Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cryptographic Clear Filter

“This telegram must be closely paraphrased before being communicated to anyone”

It appears that it was US military communications doctrine to not send the exact same message twice using different encryption ("none" counting as one type of encryption), and the term of art for changing a message to avoid that was indeed "paraphrase". I managed to dig up a US Army document on Cryptology from roughly that era that appears to discuss paraphrasing. The document in question is Department of the Army Technical Manual TM 32-220(pdf), dated 1950, titled "BASIC CRYPTOGRAPHY". It appa

"This telegram must be closely paraphrased before being communicated" Why?

It appears that it was US military communications doctrine to not send the exact same message twice using different encryption ("none" counting as one type of encryption), and the term of art for changing a message to avoid that was indeed "paraphrase". I managed to dig up a US Army document on Cryptology from roughly that era that appears to discuss paraphrasing. The document in question is Department of the Army Technical Manual TM 32-220(pdf), dated 1950, titled "BASIC CRYPTOGRAPHY". It appa

The FIPS 140-3 Go Cryptographic Module

The FIPS 140-3 Go Cryptographic Module Filippo Valsorda (Geomys), Daniel McCarney (Geomys), and Roland Shoemaker (Google) 15 July 2025 FIPS 140 is a standard for cryptography implementations and, although it doesn’t necessarily improve security, FIPS 140 compliance is a requirement in certain regulated environments that are increasingly adopting Go. Until now, FIPS 140 compliance has been a significant source of friction for Go users, requiring unsupported solutions with safety, developer exp

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

Ariadne Suite ariadne.ciphernomad.org This repository contains the Ariadne Suite, our canonical Rust implementation of the Ariadne Protocol. The protocol is a novel cryptographic architecture we designed around the Labyrinth Construction to provide aperiodic, or non-repeating, cryptographic transformations. The project mission is to create resilient, open-source tools for digital sovereignty. This is independent research, released as a public good. Its continuation, development, and future s