cryptography
Quantum computers could usher in a crisis worse than Y2K
Quantum computers could cause a global security crisis that makes the once-feared millennium bug, or Y2K, look quaint. This infamous computer risk was averted through the persistent behind-the-scenes work of engineers across the world, but whether the new threat will be tackled similarly is an urgent yet unresolved question. Most digital communications and transactions are protected by cryptography based on mathematical problems that are unsolvable by conventional computers but are solvable by a sufficiently capable quantum computer. Researchers have understood this since the late 1990s, but the day when this capable-enough quantum computer comes online - or Q-Day - was thought to be very far in the future. Working quantum computers are now a reality, and recent leaps in how to use them are bringing Q-Day ever closer.
- North America > United States (0.15)
- Europe > Ukraine > Kyiv Oblast > Chernobyl (0.05)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.05)
- Health & Medicine (1.00)
- Banking & Finance (1.00)
- Information Technology > Security & Privacy (0.69)
- Information Technology > Hardware (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
A Quantum Leap for the Turing Award
Charles Bennett and Gilles Brassard pioneered quantum information theory. Now they've been awarded the highest honor in computer science. Today it's widely acknowledged that the future of computing will involve the quantum realm . Companies like Google, Microsoft, IBM, and a few well-funded startups are frantically building quantum computers and routinely claiming advances that seem to bring this exotic, world-changing technology within reach. In 1979 all of this was unthinkable.
- Asia > Middle East > Iran (0.16)
- Asia > Middle East > UAE (0.15)
- North America > United States > California (0.05)
- (6 more...)
- Information Technology (0.71)
- Banking & Finance > Trading (0.71)
- Government > Regional Government > North America Government > United States Government (0.70)
- Education > Curriculum > Subject-Specific Education (0.48)
- Information Technology > Hardware (0.92)
- Information Technology > Artificial Intelligence > Natural Language (0.48)
CryptoQA: A Large-scale Question-answering Dataset for AI-assisted Cryptography
Elfares, Mayar, Reisert, Pascal, Dietz, Tilman, Barman, Manpa, Zaki, Ahmed, Küsters, Ralf, Bulling, Andreas
Large language models (LLMs) excel at many general-purpose natural language processing tasks. However, their ability to perform deep reasoning and mathematical analysis, particularly for complex tasks as required in cryptography, remains poorly understood, largely due to the lack of suitable data for evaluation and training. To address this gap, we present CryptoQA, the first large-scale question-answering (QA) dataset specifically designed for cryptography. CryptoQA contains over two million QA pairs drawn from curated academic sources, along with contextual metadata that can be used to test the cryptographic capabilities of LLMs and to train new LLMs on cryptographic tasks. We benchmark 15 state-of-the-art LLMs on CryptoQA, evaluating their factual accuracy, mathematical reasoning, consistency, referencing, backward reasoning, and robustness to adversarial samples. In addition to quantitative metrics, we provide expert reviews that qualitatively assess model outputs and establish a gold-standard baseline. Our results reveal significant performance deficits of LLMs, particularly on tasks that require formal reasoning and precise mathematical knowledge. This shows the urgent need for LLM assistants tailored to cryptography research and development. We demonstrate that, by using CryptoQA, LLMs can be fine-tuned to exhibit better performance on cryptographic tasks.
- North America > United States (0.92)
- Europe (0.67)
- Asia > Middle East > UAE (0.27)
Inside the Multimillion-Dollar Plan to Make Mobile Voting Happen
Political consultant Bradley Tusk has spent a fortune on mobile voting efforts. Now, he's launching a protocol to try to mainstream the technology. Joe Kiniry, a security expert specializing in elections, was attending an annual conference on voting technology in Washington, DC, when a woman approached him with an unusual offer. She said she represented a wealthy client interested in funding voting systems that would encourage bigger turnouts. Did he have any ideas?
