cryptography

Do the Math: Prime Number Breakthrough Could Upend Encryption
When Way Kuo, a senior fellow at the Hong Kong Institute for Advanced Study, claimed in a working paper appearing in the SSRN Electronic Journal that his team had “devised a way ...
Security Boulevard
NCSC Guidance on “Advanced Cryptography”
The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided ...

Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today
By performing a cryptographic key assessment (CKA), developing a PQC encryption strategy and prioritizing cryptoagility, organizations can prepare for quantum computing cyberthreats. ...
Security Boulevard

So Many Reasons to Check Out AppViewX at the 2025 RSA Conference
Stephen Tarleton | | 2025 RSA Conference, Certificate Authority (CA), certificate lifecycle management, crypto-agility, cryptography, PKI, PKI solutions, Post-quantum cryptography (PQC), RSA Conference, rsac, TLS certificate
The world of PKI and certificate management is evolving faster than ever. Tech giants like Google and Apple are advocating for shorter-lived certificates, Certificate Authorities (CAs) are undergoing major disruptions, and the ...

The SQL Server Crypto Detour
As part of my role as Service Architect here at SpecterOps, one of the things I’m tasked with is exploring all kinds of technologies to help those on assessments with advancing their ...
AIs as Trusted Third Parties
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: ...

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration
Krupa Patil | | CLM Automation, cryptography, Cryptography Bill of Materials (CBOM), NIST-standardized PQC encryption algorithms, Post-quantum cryptography (PQC), PQC migration, Public Key Cryptography, United Kingdom's National Cyber Security Centre (NCSC), X.509 PKI certificates
The United Kingdom’s National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum ...
Implementing Cryptography in AI Systems
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired ...
Hardware Cryptographic Accelerators to Enhance Security Without Slowing Down
Krupa Patil | | cpu, Cryptographic Accelerators, cryptography, CRYSTALS-Kyber, PCI DSS, PKI hierarchy, PQC algorithms, PQC readiness, PQC-ready certificates and keys, PSD2
From smartphones to smart homes and even industrial applications, embedded systems are everywhere. But as these systems become more prevalent in our daily lives, the risks of cyber threats grow just as ...

Best practices for key derivation
By Marc Ilunga Key derivation is essential in many cryptographic applications, including key exchange, key management, secure communications, and building robust cryptographic primitives. But it’s also easy to get wrong: although standard ...