Remove Article Remove Encryption Remove Technology
article thumbnail

NIST Releases First Post-Quantum Encryption Algorithms

Schneier on Security

EDITED TO ADD: Good article : One – ML-KEM [PDF] (based on CRYSTALS-Kyber) – is intended for general encryption, which protects data as it moves across public networks. My recent writings on post-quantum cryptographic standards. NIST plans to select one or two of these algorithms by the end of 2024.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. EDITED TO ADD: More news articles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Everything Encrypted Will Soon Become Decryptable: We Must Prepare Now For The Era Of Quantum Computers

Joseph Steinberg

Nearly every piece of data that is presently protected through the use of encryption may become vulnerable to exposure unless we take action soon. While quantum computers already exist, no devices are believed to yet exist that are anywhere near powerful enough to crack modern encryption in short order.

article thumbnail

Facebook Plans on Backdooring WhatsApp

Schneier on Security

This article points out that Facebook's planned content moderation scheme will result in an encryption backdoor into WhatsApp: In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. The company even noted.

article thumbnail

Preparing for the quantum-safe encryption future

CSO Magazine

Security experts and scientists predict that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto currencies, and communications systems vulnerable to significant cybersecurity threats. To read this article in full, please click here

article thumbnail

I Was Cited in a Court Decision

Schneier on Security

An article I co-wrote -- my first law journal article -- was cited by the Massachusetts Supreme Judicial Court -- the state supreme court -- in a case on compelled decryption. See generally, Kerr & Schneier, Encryption Workarounds, 106 Geo. 989, 990, 994, 998 (2018). See Kerr & Schneier, supra at 995.

article thumbnail

BrandPost: Novel Encryption Technique Helps Lockfile Ransomware Hide in Plain Sight

CSO Magazine

It’s known as “intermittent encryption” and researchers from Sophos recently discovered Lockfile encrypts alternate bundles of 16 bytes in a document to stay hidden. This novel approach helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original.