top of page
Security.BitMint.com
Randomness is a trusted shield against smarter and better equipped adversaries
Search


Cover Your Cyber Nakedness with a Fig Leaf of Randomness
We live in cyberspace, and thereby expose our whims, proclivities, secret desires, ambitions, love, hatred, emotions. Modern AI sees us...
Gideon Samid
Jul 191 min read


A Ciphertext as a Deterrent
Elastic encryption ciphertexts deter cryptanalysts from cracking them. New feature in the on going cyber war. An elastic ciphertext...
Gideon Samid
Jul 71 min read


Fortifying NIST-PQC Against An Attacker Smarter Than Expected
The nightmare of every cryptograher is an attacker using. surprise mathmatical insight to crack the code. The NIST-PQC cryptographer is...
Gideon Samid
Jul 42 min read


Elastic Encryption: AI Empowered Cryptology
Abstract: Artificial Intelligence will associate a ciphertext with a set of plausible plaintext message candidates for the one message...
Gideon Samid
Jun 2731 min read


The Future of Cyber Space Hangs in the Balance -- Can a New Cryptography Save Us?
Life in cyberspace shapes up as a paradise for the powers that be, blanketing us the people with invasive surveillance, administered...
Gideon Samid
May 284 min read


The Biggest Milestone in the History of Cryptography is Quietly Upon Us
Mathematical Insight is No Longer an Advantage Abstract: Throughout its stormy history and remarkable track record, cryptography was...
Gideon Samid
May 157 min read


AI Accelerated Brute Force Cryptanalysis: Bigger Threat than Quantum
Plain brute force cryptanalysis is destined to check on average half the possible secret keys that guard any cyber secret, including...
Gideon Samid
Dec 7, 20241 min read


Proof-of-Secrecy (POS) Cryptography
To say that cryptography today is constituted on arrogance and hubris, is to risk being summarily dismissed by anyone who counts. And it...
Gideon Samid
Nov 27, 20242 min read


Cryptography and Privacy: An Impactful Milestone Ahead
Privacy is back in the hands of the user, dial it up as high as you please! Freedom Wins!
Gideon Samid
May 24, 20235 min read


Will AI Demolish Cryptography?
In the 70s of the last century a thousand years old premise of cryptography was challenged. The idea of using the same key to encrypt a...
Gideon Samid
Apr 12, 20233 min read


AI is here, Cryptography! Are you ready?
It has shaken every other field. It is coming for you (or rather for us, I should say). It is opening a new line of attack, one we have...
Gideon Samid
Apr 7, 20232 min read


How did Russia get under our Cyber Skin?
US Intelligence was stymied by Stalin's spies who used an American super cipher, which we dismissed... It was the notorious Vernam...
Gideon Samid
Apr 18, 20222 min read


Family Key: Interchangeable Symmetric Keys: a new Cryptographic Paradigm
In the current crypto paradigm a single secret key transforms a plaintext into a ciphertext and vice versa, or at most a different key is...
Gideon Samid
Mar 29, 20212 min read


High Profile Spending Espionage
Silent Reading of Credit Card Spending History of High Level people is Sold to their Rivals -- a new line of Industrial Surveillance....
Gideon Samid
Mar 4, 20211 min read


Why does US Cyber Security Fail? Hackers Wakefulness Defeats Establishment Inertia
It was a huge NSA led cyber investment to massively scan world-wide communication to zero in on encrypted traffic to be further looked...
Gideon Samid
Jan 17, 20214 min read


Drones are the fastest growing Mode of Transportation -- the Fastest Growing Hacking Target Too
Hacked drones smashing into windows, bumping into people, peeping through sunlight windows... this is the troubling scenario for the not...
Gideon Samid
Dec 29, 20201 min read


Has Our Genomic Library Stealthily Been Hacked?
There are a whopping 10 to the power of 31 virus particles in the biosphere, which corresponds to about 100 million viruses for each cell...
Gideon Samid
Dec 24, 20201 min read


USHack2020: The Risk of a Quick Shallow Recovery, leaving Spyware behind
The sophisticated cyber attackers have anticipated the current exposure, and its hurried recovery efforts, and they likely rely on deep...
Gideon Samid
Dec 21, 20201 min read


The Strategic Flaw in the Federal Cyber Security Strategy -- Ignoring Recovery Technology
Cyber Security Overconfidence suppressed use of Effective Recovery Technology that would have minimized the yet to be appraised colossal...
Gideon Samid
Dec 20, 20206 min read
The Right to Hide
A Safe Head to freely sort out one's thoughts, with like-minded people is the engine of society, now in peril Until recently we could all...
Gideon Samid
Nov 24, 20202 min read
bottom of page