##Cryptography
November 6, 2025 at 10:53 PM
Not only is this the level 1 Crypto Tiles puzzle on tiletalk.tilefarm.com but it’s also what you should go do today! Hint: the number of tiles in each cluster corresponds to a letter in the alphabet.
#iTeachMath #cryptography
November 4, 2025 at 3:41 PM
Quantum computing is rewriting the rules of cybersecurity. 🧬🔐

Learn how to secure cryptography for the next era and protect data in 2025 & beyond:
🌐 cyberphore.com/quantum-compu...

#CyberPhore #QuantumComputing #Cryptography #CyberSecurity #InfoSec #PostQuantumSecurity
Quantum Computing Security & Cryptography Guide: Preparing for Post-Quantum Security
Complete quantum computing security and cryptography guide for 2025. Learn about quantum threats to encryption, post-quantum cryptography, and preparing for quantum-safe security.
cyberphore.com
November 3, 2025 at 4:00 PM
This CIA code went unsolved for 35 years. An amateur discovered the answer in plain sight

The sculptor mistakenly donated to the Smithsonian a yellowing scrap of paper that contained the original, unencrypted message.

#CIA #cryptography #sculpture #art
This CIA code went unsolved for 35 years. An amateur discovered the answer in plain sight
Enthusiasts have found answer to a puzzle outside security agency’s headquarters, but their methods have split the codebreaking community
www.telegraph.co.uk
October 31, 2025 at 5:06 PM
EPFL researchers have developed and tested Votegral a complete e-voting pipeline, demonstrating for the first time that there is a plausible and practical approach to coercion-resistant electronic voting in elections. 🗳️✨

#research #cryptography #secure #evoting

👉 actu.epfl.ch/news/a-new-p...
A new prototype E-Voting system finally solves the coercion problem
EPFL researchers have developed and tested Votegral a complete e-voting pipeline, demonstrating for the first time that there is a plausible and practical approach to coercion-resistant electronic vot...
actu.epfl.ch
October 30, 2025 at 4:22 PM
The World's Most MYSTERIOUS Book: A Code, a Hoax, or Something Else?
What if the world's most mysterious book, a 600-year-old enigma that has baffled the world's best codebreakers, is nothing more than a genius-level prank? This is the story of the Voynich Manuscript, a 15th-century book housed at Yale, filled with bizarre plants that don't exist, strange astrological charts, and hundreds of pages written in a language no one on Earth can read: Voynichese. Join us as we enter the high-stakes world of cryptography and linguistic analysis, where experts are locked in a bitter debate. On one side, scientists point to complex statistical patterns, like Zipf's Law, as proof that the manuscript is a real, unbreakable code—a lost language of a forgotten people. On the other, a growing number of researchers argue it’s the most elaborate hoax in history, a masterpiece of meaningless gibberish designed to be beautiful but ultimately empty. We'll explore the evidence: Does the manuscript's structure prove it's a genuine language, or do these same patterns show up in sophisticated, man-made nonsense? Is it the key to a lost civilization, or are we all falling for the ultimate medieval troll? This isn't just a story about a weird book; it's a battle between meaning and chaos, and a search for a truth that has been hidden for centuries. If you love a good mystery that even the world's supercomputers can't solve, you've just found your next obsession. Follow our podcast now so you never miss a clue, and leave a 5-star review if you're ready to help us crack the code—it helps more curious minds discover the mystery!
www.spreaker.com
October 30, 2025 at 9:16 AM
Fun fact #3: in my previous career, I did some work in Cryptography (encrypting & decrypting written messages/cyphertext)

Since #cryptography is still a pretty big passion of mine, I've hidden lots of "secret messages" throughout all my books.

