paint-brush
Cryptography Trends and News for 2020 by@wagslane
1,780 reads
1,780 reads

Cryptography Trends and News for 2020

by Lane WagnerApril 2nd, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

LBC-based Cryptography is one of our best bets for secure "Post Quantum Cryptography" Almost half of the second round of NIST's PQC contest is based on lattice math. Bitcoin might be switching to Schnorr signatures in order to get more efficiency when signing transactions. A new test is founded which can help detect similar problems moving forward. A paper exposing a vulnerability in Apple's CoreCrypto Library exposes 11 out of 12 implemented hashes, but MD2 is the only function to remain secure.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Cryptography Trends and News for 2020
Lane Wagner HackerNoon profile picture

Quantum Computing

Quantum computing may not be coming quite as fast as some in the field had certainly feared (or perhaps hoped). Google did, however, solve an impressive problem this year.

They published a paper in . It stated that their quantum processor solved a problem that, in contrast, a digital computer would take 10,000 years to solve. The problem that was solved deals with generating certifiably random numbers. Their processor, 'Sycamore', uses 53 qubits, which corresponds to a search space of 1016.

Lattice-Based Cryptography

Lattice-based Cryptography (LBC) is one of our best bets for secure "Post Quantum Cryptography". Therefore, almost half of the second round of is based on lattice math.

Lattice crypto is often based on the . A problem where, given a basis of a and a , the goal is to find the shortest non-zero vector.

In addition, Matthew Dozer has a great introductory video:

Bitcoin - Schnorr Signatures

Instead of the current implementation, Bitcoin might be switching to in order to get more efficiency when signing transactions. Instead of signing each transaction separately, with Schnorr, we can generate a single signature to validate many transactions at once. This allows Bitcoin to scale by requiring less data to be broadcast on the network when grouping transactions.

More Rigorous Testing of Hash Functions

Also, Nicky Mouha exposing a vulnerability in Apple's CoreCrypto Library. This affects 11 out of 12 implemented hashes. However, MD2 is the only function to remain secure. As a result, a new test is founded which can help detect similar problems moving forward

Thanks

Lane on Twitter: 

Lane on Dev.to: 

Download Qvault: 

Star our Github: 



바카라사이트 바카라사이트 온라인바카라