top of page

Profile

Join date: May 7, 2020

Posts (25)

Feb 8, 20261 min
Key Centered Quantum Cryptanalysis - The Threat is much closer now!
The original strategy for quantum cryptanalysis was math-centered, circumventing the complelxity that protected users from violating one-way function defense. All estimates regarding the imminence of the quantum cryptanalytic threat were based on this strategy. The new strategy calls for crypto-dedicated quantum gates that hone on the fact that the secret key is used in its entirety for the duration of its use, and all the transmitted ciphertexts reflect the same key. The key size is known,...

10
0
Feb 4, 20264 min
Innovative Security
It is the only security that will withstand your innovative threat C yber security is a big project for a big corporate data world. It is designed, built and maintained like a big project. Alas, a typical big project is designed and built with an operational end point, striving for perfection and associated stability, routine, trouble free use. By contrast,  cyber security projects are fundamentally different. For them a stable end point is where their vulnerability begins. Stability, rigid...

5
0
Dec 15, 20253 min
HIPS: A Cryptographic Protocol that Can Change the Course of History
We have lost the freedom to talk to our cyber neighbors privately. Yes, we can send an encrypted message, but by this we raise a flag: Hey adversaries! -- Look who I am talking to, and how much, and how frequently. And yes I have the key to decrypt it, but I would not share it with you unless you threaten me or coerce me -- that is not privacy. HIPS is! Imagine that you can talk to any resident of cyberspace, without leaving a trace, without even raising suspicion that this conversation took...

10
0
Gideon Samid

Gideon Samid

Admin
More actions
bottom of page