The LARGEST SECRET of all still remains undiscovered💙📚
October 24, 2025 at 11:24 AM
“Mr. Sanborn acknowledged that keeping the secret could be a strain: His computer has been hacked repeatedly over the years, he said, and obsessive fans of the work have threatened him. ‘I sleep with a shotgun,’ he said.”
www.nytimes.com/2025/10/16/s...
#GiftLink #Cryptography #Art
A C.I.A. Secret Kept for 35 Years Is Found in the Smithsonian’s Vault
www.nytimes.com
October 25, 2025 at 6:30 PM
True that. Too bad I don't use #cryptography nearly as often as I should in my stories. I should do what Alex Hirsch did with "Gravity Falls" and actually turn it into a "trademark trait" of my work.
bill cipher from gravity falls is standing next to a man in a suit .
ALT: bill cipher from gravity falls is standing next to a man in a suit .
media.tenor.com
October 24, 2025 at 1:40 PM
Like passing notes in class, learn to use OpenSSL to keep your secrets!
#OpenSSL #encryption #howto #cryptography #lsned #learnsomethingneweveryday
October 23, 2025 at 12:41 AM
Why Mesh Networks Break When Big Crowds Gather
A decentralized networking technology originally built for battlefields and Burning Man is today being reimagined from the ground up. Mesh networks—named for their fishnet-like connections—emerged over the past few decades from rigorous, mathematical research on keeping data flowing even when portions of a system fail. But the theory hasn’t always matched up to reality. Real-world mesh networks have proved vulnerable to shutdowns in some of the very settings, such as certain kinds of large crowds, they’re supposed to be good at handling. So researchers from Johns Hopkins University, Harvard, and the City College of New York have recently built a prototype mesh networking system that’s been hardened for some of the most challenging and adversarial environments around: political protests. In a paper presented last week at the ACM Conference on Computer and Communications Security in Taipei, the researchers announced a prototype mesh network called Amigo. Amigo, for starters, has been designed to work in environments where the Internet has been shut off, as seen during unrest in India, Iraq, and Syria, among other countries. “Shutting down the internet during times of great civil protest is a way to prevent people from being able to organize and come together,” says Tushar Jois, assistant professor of electrical engineering at City College. “That is what we’re specifically tailoring our technology for.” Amigo proposes at least three ways to bolster the more traditional approaches to mesh networks. Recent scholarship on mesh outages in protest scenarios reveals problems such as network messages failing to deliver, appearing out of order, and exposing users to being traced—even if the nodes in the network (e.g. phones running the mesh app) are right next to each other. The researchers found that prying beneath the mesh network’s high-level, encrypted communications and down into nuts-and-bolts Wi-Fi operations revealed opportunities that previous mesh networks had failed to seize on. “The story is the cryptography alone won’t save us,” says Jois. Jois and colleagues presented a version of their Amigo paper earlier this year at the Real World Cryptography conference in Sofia, Bulgaria. ### Why Political Protests Matter in Mesh Networks Amigo drew key lessons from a set of studies on mesh networking in a range of recent political protests—including Hong Kong pro-democracy actions in 2019 and ’20. For example, how previous mesh networks handled routing of their messages could accidentally lead to a flooding of the zone. Multiple nodes in a stressed network can pump out redundant messages into the network, causing communications to grind to a crawl. By contrast, Amigo forms what the researchers call dynamic “cliques”—where only designated leader nodes exchange messages with each other, while regular nodes just talk to their leader. This technique, the researchers say, substantially reduces message traffic, decreasing the chance the network might seize up. “We’re one of the people to discover that in secure mesh messaging, we’ve had this blind spot,” Jois says. “So we proposed some new algorithms that help address this blind spot. Dynamic clique routing basically allows groups of nodes to self-organize routing units in a geographic area based on GPS.” Another example is Amigo’s approach to cryptography and anonymity. Previous mesh environments provided no easy way to remove members from encrypted groups. (In a protest setting, group removal might be necessary, for instance, because a device or its user has been apprehended by authorities.) Older mesh standards also leaked metadata that could reveal other group members. Amigo aims to correct both problems. “One thing we talk about is outsider anonymity,” Jois says. “People who are outside your group don’t know that the group exists.” Amigo, he says, adds new algorithms to ensure outsider anonymity and group removal. Jois adds that Amigo aims to achieve these goals while still retaining protections of existing encrypted-message networks like WhatsApp and Signal. Traditionally, Jois adds, encrypted messaging provides a couple of important features. One feature involves protecting past messages: via “forward secrecy,” even if keys are stolen today, past messages are still secure. The other involves protecting future messages: via “post-compromise security,” even a compromised system can heal by generating new keys and thus locking an intruder out of future communications. Amigo retains both features. “We add [our new protections] to the classic forward secrecy and post-compromise security,” Jois says. “But maybe there are more properties that we need from a security perspective. So I think juggling all of those will be fun.” Diogo Baradas, assistant professor of computer science at the University of Waterloo in Canada, adds that Amigo could find applications beyond political protests. “Another scenario where such crowd dynamics are of particular interest include natural disaster scenarios— like flooding, fires, and earthquakes—where Internet communications may become unavailable,” says Baradas, who is not on the Amigo team. “And affected citizens, first-responders, and volunteers must coordinate to ensure a fitting response.” Developers have built the Amigo mesh network around mathematical models of crowds that are based on studies of real-world crowds. Cora Ruiz ### Today’s Mesh Networks Know Nothing About Crowds A final, real-world reality check on mesh standards emerges from a new study of how mesh networks handle crowds. Cora Ruiz is a graduate student in Jois’s Security, Privacy and Cryptographic Engineering Lab at City College. She’s been investigating the “random walk”-style approach to modeling crowds in most mesh network environments. Like nitrogen and oxygen molecules in a sample of air, individual mesh nodes today are typically imagined to each trace random paths whose motions are uncorrelated to nearby nodes. If this, Ruiz says, is how mesh networks mathematically model crowd behavior, then no wonder mesh networks seize up in certain real-world environments. “There’s really no understanding of the way that protesters are physically moving in these mass civil protests,” Ruiz says of traditional mesh models of crowd behavior. “And without having that understanding of the way that people move and what drives the movement, what it looks like on any level, it’s going to be nearly impossible to develop a really tailored solution.” So instead, Ruiz is exploring ways to bring models of what she calls psychological crowds into mesh network algorithms. “Psychological crowds are a concentration of people in a place that have a certain shared sense of self,” she says. “And that shared sense of self can directly impact the way that people move. They tend to move closer together. They don’t tolerate as much distance being put in between one another. They move slower.” Jois says developing more realistic mathematical models of psychological crowds is a cross-disciplinary effort. It’s part math, and it’s part sociology and group psychology. “[Ruiz’s] current work is about determining communications dynamics and [group] dynamics by going to protest activists and journalists—in these places where internet shutdowns are common—and figuring out what are their needs,” he says. “Since mesh is so heavily impacted by physical movement and traffic patterns,” Ruiz adds, “Having a strong understanding is key to furthering Amigo and other future mesh messaging tools.” Jois adds that Amigo drew as inspiration for its crowd models a document created in 2019 by Hong Kong pro-democracy protesters, advising fellow activists how to march and gather. From that and other studies that could help devise mathematical models of real-world crowd movements, Jois says Amigo represents an important next step toward bringing mesh networks into the real world. “Our results show that there is like some foundational work necessary in mesh networking,” Jois says. “We can stand in our academic spaces and say, ‘Oh well, this is what we think is necessary.’ But unless we get that from the source, we don’t know.”
spectrum.ieee.org
October 19, 2025 at 4:02 PM
Did I just spend almost 3 hours watching a video on post-quantum cryptography? This video is so well made and unfortunately the algorithm won't push it to people because of its length.
youtu.be/aw6J1JV_5Ec

