quantumcomputingreport.com //
References: medium.com , medium.com , medium.com ...
The rapid advancement of quantum computing poses a significant threat to current encryption methods, particularly RSA, which secures much of today's internet communication. Google's recent breakthroughs have redefined the landscape of cryptographic security, with researchers like Craig Gidney significantly lowering the estimated quantum resources needed to break RSA-2048. A new study indicates that RSA-2048 could be cracked in under a week using fewer than 1 million noisy qubits, a dramatic reduction from previous estimates of around 20 million qubits and eight hours of computation. This shift accelerates the timeline for "Q-Day," the hypothetical moment when quantum computers can break modern encryption, impacting everything from email to financial transactions.

This vulnerability stems from the ability of quantum computers to utilize Shor's algorithm for factoring large numbers, a task prohibitively difficult for classical computers. Google's innovation involves several technical advancements, including approximate residue arithmetic, magic state cultivation, optimized period finding with Ekerå-Håstad algorithms, and yoked surface codes with sparse lookups. These improvements streamline modular arithmetic, reduce the depth of quantum circuits, and minimize overhead in fault-tolerant quantum circuits, collectively reducing the physical qubit requirement to under 1 million while maintaining a relatively short computation time.

In response to this threat, post-quantum cryptography (PQC) is gaining momentum. PQC refers to cryptographic algorithms designed to be secure against both classical and quantum attacks. NIST has already announced the first set of quantum-safe algorithms for standardization, including FrodoKEM, a key encapsulation protocol offering a simple design and strong security guarantees. The urgency of transitioning to quantum-resistant cryptographic systems is underscored by ongoing advances in quantum computing. While the digital world relies on encryption, the evolution to AI and quantum computing is challenging the security. Professionals who understand both cybersecurity and artificial intelligence will be the leaders in adapting to these challenges.

Recommended read:
References :
  • medium.com: Should Post-Quantum Cryptography Start Now? The Clock Is Ticking
  • medium.com: Google’s quantum leap just changed everything: They can now break encryption 20x faster than…
  • quantumcomputingreport.com: Significant Theoretical Advancement in Factoring 2048 Bit RSA Integers
  • medium.com: Last week, Craig Gidney from Google Quantum AI published a breakthrough study that redefines the landscape of cryptographic security.
  • www.microsoft.com: The recent advances in quantum computing offer many advantages—but also challenge current cryptographic strategies. Learn how FrodoKEM could help strengthen security, even in a future with powerful quantum computers.
  • medium.com: Securing the Internet of Things: Why Post-Quantum Cryptography Is Critical for IoT’s Future
  • medium.com: Quantum Resilience Starts Now: Building Secure Infrastructure with Hybrid Cryptography
  • medium.com: Quantum-Resistant Cryptography: Preparing Your Code for Post-Quantum Era

@www.microsoft.com //
Microsoft is taking a proactive approach to future cybersecurity threats by integrating post-quantum cryptography (PQC) into its Windows and Linux systems. This move is designed to protect against the potential for quantum computers to break current encryption methods like RSA, which secure online communications, banking transactions, and sensitive data. Quantum computers, leveraging quantum mechanics, can solve complex problems far faster than classical computers, posing a significant threat to existing cryptographic schemes. Microsoft's initiative aims to safeguard data from a "harvest now, decrypt later" scenario, where hackers steal encrypted data today with the intent of decrypting it once quantum technology becomes advanced enough.

Microsoft's PQC implementation includes the addition of two key algorithms: ML-KEM (Module Lattice-Based Key Encapsulation Mechanism) and ML-DSA (Module Lattice-Based Digital Signature Algorithm). ML-KEM, also known as CRYSTALS-Kyber, secures key exchanges and prevents attacks by protecting the start of secure connections. ML-DSA, formerly CRYSTALS-Dilithium, ensures data integrity and authenticity through digital signatures. These algorithms are being introduced in Windows Insider builds (Canary Build 27852+) and Linux via SymCrypt-OpenSSL v1.9.0, allowing developers and organizations to begin testing and preparing for a quantum-secure future.

This update to Windows 11 is a critical step in what Microsoft views as a major technological transition. By making quantum-resistant algorithms available through SymCrypt, the core cryptographic code library in Windows, and updating SymCrypt-OpenSSL, Microsoft is enabling the widely used OpenSSL library to leverage SymCrypt for cryptographic operations. The new algorithms, selected by the National Institute of Standards and Technology (NIST), represent a move towards replacing vulnerable cryptosystems like RSA and elliptic curves. This signifies a broader effort to bolster cybersecurity against the emerging threat of quantum computing.

