The Spyware
CRYSTALS-Dilithium: LWE-based digital signature
The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...
Leon Battista Alberti’s cipher disk, described in “De cifris” around 1467, is the first polyalphabetic encryption system. The device consists of two concentric discs, rotating relative to each other, containing...
Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...
Introduction: Physical Qubit vs Logical Qubit As discussed in the previous article, the unit of information processed by a quantum computer is generically called Qubit or Quantum Bit. However, for...
Abu Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindi was born in 801 in Kufa or Basra, Iraq, and died in Baghdad in 873. He is known as “the philosopher of the...
Introduction Among the numerous applications of the quantum computing model, the most relevant in the cryptographic field is represented by the work of the American computer scientist Peter W. Shor....
In cryptography, the Caesar cipher is one of the oldest cryptographic algorithms of which there is a historical trace. It is a mono-alphabetic substitution cipher, in which each letter of...
Introduction With the 1996 article “A fast quantum mechanical algorithm for database search,” Indian-American computer scientist Lov K. Grover helped highlight the non-negligible impact of quantum computing on cryptography in...
In the sacred texts, in particular in the Old Testament, three main secret writings can be found: the Atbash, the Albam and the Atbah. The first cipher code, Atbash, was...
Introduction Sometimes, in popular settings, the quantum computer is labeled as a particular “incredibly faster” computer. Although this consideration is not entirely far from reality, it is necessary to make...