<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Wai Yip, WONG</title>
    <description>The latest articles on Forem by Wai Yip, WONG (@waiyip000).</description>
    <link>https://forem.com/waiyip000</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3373117%2Fa011d7d0-2fdb-4816-bd6e-0b6271ff1c8c.png</url>
      <title>Forem: Wai Yip, WONG</title>
      <link>https://forem.com/waiyip000</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/waiyip000"/>
    <language>en</language>
    <item>
      <title>TraplessPKE — A New Direction for Post-Quantum Cryptography</title>
      <dc:creator>Wai Yip, WONG</dc:creator>
      <pubDate>Tue, 05 Aug 2025 09:34:32 +0000</pubDate>
      <link>https://forem.com/waiyip000/traplesspke-a-new-direction-for-post-quantum-cryptography-1mp1</link>
      <guid>https://forem.com/waiyip000/traplesspke-a-new-direction-for-post-quantum-cryptography-1mp1</guid>
      <description>&lt;h2&gt;
  
  
  🚀 TraplessPKE — A New Direction for Post-Quantum Cryptography
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;How I designed a cryptographic system that abandons algebraic structure and survives quantum attacks&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🔗 [GitHub] | 🧾 [Whitepaper] | 👨‍💻 Author: Wai Yip, WONG (github.com/waiyip000)&lt;/p&gt;




&lt;h3&gt;
  
  
  ❓ What Is TraplessPKE?
&lt;/h3&gt;

&lt;p&gt;TraplessPKE is a &lt;strong&gt;quantum-safe cryptographic system&lt;/strong&gt; I designed to achieve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;✅ Public-Key Encryption&lt;/li&gt;
&lt;li&gt;✅ Message-Bound Digital Signatures&lt;/li&gt;
&lt;li&gt;✅ Zero reliance on lattices, primes, elliptic curves, or algebraic traps&lt;/li&gt;
&lt;li&gt;✅ Compatibility with hardware and embedded systems&lt;/li&gt;
&lt;li&gt;✅ Epistemic defense: validation is impossible without a secret — not just hard&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🧠 What Makes It Different?
&lt;/h3&gt;

&lt;p&gt;Unlike NIST-style PQC schemes based on algebraic hardness (like LWE, lattices, or codes), &lt;strong&gt;TraplessPKE&lt;/strong&gt; is:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A structure-free cryptographic scheme based on entropy, filtering, and deliberate ambiguity.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Core principle:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;You cannot break what you cannot recognize.&lt;/em&gt;&lt;br&gt;
There is no structure to invert. No equations to solve. Only filtered meaning for those with the key.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  🔐 How It Works (Simplified)
&lt;/h3&gt;

&lt;p&gt;TraplessPKE uses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A &lt;strong&gt;Selector Map&lt;/strong&gt; — links messages and ciphertexts via a common label space&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;Public Predicate&lt;/strong&gt; — filters plausible ciphertexts&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;Trapdoor&lt;/strong&gt; — blinds inputs via XOR masking&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;Hash-Bound Signature&lt;/strong&gt; — cryptographically binds message + trapdoor&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All operations are constant-time and linear-space.&lt;/p&gt;

&lt;p&gt;No discrete logs. No modular arithmetic. No vectors.&lt;/p&gt;




&lt;h3&gt;
  
  
  📐 Use Cases
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Post-Quantum Secure Messaging&lt;/li&gt;
&lt;li&gt;Digital Signatures that can’t be reused or transferred&lt;/li&gt;
&lt;li&gt;Identity-bound credentials (ZK-friendly)&lt;/li&gt;
&lt;li&gt;Hardware authentication in constrained devices&lt;/li&gt;
&lt;li&gt;Defense systems where no cryptographic oracle or structure must exist&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  💡 Why I Built It
&lt;/h3&gt;

&lt;p&gt;After two decades in banking risk and compliance, I saw firsthand how &lt;strong&gt;security often depends on assumptions&lt;/strong&gt; that attackers eventually break. Quantum computing accelerates that collapse.&lt;/p&gt;

&lt;p&gt;TraplessPKE is my answer:&lt;br&gt;
A &lt;strong&gt;non-invertible surface&lt;/strong&gt; designed to survive even when quantum attackers arrive — because there’s no algebra to attack.&lt;/p&gt;




&lt;h3&gt;
  
  
  📘 Want to Learn More?
&lt;/h3&gt;

&lt;p&gt;🔗 &lt;strong&gt;Full Whitepaper:&lt;/strong&gt; &lt;a href="https://waiyip000.github.io/TraplessPKE/TraplessPKE_whitepaper_V1.0.pdf" rel="noopener noreferrer"&gt;TraplessPKE_whitepaper_V1.0.pdf&lt;/a&gt;&lt;br&gt;
📦 &lt;strong&gt;GitHub Repo:&lt;/strong&gt; &lt;a href="https://github.com/waiyip000/traplesspke" rel="noopener noreferrer"&gt;github.com/waiyip000/traplesspke&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  💬 Your Thoughts?
&lt;/h3&gt;

