Post-Quantum RSA

A very detailed study showing that RSA can be re-engineered in order to remain practical, yet it will no longer be broken by a quantum computer. The essence of the proposal is a multiple-prime RSA with great many 4096-bit primes and with 1 Terabyte public key. A significant potential weakness [for which however there is no …

Continue reading ‘Post-Quantum RSA’ »

Silvio Micali – A Genius Which Will Stay in the Bottle

Silvio Micali, one of the most brilliant computer scientists on this planet has just re-invented democracy or blockchains or finance or law order and public authority and few other things, with his ALGORAND system. And some other brilliant crypto innovators are also doing the same thing: see DFINITY. Possibly this is what we really want, a …

Continue reading ‘Silvio Micali – A Genius Which Will Stay in the Bottle’ »

Interesting Parts in CIA Leaks

Schneier wrote: 8,761 classified CIA documents […] 2012-2016 […]it sounds like this cache of documents wasn’t taken from the CIA and given to WikiLeaks for publication, but has been passed around the community for a while — and incidentally some part of the cache was passed to WikiLeaks. […]  extraordinary collection […] several hundred million lines …

Continue reading ‘Interesting Parts in CIA Leaks’ »

Is PGP Bankrupt?

In the last few years, we have seen an increased awareness that PGP/GPG is a dinosaur of 1990s crypto, and it does not satisfy the need of modern users for secure communication. PGP model has many perverse effects: like creating a single point of failure where all sensitive communications are compromised with cracking one single …

Continue reading ‘Is PGP Bankrupt?’ »

Blockchain Privacy – Part 2: Stealth Addresses

Privacy In Part 1 we covered why privacy is essential for widespread cryptocurrency adoption, and concluded that neither Bitcoin nor Ethereum, or even ZCash is suitable for the task we’re wanting to solve: anonymity with efficiency. (Also the bonus property of needing no trusted setup)! COOL THING 1: STEALTH ADDRESSES The benefits of using stealth …

Continue reading ‘Blockchain Privacy – Part 2: Stealth Addresses’ »

D-Day For Z.Cash

Today the first ever truly anonymous crypto currency ZEC went live. The full P2P client can be downloaded from here [Linux only for now]. The total number of ZEC coins will be only 21 million, like in bitcoin. Zerocash also reproduces few other unreasonable properties known from bitcoin: bizarre monetary policy with inelastic monetary supply and block halving every …

Continue reading ‘D-Day For Z.Cash’ »

Controversy Around Profitability of AltCoin Investment

There is a considerable controversy around whether investing in a balanced basket of cryptocoins is a good idea. Two serious sources show that this sort of investment enjoys steady growth without a lot of downturns, cf. DLT10 Index and a recent detailed study which concentrates on a shorter period with excellent returns since Jan 2016 (cf. also …

Continue reading ‘Controversy Around Profitability of AltCoin Investment’ »

Extended Deadline – Blockchain Research Competition – Blockchain Student Paper Competition – Cash Prizes, Job Openings

We encourage students and young researchers to submit their paper or their thesis work to our research competition.   Submissions are extended until 31 October. Cash prizes will be awarded and winners will be invited to present their work at an international blockchain conference. More details here and here and here and here is the submission link (some older and recent …

Continue reading ‘Extended Deadline – Blockchain Research Competition – Blockchain Student Paper Competition – Cash Prizes, Job Openings’ »

How Many 1024-bit Primes Have Backdoors?

So how did the NSA backdoored the Internet or did they??? New ground-breaking paper shows that DSA and DH mod P keys with 1024 bits are vulnerable to practical backdoors which can be exploited to break our secure communications. Few highlights: For such trapdoored primes the DL problem can be solved in 2 months by an academic cluster. The …

Continue reading ‘How Many 1024-bit Primes Have Backdoors?’ »