The article discusses the current state of post-quantum cryptography as of February 2025, highlighting developments in quantum computer capabilities, error correction, and the industry's focus on hybrid key exchanges in TLS 1.3. It reviews NIST's standardized post-quantum algorithms and their implementation in browsers and libraries. The article also addresses the challenges of supporting multiple hybrid key exchanges and the slow adoption of necessary standards.
MadLab has launched a soldering kit that delivers a functional recreation of a World War II German Enigma cryptography machine powered by a Raspberry Pi Pico's RP2040 microcontroller.
Reticulum is a cryptography-based networking stack for building local and wide-area networks, designed to operate even in adverse conditions and without central control. It emphasizes user autonomy, security, and interoperability among networks.
This article details the results of multispectral imaging on the Voynich Manuscript, revealing previously hidden text and potentially identifying the handwriting of Johannes Marcus Marci.
import EasyCrypt
keystring = "SixteenByteKey!!"
inpstring = "Some super secret string, that I don't want you to see."
# This is the initialisation vector/nonce. I generated it with the below code. As you
# will need it to decrypt later on, you might want to store it and not just generate it each time
# I just generated it like this and printed this one out to store it.
#
# import os
# from binascii import hexlify, unhexlify
# ivstring = hexlify(os.urandom(16)).decode()
ivstring = "aba0a3bde34a03487eda3ec96d5736a8"
crypted = EasyCrypt.encrypt_string(keystring, inpstring, ivstring)
print(crypted)
decrypted = EasyCrypt.decrypt_string(keystring, crypted, ivstring)
print(decrypted)