Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Author: Tara Lie

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to the previously selected ML-KEM (based on CRYSTALS-Kyber). HQC, or “Hemming Quasi-Cyclic” in full, is a code-based KEM which utilises the cryptographically challenging Quasi-Cyclic Syndrome Decoding Problem as its base and built around the concept of error-correcting codes. NIST has stated that they have selected HQC as a backup algorithm to ML-KEM, which utilises a different mathematical approach. ML-KEM is a modular lattice-based algorithm which was first selected by NIST in 2022, and

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based on electron-based qubits, this revolutionary processor exploits Majorana particles, a revolutionary development in the field. At the World Governments Summit in Dubai last week, Google CEO Sundar Pichai compared quantum computing to artificial intelligence from a decade ago, highlighting its potential to reshape the future. Despite its promises, quantum computing remains one of the most complex challenges in modern science. Microsoft presents Majorana 1 In a revolutionary announcement on Wednesday, Microsoft presented

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.

Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors. However, quantum computers promise to considerably accelerate this process, thanks to an algorithm proposed by Peter Shor in 1994, which demonstrated that a quantum computer could break RSA encryption. Over the last 30 years, scientists have been actively developing quantum computers, but up until now they have not been able to create a powerful enough device to execute Shor’s algorithm. It requires a quantum computer with about 20 million qubits, while modern

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist, naturalised in Australia, who deals with quantum engineering at the School of Electrical Engineering and Telecommunications and is the Program Manager at the ARC Center of Excellence for Quantum Computation and Communication Technology (CQC2T) at the University of New South Wales in Australia. Morello’s research focuses primarily on the design and construction of the basic components of a quantum computer using the spins of individual atoms in silicon. His team was the

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of advanced computing solutions based on quantum technology. In particular the applications of Quantum Computing and of Quantum Communication will be explored in various fields, amongst which are cyber security, cryptography, machine learning, and optimisation problems. Several use cases will be analysed in different applicable areas of the national and international landscape, and public and private research activities will be monitored.  The objective is to share the real state of Quantum Computing and

The First Message Sent in the History of the Internet

Original Publication Date: Massimiliano Brolli, 25 September 2021 Today, exchanging a message through WhatsApp or Skype is a normal gesture, part of the activities we carry out in our daily lives. In all the history books, it is reported that on the evening of July 20, 1969 at 20:17, Neil Armstrong, after setting foot on the moon said the famous phrase: “One small step for man, one giant leap for mankind.” But on the evening of Wednesday, October 29th that same year at 10:30pm – practically three months later – there was another great leap for mankind, perhaps even more important than

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks by quantum computers. Quantum computers – that at the moment do not have concrete applications, as we saw in the interview with Prof. Morello from the ARC Center of Excellence for Quantum Computation in the University of New South Wales in Australia and from Prof. Severini, director of quantum technologies at Amazon Web Services (AWS) – have the potential to be much more powerful and efficient than current systems, allowing them to

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the exploration of new worlds and researching new civilisations, is forced to embark on a risky journey back in time. The objective: return to Earth, to 20th-century California, to solve complex energy and environmental issues. The mission entrusted to the crew by Starfllet is to recover and transport two of the last whale specimens to the 23rd century, to try to save their

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti, and led the team that built the Olivetti Programma 101 (P101), the first desktop computer in history. The P101, also known as the Perottina, was launched at the 1964 New York World Fair, and was even used by NASA to plan and calculate the space program’s orbits, including the Apollo 11 mission that took man to the moon. For those who would like more details on the Olivetti Programma 101, you can

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”

Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new alterations are so disruptive that they are adopted by other cybergangs due to how effective they are, introducing novelties or alternate ways to obtain a ransom payment. As we know, cyber gangs have recently moved to version 3.0, which we have previously analysed to compare it to previous versions. The cyber gangs, like any regular organisation, updates and evolves its “business model” by continuously innovating –  finding new ways to evade the