Advertisement · 728 × 90

Posts by The Mathematics of Secrets

H/T @quantamagazine.bsky.social

2 weeks ago 0 0 0 0
Preview
New Advances Bring the Era of Quantum Computers Closer Than Ever | Quanta Magazine Two research groups say they have significantly reduced the amount of qubits and time required to crack common online security technologies.

Still incremental improvements in #quantumcomputing theory, but could be important soon! www.quantamagazine.org/new-advances...

2 weeks ago 0 0 1 0
Preview
Why spies still use WW1-era encrypted radio broadcasts - ABC listen Short-wave radio enthusiasts have eagerly reported the appearance of Farsi-language encoded messages being broadcast out of Western Europe. The messages are being transmitted via number stations, which are radio broadcasts used by intelligence agencies to send encrypted messages to agents in the field. It is one of the oldest forms of clandestine communication, dating back to the first World War, and is still used by modern intelligence agencies today because they're almost impossible to decipher.

A very nice explanation on why #cryptography of one-time pad as used by the famous spy “number stations” still has some advantages over the modern digital methods

www.abc.net.au/listen/programs/sundayex...

3 weeks ago 6 4 0 0
Preview
Anonymous credentials: an illustrated primer This post has been on my back burner for well over a year. This has bothered me, since with every month that goes by, I become more convinced that anonymous authentication the most important topic …

Using #cryptography for anonymous ID verfification --- cool and useful! @matthewdgreen.bsky.social

blog.cryptographyengineering.com/2026/03/02/a...

4 weeks ago 1 1 0 0

You’re very welcome!

1 month ago 2 0 0 0

Fooled you, Daylight Savings Time! The hour you took from me last night was actually the hour I took when I fled Eastern Time the night before!

1 month ago 0 0 0 0

From @tenorfrank.bsky.social

1 month ago 1 0 1 0
Farris Exhibitions

Have you seen this: webpages.scu.edu/ftp/ffarris/...

1 month ago 1 0 1 0
Advertisement
Post image

Yubikeys using ML-DSA including ML-DSA-87 are coming!

1 month ago 13 2 0 3
Video

#fractal #fractalart #fractalwork #fractalartwork #artwork #math #mathematics #maths

1 month ago 2 2 0 0
Preview
Here's why Scotch tape screeches when it's peeled Micro-cracks travel along the peeling tape at supersonic speeds, producing shock waves and sound pulses.
1 month ago 66 10 3 3
Video

Not sure what phase of my life I’m in, but here’s that modelling balloon icosidodecahedron nobody asked for!

In theory it could be made out of a single modelling balloon, although in reality they don’t make balloons long enough :(

1 month ago 41 5 0 2

Shape nerds ASSEMBLE!

(In an icosahedral symmetry formation)

1 month ago 23 3 0 0
Preview
Connecting the Dots: An Investigative Study on Linking Private User Data Across Messaging Apps - NDSS Symposium View More Papers

Think your burner number keeps you anonymous? Kang et al. reveal a severe privacy threat, a cross-platform linking attack targeting messaging apps. Using contact discovery and SSO, it deanonymizes users and pinpoints their physical locations.

1 month ago 3 4 0 0

Today I was looking at an article on Multi-Party Threshold #Cryptography and wondered why "threshold" has only one h. Turns out the etymology is not "thresh-hold" at all, but "thresh-wold", possibly from the Middle English word "wold" meaning "forest". Mind blown.

2 months ago 5 2 1 0
Advertisement

For my next book, I’m reading some mid-20th century papers on color vision. These guys will go on for pages about the kind of filters they use, and then their discussion of the test subjects will be “we took the measurements on Mr. Perley G. Nutting, Jr., who sat still for a really long time.”

3 months ago 1 0 0 0

Love that paper!

3 months ago 1 0 0 0
Post image

At 26, during the Reign of Terror in France, Jean-Baptiste Joseph Fourier narrowly avoided the guillotine. A decade later, he made a discovery that changed mathematics forever.
www.quantamagazine.org/what-is-the-...

4 months ago 42 13 2 1
Figure 6. The quotientope lattice for n = 4: all quotientopes ordered by inclusion (which corresponds to refinement of the lattice congruences). We only consider lattice congruences whose fan
is essential. We have highlighted the cube (green), Loday’s associahedron [Lod04] (blue), another
one of Hohlweg–Lange’s associahedra [HL07] (purple), the diagonal rectangulation polytope [LR12]
(orange), and the permutahedron (red). Adapted from [PS19, Fig. 9].

Figure 6. The quotientope lattice for n = 4: all quotientopes ordered by inclusion (which corresponds to refinement of the lattice congruences). We only consider lattice congruences whose fan is essential. We have highlighted the cube (green), Loday’s associahedron [Lod04] (blue), another one of Hohlweg–Lange’s associahedra [HL07] (purple), the diagonal rectangulation polytope [LR12] (orange), and the permutahedron (red). Adapted from [PS19, Fig. 9].

