Category Archives: Crittografia

CrypTO: Telsy’s contribution in the organization of the CrypTO national webconference of Turin’s Polytechnic

CrypTO: Telsy’s contribution in the organization of the CrypTO national webconference of Turin’s Polytechnic

The Polytechnic of Turin has organized with the collaboration of Telsy, the CrypTO national webconference. It will take place on 27th and 28th of May 2021. The organizers are Danilo Bazzanella, Laura Capuano, Antonio Di Scala, Simone Dutto, Guglielmo Morgari, and Carlo Sanna. You may find more information on this event here: https://crypto.polito.it/crypto_conference_2021 For 160 years, the Polytechnic of Turinhas is one of the most prestigious public institutions at both the International and the Italian levels concerning scientific subjects and research on technological innovation. CrypTO: the importance of cryptography Nowadays, cryptography is having an increasing importance in contemporary society for the effort of assuring secure communications. Among many other uses, it is the […]

Enigma: a story about cipher mishandling

Enigma: a story about cipher mishandling

Enigma was a portable cipher machine producing a polyalphabetic substitution cipher. It had up to 5 rotor scramblers. Many versions included many sets of plugboard connections, which allowed a further swap of a letter with another once encrypted. Its inventor Arthur Scherbius originally developed it for commercial use in the 1920s. He later sold it to German Armed Forces since the early 1930s. The military Enigma equipped with 5 rotors and 10 plugboard connections has 158,962,555,217,826,360,000 possible combinations. Good operating procedures, properly enforced, would have made Enigma unbreakable in the 1940s. History teaches us that this was not the case. Many historians agree that the Allies won WW2 thanks to the deciphering of […]

Cloud, Edge Computing and the future of cybersecurity

Cloud, Edge Computing and the future of cybersecurity

Cloud Computing is today a fully consolidated and still expanding reality, but the exponential development of IoT and 5G technology is increasingly attracting attention to Edge computing, a new distributed computing model designed to bring data processing to as close as possible to where the latter was produced. The debate on which is the best system to adopt, especially with regards to IT security, is still heated, given that both systems have advantages and disadvantages according to the different applications. The advantages and vulnerabilities of the Cloud Cloud computing undoubtedly has several advantages, since it is a flexible and inexpensive system that has also already been proven by years of […]

Steganography: from its origins to the present

Steganography: from its origins to the present

The term steganography refers to a technique that aims to hide communication between two interlocutors. The term is composed precisely of the Greek words στεγανός (covered) and γραφία (writing). Unlike encryption, which allows you to encrypt a message so as to make it incomprehensible if you do not have a key to decipher it, steganography aims to keep the very existence of the message away from prying eyes, by hiding it. The origins Traces of steganography already existed in ancient Greece, when Herodotus narrated two examples in his Stories, but the first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography […]

War and cryptography: the challenge of quantum communication

War and cryptography: the challenge of quantum communication

Message encryption has always been a very important tool within the military, stretching back to the time of the ancient Greeks to the present day. It is natural for two armies in war to seek information about each other, both to learn about enemy strategies before battle, as well as to discover its movements during it. In order to obtain this information, “cryptoanalysis” was born, that is the study of decrypting encrypted messages without knowing their encryption key. It is easy to assume that if an army, through cryptoanalysis, manages to decipher the enemy’s communications, it can gain a fundamental strategic advantage. To be precise, it must be specified that […]

Quantum challenges to cryptography: why the future is already here

Quantum challenges to cryptography: why the future is already here

More and more often, we hear rather dramatic and movie-like statements about how the quantum era will change many aspects of our life, among which also cryptography and, therefore, security. It often feels like we are about to be thrown in a sci-fi movie in which we will live an extremely high-tech life, surrounded by super intelligent machines and ultra-powerful computers. At the same time, it feels like we have been at the edge of this “brave” new world for quite a bit of time, but never really in it; as if it was just a matter of time – even though  we cannot really say how long – before […]

ON THE CONDITION NUMBER OF THE VANDERMONDE MATRIX OF THE nTH CYCLOTOMIC POLYNOMIAL

ON THE CONDITION NUMBER OF THE VANDERMONDE MATRIX OF THE nTH CYCLOTOMIC POLYNOMIAL

Edoardo Signorini is an undergraduate student who is currently working on various projects in Telsy, while writing his thesis about the “Post Quantum Cryptography”. Furthermore, he also published his work together with two professors of the Polytechnic of Turin, Carlo Sanna and Antonio Jose’ Di Scala, as a part of the amazing job that he is doing within the Company. Following the abstract: Recently, Blanco-Chac´on proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the Vandermonde matrix Vn associated to the nth cyclotomic polynomial. We prove […]

Telsy Event: “An overview on cryptanalysis of ARX ciphers”

Telsy Event: “An overview on cryptanalysis of ARX ciphers”

Telsy has organized the following event in collaboration with the University of Turin: “An overview on cryptanalysis of ARX ciphers” The event will take place on 22 on November, at Turin University (Aula 2), in ‘’Via Carlo Alberto 10’’ Following, a short abstract: ‘’ We present some features of block ciphers based on the three operations: addition mod 2n, rotation and XOR (ARX ciphers) and themain cryptanalytic attacks obtained by developing the methods underlying differential cryptanalysis. We focus on the recent tecnique of rotational-XOR differential cryptanalysis giving some ideas of this attack and its application to SPECK 32/64.’’ Have a look here for more info

Hacking Artificial Intelligence

Hacking Artificial Intelligence

Will hacking artificial intelligence be the most severe threat of the near future? Indeed, enemies of the future will not necessarily need bombs, missiles or atomic weapons to instil terror in civilian populations. Then ,they will need only some tape, scissors and good practical skills and they can magically transform a stop sign into a green light in the eyes of a self-driving car, causing crashes and disorder. Using an Artificial Intelligence attack (AI attack) adversaries can manipulate AI systems in order to alter their behaviour to serve a malicious end goal. The real effect of these attacks grows as artificial intelligence and IoT systems are further integrated into critical […]

Seminar – “An introduction to secure multi – party computation”

Seminar – “An introduction to secure multi – party computation”

Telsy seminar of Giuseppe D’Alconzo entitled : ‘’ An introduction to secure multi – party computation’’ The seminar, organized with The Polytechnic University of Turin, will be held on Monday 15 July at 14.30 PM in Polytechnic’s Aula Buzano – Dipartimento di Scienze Matematiche Abstract: Secure Multi Party Computation (MPC) is a branch of cryptography that allows a set of players to evaluate a public function on private inputs, revealing no information about them apart from the computed output. It is an alternative to the strong assumption of the existence of a trusted party. It was born in the 1980s as a theoretical and not so treatable field for its computational […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close