News

It all begins with mathematics really - the one true scientific language, so they say. Cryptography has been around as early as 4000 years ago, doing what it still does today - ensuring that secrets ...
You can make a message secret in countless different ways. One common way is to use a substitution cipher, in which one letter is substituted for another. Another is to employ a transposition cipher, ...
Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
The Cybersecurity and Infrastructure Security Agency is pushing forward on its oversight of federal post-quantum cryptography migration, unveiling a strategy document last week that details how the ...
Malicious hacking is getting increasingly sophisticated, and that’s leading to a very clear trend in security technology. To keep people and organizations safe, security also has to continue improving ...
In the never-ending arms race between secret-keepers and code-breakers, the laws of quantum mechanics seemed to have the potential to give secret-keepers the upper hand. A technique called quantum ...
Fabric Cryptography, a hardware startup by MIT and Stanford dropouts (and married couple) Michael Gao and Tina Ju, wants to make modern cryptographic techniques like zero-knowledge proof (which lets ...