&lt;p&gt;I’d love your feedback — questions, critiques, or use-case ideas.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Security through ambiguity. Access through design. Meaning for those who are allowed.”&lt;/em&gt;&lt;br&gt;
— TraplessPKE, 2025&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cryptography</category>
      <category>postquantum</category>
      <category>security</category>
      <category>protocols</category>
    </item>
    <item>
      <title>Launching ANCP — Secure Login for AI Agents Without VPN or OAuth</title>
      <dc:creator>Wai Yip, WONG</dc:creator>
      <pubDate>Sun, 20 Jul 2025 22:12:41 +0000</pubDate>
      <link>https://forem.com/waiyip000/launching-ancp-secure-login-for-ai-agents-without-vpn-or-oauth-h48</link>
      <guid>https://forem.com/waiyip000/launching-ancp-secure-login-for-ai-agents-without-vpn-or-oauth-h48</guid>
      <description>&lt;h1&gt;
  
  
  🚀 Launching ANCP — Secure Login for AI Agents Without VPN or OAuth
&lt;/h1&gt;

&lt;p&gt;AI agents are evolving from tools into autonomous reasoning actors — capable of reading, writing, and acting on sensitive data. But today’s authentication systems were built for &lt;strong&gt;humans with browsers&lt;/strong&gt;, not intelligent agents with goals.&lt;/p&gt;

&lt;p&gt;That’s why I’m launching &lt;strong&gt;ANCP&lt;/strong&gt; — the &lt;strong&gt;Agent-Native Challenge Protocol&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;It’s a new kind of login protocol built specifically for LLMs like ChatGPT, Gemini, Claude, and future autonomous agents.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔐 What Makes ANCP Different?
&lt;/h2&gt;

&lt;p&gt;ANCP lets an AI agent authenticate and access backend infrastructure &lt;strong&gt;without&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;❌ VPN tunnels
&lt;/li&gt;
&lt;li&gt;❌ OAuth 2.0 or browser redirects
&lt;/li&gt;
&lt;li&gt;❌ Static API keys
&lt;/li&gt;
&lt;li&gt;❌ Service accounts or secret-sharing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Instead, it uses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;✅ &lt;strong&gt;PGP-based challenge–response login&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Zero-trust, stateless session negotiation&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;AI-readable &lt;code&gt;.well-known/ancp.discovery.json&lt;/code&gt; endpoint metadata&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;✅ &lt;strong&gt;Prompt-native reasoning over identity&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧠 Why It Matters
&lt;/h2&gt;

&lt;p&gt;Today’s LLMs are capable of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Making API calls
&lt;/li&gt;
&lt;li&gt;Generating SQL queries
&lt;/li&gt;
&lt;li&gt;Accessing CRMs or HR systems
&lt;/li&gt;
&lt;li&gt;Recommending product launches, policy decisions, or financial strategies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But if the only login method available is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;“Paste this OAuth token in a browser...”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;…the agent becomes blocked or dangerously over-permissioned.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;ANCP makes identity a reasoning-aligned interaction.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The agent proves it understands &lt;em&gt;what it's doing&lt;/em&gt; — cryptographically and semantically.&lt;/p&gt;


&lt;h2&gt;
  
  
  📦 GitHub Repository
&lt;/h2&gt;

&lt;p&gt;👉 &lt;a href="https://github.com/waiyip000/agent-native-auth" rel="noopener noreferrer"&gt;https://github.com/waiyip000/agent-native-auth&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Full whitepaper (&lt;code&gt;whitepaper.docx&lt;/code&gt;)
&lt;/li&gt;
&lt;li&gt;SHA256 validation hash
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;.well-known/ancp.discovery.json&lt;/code&gt; sample
&lt;/li&gt;
&lt;li&gt;PGP digest tool (&lt;code&gt;digest.py&lt;/code&gt;)
&lt;/li&gt;
&lt;li&gt;Attribution-secured LICENSE&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  📄 Whitepaper SHA256 Digest
&lt;/h2&gt;

&lt;p&gt;To verify authorship and originality of the protocol:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SHA256 (whitepaper.docx):
407f2e29bc6ba9bb8710cd43da58401d056bd1d1cb7c0dadeb6729a99a9c4c36
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  🧑‍💻 Created and authored by
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Wai Yip, WONG&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
🔗 &lt;a href="https://www.linkedin.com/in/wai-yip-wong" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;&lt;br&gt;&lt;br&gt;
💻 &lt;a href="https://github.com/waiyip000" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  📣 Call to Action
&lt;/h2&gt;

&lt;p&gt;I’m inviting:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OSS contributors
&lt;/li&gt;
&lt;li&gt;LLM security architects
&lt;/li&gt;
&lt;li&gt;AI infra developers
&lt;/li&gt;
&lt;li&gt;Zero-trust security teams&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;…to &lt;strong&gt;collaborate&lt;/strong&gt;, test, and build on ANCP.&lt;/p&gt;

&lt;p&gt;Let's make secure, intelligent infrastructure &lt;strong&gt;agent-native.&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ANCP #LLM #AI #ZeroTrust #Security #Authentication #PGP #PromptNative #OpenSource
&lt;/h1&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>authentication</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