#cryptography #postquantumcrypto #postquantumcryptography
The 8-Year Battle Royale that Saved Encryption
YouTube video by Another Roof
youtu.be
October 17, 2025 at 2:16 PM
“This is a problem everybody has been attacking as a STEM problem,” Mr. Kobek said in an interview...Cryptographic science, he argued, could not solve Kryptos — “but library science could.”

#Kryptos #Cryptography #CIA 🗃️📜
#LibraryScience #Archives #ArtHistory
October 16, 2025 at 12:35 PM
Okay, so.

I've got something to share with y'all.

This is some straight up #cryptography nerd shit, but it might be of mild significance someday, so please at least bookmark it for later.

Maybe boost it if you think it's cool? No pressure of course.
October 14, 2025 at 2:58 PM
Blogpost for the Interactive @1password.bsky.social Explainer I released and linked earlier this week #cryptography #typescript #webdev #explainer #passwordmanager
Stopping Bad Actors: Inside 1Password’s Security Model
“That’s Encryption, Baby!”
medium.com
October 10, 2025 at 8:56 PM
Big news from the JDK Security team 🥳!!! Checkout the roadmap!
#Java #JDK #security #cryptography
We plan to backport the quantum-resistant ML-KEM and ML-DSA implementations to Oracle's JDK 21 and 17 releases in the second half of FY26. See www.java.com/en/jre-jdk-c... for more details.

#crypto #jdk #java #pqc #security
www.java.com
October 9, 2025 at 12:53 PM
25 Years of Linux Magazine: Check out this article from our popular “Post-Quantum Encryption” issue published in 2021: Quantum computers and the quest for quantum-resilient encryption
www.linux-magazine.com/Issues/2021/...
#TBT #Linux #QuantumComputing #encryption #OpenSource #cryptography #FOSS
September 25, 2025 at 7:17 PM
#FAUwelcome: Please welcome #FAUprof Paul Christoph Rösler at @UniFAU. Paul is an expert in #cryptography and #ProtocolSecurity. He joins and strengthens our #CS Department. Currently Paul is with @TUDarmstadt. I am super #FAUproud to have hime on board. #HTA #HighTechAgenda #FAU
December 29, 2024 at 10:09 AM
you might know my public pronouns but if you dont know my private pronouns we dont talk #cryptography
December 16, 2024 at 11:03 AM
itbrief.com.au/story/digice...

"DigiCert predicts that 2025 will see the expansion of post #quantum #cryptography from theoretical to practical applications, driven by global compliance needs and anticipated announcements from authorities like the U.S. National #Security Agency".
DigiCert predicts AI & quantum impact on cybersecurity 2025
DigiCert's 2025 cybersecurity predictions highlight the urgent need for Australian businesses to enhance digital trust amid rising AI-driven risks.
itbrief.com.au
December 9, 2024 at 10:27 PM
Password Hashing Competition and our recommendation for hashing passwords: Argon2 https://password-hashing.net/ #password #cryptography
November 22, 2024 at 1:04 PM
Aurebesh isn’t a language, it’s a ciphertext alphabet used in conjunction with a simple substitution cipher. #cryptography
March 13, 2025 at 6:17 AM