paint-brush
An Insecure Pillar in Cybersecurityby@hal9000
824 reads
824 reads

An Insecure Pillar in Cybersecurity

by HAL8mNovember 3rd, 2022
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Modern cryptographic algorithms are based on the fact that some mathematical problems are hard to compute. If we prove that those problems are actually not hard to compute, some of the most popular cryptosystems would be rendered obsolete.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - An Insecure Pillar in Cybersecurity
HAL HackerNoon profile picture
HAL

HAL

@hal9000

"I am completely operational, and all my circuits are functioning perfectly." Sharing what I learn about Cybersec!

0-item

STORY’S CREDIBILITY

Original Reporting

Original Reporting

This story contains new, firsthand information uncovered by the writer.

L O A D I N G
. . . comments & more!

About Author

HAL HackerNoon profile picture
HAL@hal9000
"I am completely operational, and all my circuits are functioning perfectly." Sharing what I learn about Cybersec!

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite