algorithm
-
ePrint Report: A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks) Gao Ming P vs NP problem is the most important unresolved problem in the field of computational complexity. Its impact has penetrated into all aspects of algorithm design, especially in the field of cryptography. The security of cryptographic…
-
arXiv:2502.07815v1 Announce Type: new Abstract: Detecting sensitive data such as Personally Identifiable Information (PII) and Protected Health Information (PHI) is critical for data security platforms. This study evaluates regex-based pattern matching algorithms and exact-match search techniques to optimize detection speed, accuracy, and scalability. Our benchmarking results indicate that Google RE2 provides the best balance of…
-
An encryption algorithm that passes security tests and seems flawless… But once it goes live, imagine accounts being taken over without a single click. So, how did I make this possible? 1) We have a demo environment alongside the target application. Let’s call our target application “redacted.com” and the demo application “demo.com”. The demo environment…
-
A vulnerability, which was classified as very critical, was found in Microsoft Windows 11 24H2/Server 2022 23H2/Server 2025. Affected is an unknown function of the component NTLM V1. The manipulation leads to incorrect implementation of authentication algorithm. This vulnerability is traded as CVE-2025-21311. It is possible to launch the attack remotely. There is no exploit…
-
A vulnerability was found in Oracle Application Server 9.0.2.3 and classified as problematic. This issue affects some unknown processing of the component Encryption Algorithm. The manipulation leads to missing encryption of sensitive data. The identification of this vulnerability is CVE-2004-2134. The attack needs to be approached locally. Furthermore, there is an exploit available.
-
An updated biometric algorithm for latent fingerprint identification from Innovatrics has landed at the top of the U.S. government’s Evaluation of Latent Fingerprint Technologies (ELFT). The algorithm submitted on December 11 to the National Institute of Standards and Technology’s (NIST’s) ELFT scored the top rank-1 hit rate at 98.2 percent, and also placed first in…
-
I have an idea for a mathematical method to encrypt data which is impossible to decrypt, even for quantum computers, but i am not sure if i should use this algorithm for an OS or for some other project. It would be great for encrypt personal data, and for comunications with other devices the only…
-
﷽ Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor of the Malware Binary Triage (IMBT) course starting this Black Friday and Cyber Monday! Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: This is an affiliate link – your enrollment…
-
﷽ Hello, cybersecurity enthusiasts and white hackers! After my presentation and workshop at a conference in Luxembourg where I touched on the abuse of cryptographic functions in the internal structure of Windows OS, many colleagues and readers increasingly have questions about the use of cryptography in protecting malware during its development. This post is the…
-
The meteoric rise in power and popularity of machine learning models dependent on valuable training data has reignited a basic tension between the power of running a program locally and the risk of exposing details of that program to the user. At the same time, fundamental properties of quantum states offer new solutions to data…
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
/* * hack.c * Lucifer payload encryption/decryption * author: @cocomelonc * https://cocomelonc.github.io/malware/2024/10/20/malware-cryptography-33.html */ #include <stdio.h> #include <stdbool.h> #include <string.h> #include <windows.h> #define block_size 16 // 128 bit#define key_size 16 // 128 bit static const unsigned char s0[16] = {0x0C, 0x0F, 0x07, 0x0A, 0x0E, 0x0D, 0x0B, 0x00,0x02, 0x06, 0x03, 0x01, 0x09, 0x04, 0x05, 0x08}; static const…
-
The Cyber-Physical Security Lab at Georgia Tech has developed an algorithm that enhances critical infrastructure security by more accurately identifying devices vulnerable to remote cyberattacks. The algorithm, named PLCHound, used advanced natural language processing (NLP) and machine learning (ML) techniques to sift through large databases of internet records and log the IP address and security…
-
[Submitted on 17 Dec 2023 (v1), last revised 15 Oct 2024 (this version, v4)] View a PDF of the paper titled A Novel RFID Authentication Protocol Based on A Block-Order-Modulus Variable Matrix Encryption Algorithm, by Yan Wang and 7 other authors
-
Uncovering Domains Created by Octo2’s Domain Generation Algorithm – DomainTools | Start Here. Know Now.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
﷽ Hello, cybersecurity enthusiasts and white hackers! This post is the result of my own research on using FEAL-8 block cipher on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload. FEAL Akihiro Shimizu and Shoji Miyaguchi from NTT Japan developed…
-
TikTok is giving users a way to more precisely shape what kind of content they see on their feeds — or at least signal to the algorithm what they’re interested in.
-
Tara Lie : 27 August 2024 13:11 Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors. However, quantum computers promise to considerably accelerate this process, thanks to an algorithm proposed by Peter Shor in 1994, which…
-
Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic ePrint Report For more than two decades, pairings have been a fundamental tool for designing elegant cryptosystems, varying from digital signature schemes to more complex privacy-preserving constructions. However, the advancement of quantum computing threatens to undermine public-key cryptography. Concretely, it is widely accepted that a future large-scale quantum…