- North America > United States > District of Columbia > Washington (0.24)
- North America > United States > New York (0.04)
- North America > United States > California (0.04)
- (5 more...)
- Government > Voting & Elections (1.00)
- Information Technology (0.69)
- Government > Regional Government > North America Government > United States Government (0.47)
- Information Technology > Security & Privacy (0.50)
- Information Technology > Artificial Intelligence (0.49)
- Information Technology > Communications > Mobile (0.48)
Quantum-Resistant Networks Using Post-Quantum Cryptography
Jin, Xin, Chandra, Nitish Kumar, Azari, Mohadeseh, Seshadreesan, Kaushik P., Liu, Junyu
Quantum networks rely on both quantum and classical channels for coordinated operation. Current architectures employ entanglement distribution and key exchange over quantum channels but often assume that classical communication is sufficiently secure. In practice, classical channels protected by traditional cryptography remain vulnerable to quantum adversaries, since large-scale quantum computers could break widely used public-key schemes and reduce the effective security of symmetric cryptography. This perspective presents a quantum-resistant network architecture that secures classical communication with post-quantum cryptographic techniques while supporting entanglement-based communication over quantum channels. Beyond cryptographic protection, the framework incorporates continuous monitoring of both quantum and classical layers, together with orchestration across heterogeneous infrastructures, to ensure end-to-end security. Collectively, these mechanisms provide a pathway toward scalable, robust, and secure quantum networks that remain dependable against both classical and quantum-era threats.
- North America > United States > Pennsylvania > Allegheny County > Pittsburgh (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- Asia > Middle East > Jordan (0.04)
- Asia > China (0.04)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Hardware (1.00)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence (1.00)
Red Teaming Quantum-Resistant Cryptographic Standards: A Penetration Testing Framework Integrating AI and Quantum Security
This study presents a structured approach to evaluating vulnerabilities within quantum cryptographic protocols, focusing on the BB84 quantum key distribution method and National Institute of Standards and Technology (NIST) approved quantum-resistant algorithms. By integrating AI-driven red teaming, automated penetration testing, and real-time anomaly detection, the research develops a framework for assessing and mitigating security risks in quantum networks. The findings demonstrate that AI can be effectively used to simulate adversarial attacks, probe weaknesses in cryptographic implementations, and refine security mechanisms through iterative feedback. The use of automated exploit simulations and protocol fuzzing provides a scalable means of identifying latent vulnerabilities, while adversarial machine learning techniques highlight novel attack surfaces within AI-enhanced cryptographic processes. This study offers a comprehensive methodology for strengthening quantum security and provides a foundation for integrating AI-driven cybersecurity practices into the evolving quantum landscape.
- North America > United States > California > Los Angeles County > Long Beach (0.04)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (0.66)
- Government > Military > Cyberwarfare (0.49)
Crypto-ncRNA: Non-coding RNA (ncRNA) Based Encryption Algorithm
Wang, Xu, Wang, Yiquan, Huang, Tin-yeh
A BSTRACT In the looming post-quantum era, traditional cryptographic systems are increasingly vulnerable to quantum computing attacks that can compromise their mathematical foundations. To address this critical challenge, we propose crypto-ncRNA--a bio-convergent cryptographic framework that leverages the dynamic folding properties of non-coding RNA (ncRNA) to generate high-entropy, quantum-resistant keys and produce unpredictable ciphertexts. The framework employs a novel, multi-stage process: encoding plaintext into RNA sequences, predicting and manipulating RNA secondary structures using advanced algorithms, and deriving cryptographic keys through the intrinsic physical unclonability of RNA molecules. Experimental evaluations indicate that, although cryptoncRNA's encryption speed is marginally lower than that of AES, it significantly outperforms RSA in terms of efficiency and scalability while achieving a 100% pass rate on the NIST SP 800-22 randomness tests. These results demonstrate that crypto-ncRNA offers a promising and robust approach for securing digital infrastructures against the evolving threats posed by quantum computing. Moreover, with the rapid advancement of artificial intelligence, RNA-based research has gradually unfolded into a new realm of innovation (Townshend et al. (2021)). Recent studies showed that the dynamic folding processes of RNA molecules intrinsically exhibit physical unclonable functions (PUFs) characteristics (Herder et al. (2014); Li et al. (2022); Luescher et al. (2024); Zhou et al. (2021)), thereby establishing a pathway for designing post-quantum cryptography (PQC) systems (Arapinis et al. (2021); Cambou et al. (2021)).
