article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. It also said the researchers were overselling their findings.

Security 117
article thumbnail

Apple Announces Post-Quantum Encryption Algorithms for iMessage

Schneier on Security

Apple announced PQ3 , its post-quantum encryption standard based on the Kyber secure key-encapsulation protocol, one of the post-quantum algorithms selected by NIST in 2022. There’s a lot of detail in the Apple blog post , and more in Douglas Stabila’s security analysis. I am of two minds about this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A flaw in the encryption algorithm of Hive Ransomware allows retrieving encrypted files

Security Affairs

Researchers discovered a flaw in the encryption algorithm used by Hive ransomware that allowed them to decrypt data. Researchers discovered a flaw in the encryption algorithm used by Hive ransomware that allowed them to decrypt data without knowing the private key used by the gang to encrypt files. ” continues the paper.

article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

Security Risks of Client-Side Scanning

Schneier on Security

The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s We seem to have to do this every decade or so.)

Risk 120
article thumbnail

Terrapin attack allows to downgrade SSH protocol security

Security Affairs

Another pre-requirement is that the connection must be secured by either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC. ” continues the analysis. ” The researchers published a full technical paper titled “ Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation.”

Security 107
article thumbnail

Korean cybersecurity agency released a free decryptor for Hive ransomware

Security Affairs

The agency released an executable along with a user manual that provides step-by-step instructions to recover encrypted data for free. Hive ransomware uses a hybrid encryption scheme, but uses its own symmetric cipher to encrypt files. reads the paper published by researchers from Kookmin University (South Korea). “To