This diagram should win some kind of prize for mathematical illustration. From arxiv.org/abs/2305.08471. 🧮

4 months ago 38 4 1 0
The Complete Secrets of Kryptos: Jim Sanborn's Private Archive | RR Sold for $962,500 | Jim Sanborn's original Kryptos archive that reveals the secrets of K4 and the much anticipated K5, plus an afternoon with Sanborn as he p

Looks like the Kryptos kerfuffle didn't hurt the auction much! #cryptography www.rrauction.com/auctions/lot...

4 months ago 1 0 0 0
LeaKissner (@leak@hachyderm.io) Cryptography is a tool for turning a whole swathe of problems into key management problems. Key management problems are way harder than (virtually all) cryptographers think.

So, the IACR held an election, but one of the three trustees lost their private key, which prevented them from verifying the results of the election. Forcing them to start over.

The cryptography association was foiled by key management.

hachyderm.io/@leak/110784...

4 months ago 34 5 0 0
picture of text. For this election and in accordance with the bylaws of the ACR, the three members of the ACR 2025 Election Committee acted as independent trustees, each holding a portion of the cryptographic key material required to jointly decrypt the results. This aspect of Helios' design ensures that no two trustees could collude to determine the outcome of an election or the contents of individual votes on their own: all trustees must provide their decryption shares.
Unfortunately, one of the three trustees has irretrievably lost their private key, an honest but unfortunate human mistake, and therefore cannot compute their decryption share. As a result, Helios is unable to complete the decryption process, and it is technically impossible for us to obtain or verify the final outcome of this election.

picture of text. For this election and in accordance with the bylaws of the ACR, the three members of the ACR 2025 Election Committee acted as independent trustees, each holding a portion of the cryptographic key material required to jointly decrypt the results. This aspect of Helios' design ensures that no two trustees could collude to determine the outcome of an election or the contents of individual votes on their own: all trustees must provide their decryption shares. Unfortunately, one of the three trustees has irretrievably lost their private key, an honest but unfortunate human mistake, and therefore cannot compute their decryption share. As a result, Helios is unable to complete the decryption process, and it is technically impossible for us to obtain or verify the final outcome of this election.

This IACR election news is so relatable

4 months ago 11 1 0 0

Did you know?
Keccak is everywhere, quietly protecting real systems, such as:
• Connected devices checking data integrity
• Firmware updates verifying authenticity
• Embedded products securing messages
• PQC standards like ML-KEM, ML-DSA, and SLH-DSA

4 months ago 2 1 1 0
Preview
“Key Management” is the cryptographic community’s version of “…it’s always DNS” International Association for Cryptologic Research runs secure vote and then loses the keys so nobody knows what the result is. As one commenter put it: “So a single member can collude to res…

“Key Management” is the cryptographic community’s version of “…it’s always DNS”
https://alecmuffett.com/article/126061
#cryptography #iacr

4 months ago 8 3 1 0
Advertisement
Preview
Post-Quantum Cryptography in .NET - .NET Blog What we've added for PQC, and how we got there.

Post-Quantum Cryptography in .NET

ift.tt/osS9nPf

#dotnet #pqc #cryptography #programming #csharp

4 months ago 2 2 0 0
Post image

This December, the Faculty of Engineering at #USyd is delighted to welcome Dr Moti Yung, who will speak at the Basser seminar series in our School. He will tell us about "Malicious Cryptography: beyond adhering to specifications in secure systems"

🕒 Tuesday, Dec 2
3:30—4:30pm

4 months ago 2 5 1 2
Preview
Physicists Take the Imaginary Numbers Out of Quantum Mechanics | Quanta Magazine Quantum mechanics has at last been formulated exclusively with real numbers, bringing a mathematical puzzle at the heart of the theory into a new era of inquiry.

Hot take: I hate to say it, but this is silly. Mathematicians have known for at least a century that you can replace imaginary numbers with 2x2 matrices of real numbers. Would the result be useful? Sounds like the answer is no. #quantumcomputing www.quantamagazine.org/physicists-t...

5 months ago 3 0 0 0
Part Four of The Kryptos Sculpture Two people found the solution. They used the power of research, not cryptanalysis, finding clues amongst the Sanborn papers at the Smithsonian’s Archives of American Art. This comes as an awkward time, as Sanborn is auctioning off the solution. There were legal threats—I don’t understand their basis—and the solvers are not publishing their solution.
5 months ago 1 1 0 0
Solution to CIA’s Kryptos Sculpture Is Found in Smithsonian Vault Jim Sanborn planned to auction off the solution to Kryptos, the puzzle he sculpted for the intelligence agency’s headquarters. Two fans of the work then discovered the solution.

Well, that's a #cryptography oops. web.archive.org/web/20251016...

5 months ago 2 2 0 0
The Mathematics of Secrets https://wordpress.rose-hulman.edu/holden/the-mathematics-of-secrets/

Doing some profile editing --- this should really be a pinned post, not my bio!

In his book The Mathematics of Secrets, Joshua Holden takes readers on a tour of the mathematics behind cryptography—the science of sending secret messages.

mathofsecrets.com

6 months ago 0 1 1 0