Recommended read:
References :
  • www.microsoft.com: FrodoKEM: A conservative quantum-safe cryptographic algorithm
  • medium.com: Welcome to the Quantum Era, where even the strongest locks we use to protect our digital lives might soon be breakable. However, don’t…
  • arstechnica.com: Here’s how Windows 11 aims to make the world safe in the post-quantum era
  • medium.com: Quantum Computing and Encryption Breakthroughs in 2025: A New Era of Innovation
  • medium.com: Cracking RSA with Fewer Qubits: What Google’s New Quantum Factoring Estimate Means for…
  • medium.com: Google’s quantum leap just changed everything: They can now break encryption 20x faster than…
  • medium.com: On August 13, 2024, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) announced the approval of…
  • medium.com: As our world becomes increasingly interconnected, the Internet of Things (IoT) is transforming industries, homes, and entire cities. From…
  • Quantum Computing Report: Post-Quantum Cryptography Coalition (PQCC) Publishes Comprehensive Roadmap for Post-Quantum Cryptography Migration
  • www.techradar.com: Breaking encryption with quantum computers may be easier than we thought

Siôn Geschwindt@The Next Web //
References: The Next Web , medium.com ,
Quantum computing is rapidly advancing, presenting both opportunities and challenges. Researchers at Toshiba Europe have achieved a significant milestone by transmitting quantum-encrypted messages over a record distance of 254km using standard fiber optic cables. This breakthrough, facilitated by quantum key distribution (QKD) cryptography, marks the first instance of coherent quantum communication via existing telecom infrastructure. QKD leverages the principles of quantum mechanics to securely share encryption keys, making eavesdropping virtually impossible, as any attempt to intercept the message would immediately alert both parties involved.

This advance addresses growing concerns among European IT professionals, with 67% fearing that quantum computing could compromise current encryption standards. Unlike classical computers, which would take an impractical amount of time to break modern encryption, quantum computers can exploit phenomena like superposition and entanglement to potentially crack even the most secure classical encryptions within minutes. This has prompted global governments and organizations to accelerate the development of robust cryptographic algorithms capable of withstanding quantum attacks.

Efforts are underway to build quantum-secure communication infrastructure. Heriot-Watt University recently inaugurated a £2.5 million Optical Ground Station (HOGS) to promote satellite-based quantum-secure communication. In July 2024, Toshiba Europe, GÉANT, PSNC, and Anglia Ruskin University demonstrated cryogenics-free QKD over a 254 km fiber link, using standard telecom racks and room temperature detectors. Initiatives such as Europe’s EuroQCI and ESA’s Eagle-1 satellite further underscore the commitment to developing and deploying quantum-resistant technologies, mitigating the silent threat that quantum computing poses to cybersecurity.

Recommended read:
References :
  • The Next Web: Researchers at Toshiba Europe have used quantum key distribution (QKD) cryptography to send messages a record 254km using a traditional fiber optic cable network.
  • medium.com: Rethinking Cybersecurity in the Face of Emerging Threats
  • medium.com: Quantum Security: The Silent Threat Coming for Your Business

@thequantuminsider.com //
Project Eleven has launched the QDay Prize, an open competition offering one Bitcoin, currently valued around $84,000 to $85,000, to anyone who can break elliptic curve cryptography (ECC) using Shor’s algorithm on a quantum computer. This initiative aims to evaluate the proximity of quantum computing to undermining ECC, a widely used encryption scheme. Participants must demonstrate the ability to break ECC using Shor's algorithm, without classical shortcuts or hybrid methods and submissions must include gate-level code and system specifications, all made publicly available for transparency.

The competition is structured around progressively larger ECC key sizes, starting from 1-bit keys, with an emphasis on demonstrating generalizable techniques that can scale to full cryptographic key lengths. The challenge, running until April 5, 2026, seeks to rigorously benchmark the real-world quantum threat to Bitcoin’s core security system. Project Eleven emphasizes that even successful attacks on small keys would be significant milestones, offering valuable insights into the security risks in modern cryptographic systems.

Participants can use publicly accessible quantum hardware or private systems, and are expected to handle error-prone qubit environments realistically, given current hardware fidelities. Breaking even a few bits of a private key would be considered a significant achievement, according to Project Eleven. The QDay Prize hopes to establish a verifiable and open marker of when practical quantum attacks against widely used encryption systems may emerge, highlighting the urgency of understanding how close current technologies are to threatening ECC security.

Recommended read:
References :
  • thequantuminsider.com: Quantum Contest Offers 1 Bitcoin for Cracking Encryption With Shor’s Algorithm
  • Bitcoin News: Project Eleven believes this would be an extremely hard task, and achieving even a few bits of a private key would be big news.
  • Quantum Computing Report: Project Eleven (P11) has announced the QDay Prize, an open competition offering a reward of one Bitcoin (current value about $85,000) for demonstrating the ability to break elliptic curve cryptography (ECC) using Shor’s algorithm on a quantum computer.
  • quantumcomputingreport.com: Project Eleven’s QDay Prize Offers 1 Bitcoin for Breaking Elliptic Curve Cryptography Using Shor’s Algorithm

Siôn Geschwindt@The Next Web //
Quantum computing is rapidly advancing, and its potential impact on encryption security is becoming a major concern. Classical encryption methods, such as RSA and Elliptic Curve Cryptography (ECC), rely on mathematical problems that are difficult for traditional computers to solve. However, quantum algorithms, particularly Shor’s algorithm, threaten to break these systems. Shor's algorithm can efficiently factor large integers, which is the foundation of RSA, and solve the elliptic curve discrete logarithm problem (ECDLP), which underpins ECC. Project Eleven has even launched the Q-Day Prize, offering 1 Bitcoin to anyone who can crack a Bitcoin private key using Shor’s algorithm on a quantum computer, underscoring the urgency of addressing this threat.