- North America > United States (0.46)
- Asia > China (0.28)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine (0.93)
- Banking & Finance > Trading (0.86)
An LLM Framework For Cryptography Over Chat Channels
Gligoroski, Danilo, Raikwar, Mayank, Jha, Sonu Kumar
Recent advancements in Large Language Models (LLMs) have transformed communication, yet their role in secure messaging remains underexplored, especially in surveillance-heavy environments. At the same time, many governments all over the world are proposing legislation to detect, backdoor, or even ban encrypted communication. That emphasizes the need for alternative ways to communicate securely and covertly over open channels. We propose a novel cryptographic embedding framework that enables covert Public Key or Symmetric Key encrypted communication over public chat channels with humanlike produced texts. Some unique properties of our framework are: 1. It is LLM agnostic, i.e., it allows participants to use different local LLM models independently; 2. It is pre- or post-quantum agnostic; 3. It ensures indistinguishability from human-like chat-produced texts. Thus, it offers a viable alternative where traditional encryption is detectable and restricted.
Exploring the Technology Landscape through Topic Modeling, Expert Involvement, and Reinforcement Learning
In today's rapidly evolving technological landscape, organizations face the challenge of integrating external insights into their decision-making processes to stay competitive. To address this issue, this study proposes a method that combines topic modeling, expert knowledge inputs, and reinforcement learning (RL) to enhance the detection of technological changes. The method has four main steps: (1) Build a relevant topic model, starting with textual data like documents and reports to find key themes. (2) Create aspect-based topic models. Experts use curated keywords to build models that showcase key domain-specific aspects. (3) Iterative analysis and RL driven refinement: We examine metrics such as topic magnitude, similarity, entropy shifts, and how models change over time. We optimize topic selection with RL. Our reward function balances the diversity and similarity of the topics. (4) Synthesis and operational integration: Each iteration provides insights. In the final phase, the experts check these insights and reach new conclusions. These conclusions are designed for use in the firm's operational processes. The application is tested by forecasting trends in quantum communication. Results demonstrate the method's effectiveness in identifying, ranking, and tracking trends that align with expert input, providing a robust tool for exploring evolving technological landscapes. This research offers a scalable and adaptive solution for organizations to make informed strategic decisions in dynamic environments.
- Information Technology > Security & Privacy (1.00)
- Energy > Oil & Gas > Upstream (0.46)
Fine-Tuning Topics through Weighting Aspect Keywords
Topic modeling often requires examining topics from multiple perspectives to uncover hidden patterns, especially in less explored areas. This paper presents an approach to address this need, utilizing weighted keywords from various aspects derived from a domain knowledge. The research method starts with standard topic modeling. Then, it adds a process consisting of four key steps. First, it defines keywords for each aspect. Second, it gives weights to these keywords based on their relevance. Third, it calculates relevance scores for aspect-weighted keywords and topic keywords to create aspect-topic models. Fourth, it uses these scores to tune relevant new documents. Finally, the generated topic models are interpreted and validated. The findings show that top-scoring documents are more likely to be about the same aspect of a topic. This highlights the model's effectiveness in finding the related documents to the aspects.
- North America > Canada > Ontario > National Capital Region > Ottawa (0.14)
- Asia > Middle East > Jordan (0.04)
- North America > United States (0.04)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Overview (1.00)
- Research Report > New Finding (0.87)