Hacker News with Generative AI: Cryptography

Let's talk about AI and end-to-end encryption (cryptographyengineering.com)
Recently I came across a fantastic new paper by a group of NYU and Cornell researchers entitled “How to think about end-to-end encryption and AI.” I’m extremely grateful to see this paper, because while I don’t agree with every one of it’s conclusions, it’s a good first stab at an incredibly important set of questions.
Bypassing disk encryption on systems with automatic TPM2 unlock (oddlama.org)
Have you setup automatic disk unlocking with TPM2 and systemd-cryptenroll or clevis? Then chances are high that your disk can be decrypted by an attacker who just has brief physical access to your machine - with some preparation, 10 minutes will suffice. In this article we will explore how TPM2 based disk decryption works, and understand why many setups are vulnerable to a kind of filesystem confusion attack.
Cracking a 512-bit DKIM key for less than $8 in the cloud (dmarcchecker.app)
In our study on the SPF, DKIM, and DMARC records of the top 1M websites, we were surprised to uncover more than 1,700 public DKIM keys that were shorter than 1,024 bits in length.
Ask HN: How Do Google Willow's Results Affect Quantum Computing Timelines? (ycombinator.com)
As a model question, I think it is most interesting to consider when RSA-2048 will be factored using a quantum computer.
Show HN: Generate random colors from text with SHA-256 (hashue.link)
Benchmarking RSA Key Generation (filippo.io)
RSA key generation is both conceptually simple, and one of the worst implementation tasks of the field of cryptography engineering. Even benchmarking it is tricky, and involves some math: here’s how we generated a stable but representative “average case” instead of using the ordinary statistical approach.
Ask HN: TLS 1.3 and Post-Quantum Encryption for HN? (ycombinator.com)
Could HN benefit from a TLS upgrade, as it's currently at TLS v1.2, (not e.g.: v1.3) (for me, at least)? Also could it benefit from being a leader in implementing post-quantum cryptography?
Using Kernel TLS (kTLS) (2023) (delthas.fr)
Traditionally, the data path for sending HTTPS traffic is:
Programming Lewis Carroll's Memoria Technica (ztoz.blog)
Charles Dodgson (pen name Lewis Carroll) had difficulty remembering numbers, such as dates. He developed a cipher to help him remember numbers by embedding them in couplets or phrases. For example, the couplet “Brass trumpet and brazen bassoon, will speedily mark you a tune” encodes the specific gravity of brass (8.39) in the last four consonants: r k t n (y is treated as a vowel).
Show HN: PQC.club – Post-Quantum Cryptography Tools and Alternatives (pqc.club)
A collection of the best Post-Quantum Cryptography Tools and Alternatives to switch from software using legacy encryption.
Monocypher – Boring crypto that simply works (monocypher.org)
Monocypher is an easy-to-use crypto library.
Unforgeable Quantum Tokens Delivered over Fiber Network (ieee.org)
When Chinese researchers’ announced in May last year they had used a quantum computer to crack RSA encryption, a widely used method to secure private data transmission, it caused a stir in the information security community.
Craig Wright convicted for repeatedly lying about inventing Bitcoin (bbc.com)
A computer scientist has been found to have committed contempt of court for falsely and persistently claiming to be the mysterious inventor of Bitcoin, Satoshi Nakamoto.
Botan: Crypto and TLS for Modern C++ (github.com/randombit)
Botan (Japanese for peony flower) is a C++ cryptography library released under the permissive Simplified BSD license.
SHA-256, ECDH, Ecdsa and RSA Not Approved by ASD in Australia for 2030 (medium.com)
I am a bit shocked … SHA-256, RSA, ECDSA and ECDH will not be approved for use in Australia by 2030. Basically, these four methods are used for virtually every Web connection that we create, and where ECDH is used for the key exchange, ECDSA or RSA is used to authenticate the remote server, and SHA-256 is used for the integrity of the data sent. The removal of SHA-256 definitely goes against current recommendations.
Show HN: I Built a Groth16 ZK-Proof Verifier from Scratch Using Rust (github.com/Dyslex7c)
This project is a custom implementation of the Groth16 Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zkSNARK) protocol, built from the ground up using fundamental cryptographic principles in Rust.
Australia moves to drop some cryptography by 2030 – before quantum carves it up (theregister.com)
Australia's chief cyber security agency has decided local orgs should stop using the tech that forms the current cryptographic foundation of the internet by the year 2030 – years before other nations plan to do so – over fears that advances in quantum computing could render it insecure.
GCHQ Christmas Challenge Puzzles (bbc.com)
Latin dancing, Indian butter and American soldiers are some of the clues for this year's cryptic Christmas challenge set by the national spy agency.
Show HN: Rain hashes – well designed, simple and fast variable sized hashes (github.com/DOSAYGO-Research)
Rain Hashes: Rainbow, Rainstorm and more! Support our work with a ⭐ 🥰
GCHQ Christmas Challenge (gchq.gov.uk)
Xkcd Geohasing (xkcd.com)
Geohashing Coordinate Calculator -- What's this about? See the wiki
Ending OCSP Support in 2025 (letsencrypt.org)
Earlier this year we announced our intent to provide certificate revocation information exclusively via Certificate Revocation Lists (CRLs), ending support for providing certificate revocation information via the Online Certificate Status Protocol (OCSP). Today we are providing a timeline for ending OCSP services:
Show HN: Vekos – a Rust OS with Built-In Cryptographic Verification (github.com/JGiraldo29)
VEKOS is an experimental operating system written in Rust that focuses on verification and security at its core. This is the first alpha release (v0.0.1) that demonstrates the basic architecture and key features of the system.
Petnames: A humane approach to secure, decentralized naming (spritely.institute)
Names must be human-readable in order to be widely used. Unfortunately, while DIDs and Tor .onion addresses are decentralized and globally unique, they are not human readable. How can we build user interfaces that real users might actually use? In this paper we provide an overview of petname systems, a way of mapping human readable names to cryptographically secure names, and describe changes to two user interface designs that we believe that are compatible with intuitive user expectations.
Python Crypto Library Updated to Steal Private Keys (phylum.io)
Yesterday, Phylum's automated risk detection platform discovered that the PyPI package aiocpa was updated to include malicious code that steals private keys by exfiltrating them through Telegram when users initialize the crypto library.
Let's not Encrypt (orlitzky.com)
Cryptographic Calculator (zka.lc)
Nothing-up-my-sleeve number (wikipedia.org)
In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.
ChibiHash: Small, Fast 64 bit hash function (nrk.neocities.org)
If you need a small and fast 64 bit hash function that can be copy-pasted easily, then here's one that I cooked up in an hour or so: chibihash64.h.
What to Use Instead of PGP (soatok.blog)
It’s been more than five years since The PGP Problem was published, and I still hear from people who believe that using PGP (whether GnuPG or another OpenPGP implementation) is a thing they should be doing.