The vulnerability of current cryptographic methods has spurred research into post-quantum cryptography (PQC). PQC focuses on developing encryption algorithms that are resistant to attacks from both classical and quantum computers. The National Institute of Standards and Technology (NIST) has already published its first set of post-quantum standards in August 2024, including algorithms like ML-KEM (Kyber) for key encapsulation and ML-DSA (Dilithium) for digital signatures. These standards are intended to be integrated into software and systems over the coming years, with the NSA’s Commercial National Security Algorithm Suite (CNSA 2.0) mandating their use in certain applications by 2030.

While commercially viable quantum computers capable of breaking current encryption are still under development, the pace of progress is accelerating. IBM and Google are among the companies racing to build larger and more powerful quantum processors. Experts estimate that a quantum computer with around 20 million physical qubits (approximately 6,000 logical qubits) could factor a 2048-bit RSA modulus in a matter of hours. This has led to a "harvest-now, decrypt-later" strategy, where adversaries collect encrypted data with the intention of decrypting it once quantum computers become powerful enough. The transition to quantum-resistant cryptography is now considered an engineering problem, requiring careful planning and implementation across various systems and infrastructures.

Recommended read:
References :

@The Cryptography Caffe? ? //
The UK's National Cyber Security Centre (NCSC) has released a roadmap for transitioning to post-quantum cryptography (PQC), establishing key dates for organizations to assess risks, define strategies, and fully transition by 2035. This initiative aims to mitigate the future threat of quantum computers, which could potentially break today's widely used encryption methods. The NCSC’s guidance recognizes that PQC migration is a complex and lengthy process requiring significant planning and investment.

By 2028, organizations are expected to complete a discovery phase, identifying systems and services reliant on cryptography that need upgrades, and draft a migration plan. High-priority migration activities should be completed by 2031, with infrastructure prepared for a full transition. The NCSC emphasizes that these steps are essential for addressing quantum threats and improving overall cyber resilience. Ali El Kaafarani, CEO of PQShield, noted that these timelines give clear instructions to protect the UK’s digital future.

Researchers have also introduced ZKPyTorch, a compiler that integrates ML frameworks with ZKP engines to simplify the development of zero-knowledge machine learning (ZKML). ZKPyTorch automates the translation of ML operations into optimized ZKP circuits and improves proof generation efficiency. Through case studies, ZKPyTorch successfully converted VGG-16 and Llama-3 models into ZKP-compatible circuits.

Recommended read:
References :
  • The Quantum Insider: UK Sets Timeline, Road Map for Post-Quantum Cryptography Migration
  • The Register - Security: The post-quantum cryptography apocalypse will be televised in 10 years, says UK's NCSC
  • Dhole Moments: Post-Quantum Cryptography Is About The Keys You Don’t Play
  • IACR News: ePrint Report: An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes YoungBeom Kim, Seog Chung Seo Since the selection of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardization algorithms, research on integrating PQC into security protocols such as TLS/SSL, IPSec, and DNSSEC has been actively pursued. However, PQC migration for Internet of Things (IoT) communication protocols remains largely unexplored. Embedded devices in IoT environments have limited computational power and memory, making it crucial to optimize PQC algorithms for efficient computation and minimal memory usage when deploying them on low-spec IoT devices. In this paper, we introduce KEM-MQTT, a lightweight and efficient Key Encapsulation Mechanism (KEM) for the Message Queuing Telemetry Transport (MQTT) protocol, widely used in IoT environments. Our approach applies the NIST KEM algorithm Crystals-Kyber (Kyber) while leveraging MQTT’s characteristics and sensor node constraints. To enhance efficiency, we address certificate verification issues and adopt KEMTLS to eliminate the need for Post-Quantum Digital Signatures Algorithm (PQC-DSA) in mutual authentication. As a result, KEM-MQTT retains its lightweight properties while maintaining the security guarantees of TLS 1.3. We identify inefficiencies in existing Kyber implementations on 8-bit AVR microcontrollers (MCUs), which are highly resource-constrained. To address this, we propose novel implementation techniques that optimize Kyber for AVR, focusing on high-speed execution, reduced memory consumption, and secure implementation, including Signed LookUp-Table (LUT) Reduction. Our optimized Kyber achieves performance gains of 81%,75%, and 85% in the KeyGen, Encaps, and DeCaps processes, respectively, compared to the reference implementation. With approximately 3 KB of stack usage, our Kyber implementation surpasses all state-of-the-art Elliptic Curve Diffie-Hellman (ECDH) implementations. Finally, in KEM-MQTT using Kyber-512, an 8-bit AVR device completes the handshake preparation process in 4.32 seconds, excluding the physical transmission and reception times.
  • The Quantum Insider: ETSI Launches New Security Standard for Quantum-Safe Hybrid Key Exchanges
  • billatnapier.medium.com: Xmas Coming Early: OpenSSL Finally Enters a Quantum World