Natanael

joined 8 months ago
[–] Natanael 2 points 1 week ago* (last edited 1 week ago)

Literal copy and paste

I brought some stuff over from reddit subs, but I edited it thoroughly to fit here

[–] Natanael 65 points 1 week ago (1 children)

Crashing and then crashing

[–] Natanael 3 points 1 week ago

I don't think a single neutron star is a gas, but a neutron star binary system is a gas

[–] Natanael 5 points 1 week ago* (last edited 1 week ago) (3 children)

Neutron stars have so high pressure that MOST but not all protons decay into neutrons plus ~~electrons~~ positrons (plus neutrinos)

Edit: (see quote below)

[–] Natanael 3 points 1 week ago

This is why icons should be vector images, rendered into a bitmap for display only once the app knows the DPI and scaling

[–] Natanael 10 points 1 week ago

If they import contributions to the community edition into the pro edition without license assignment then it's still a GPL violation

[–] Natanael 3 points 1 week ago

Then why are people talking about squaring the circle

[–] Natanael 7 points 1 week ago (3 children)

It a very big Pi. Might even be a Tau.

[–] Natanael 7 points 1 week ago (1 children)

Look up Amazon Sidewalk

[–] Natanael 2 points 1 week ago

Still 911 or 112 or your local equivalent. Then they'll decide. If they think a crime happened they want police there quickly. If they don't, they'll have someone come around when there's free time.

[–] Natanael 2 points 1 week ago* (last edited 1 week ago)

Only a handful of movies like Avatar gets actual effort put into fully custom fake interfaces, where the producer has a big vision. But even most other blockbuster releases don't get that. Fast & The Furious with a dozen movies in the series? Nah. Anything where what's on the screen is just filler will simply not get a big budget for interfaces. Even for big budget movies.

[–] Natanael 11 points 1 week ago

The nearest church choir gets those

 

See also discussion here; https://reddit.com/comments/1jv572r

4
submitted 6 months ago* (last edited 6 months ago) by Natanael to c/crypto
 

Cryptology ePrint Archive
Paper 2025/585
Adaptively-Secure Big-Key Identity-Based Encryption
Jeffrey Champion, The University of Texas at Austin
Brent Waters, The University of Texas at Austin, NTT Research
David J. Wu, The University of Texas at Austin

Abstract
Key-exfiltration attacks on cryptographic keys are a significant threat to computer security. One proposed defense against such attacks is big-key cryptography which seeks to make cryptographic secrets so large that it is infeasible for an adversary to exfiltrate the key (without being detected). However, this also introduces an inconvenience to the user who must now store the large key on all of their different devices. The work of Döttling, Garg, Sekar and Wang (TCC 2022) introduces an elegant solution to this problem in the form of big-key identity-based encryption (IBE). Here, there is a large master secret key, but very short identity keys. The user can now store the large master secret key as her long-term key, and can provision each of her devices with short ephemeral identity keys (say, corresponding to the current date). In this way, the long-term secret key is protected by conventional big-key cryptography, while the user only needs to distribute short ephemeral keys to their different devices. Döttling et al. introduce and construct big-key IBE from standard pairing-based assumptions. However, their scheme only satisfies selective security where the adversary has to declare its challenge set of identities at the beginning of the security game. The more natural notion of security is adaptive security where the user can adaptively choose which identities it wants to challenge after seeing the public parameters (and part of the master secret key).

In this work, we give the first adaptively-secure construction of big-key IBE from standard cryptographic assumptions. Our first construction relies on indistinguishability obfuscation (and one-way functions), while our second construction relies on witness encryption for NP together with standard pairing-based assumptions (i.e., the SXDH assumption). To prove adaptive security, we show how to implement the classic dual-system methodology with indistinguishability obfuscation as well as witness encryption.

 

Abstract;

In this paper, we present the first practical algorithm to compute an effective group action of the class group of any imaginary quadratic order O on a set of supersingular elliptic curves primitively oriented by O. Effective means that we can act with any element of the class group directly, and are not restricted to acting by products of ideals of small norm, as for instance in CSIDH. Such restricted effective group actions often hamper cryptographic constructions, e.g. in signature or MPC protocols.

Our algorithm is a refinement of the Clapoti approach by Page and Robert, and uses 4-dimensional isogenies. As such, it runs in polynomial time, does not require the computation of the structure of the class group, nor expensive lattice reductions, and our refinements allows it to be instantiated with the orientation given by the Frobenius endomorphism. This makes the algorithm practical even at security levels as high as CSIDH-4096. Our implementation in SageMath takes 1.5s to compute a group action at the CSIDH-512 security level, 21s at CSIDH-2048 level and around 2 minutes at the CSIDH-4096 level. This marks the first instantiation of an effective cryptographic group action at such high security levels. For comparison, the recent KLaPoTi approach requires around 200s at the CSIDH-512 level in SageMath and 2.5s in Rust.

See also; https://bsky.app/profile/andreavbasso.bsky.social/post/3ljkh4wmnqk2c

0
🕵️‍♂️ (infosec.pub)
submitted 6 months ago* (last edited 6 months ago) by Natanael to c/crypto
 
33
submitted 6 months ago* (last edited 6 months ago) by Natanael to c/crypto
 

Via; https://bsky.app/profile/nicksullivan.org/post/3ll7galasrc2z

CFRG process documentation has been updated.

10
submitted 6 months ago* (last edited 6 months ago) by Natanael to c/crypto
2
How to Hold KEMs (durumcrustulum.com)
submitted 6 months ago by Natanael to c/crypto
 

From: https://mastodon.social/@fj/114171907451597856

Interesting paper co-authored by Airbus cryptographer Erik-Oliver Blass on using zero-knowledge proofs in flight control systems.

Sensors would authenticate their measurements, the control unit provides in each iteration control outputs together with a proof of output correctness (reducing the need in some cases for redundant computations), and actuators verify that outputs have been correctly computed

view more: ‹ prev next ›