Cryptography FM

In-depth, substantive discussions on the latest news and research in applied cryptography.

About the show

Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM to talk about it with your host, Nadim Kobeissi.

Cryptography FM on social media


  • Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!

    August 24th, 2021  |  46 mins 52 secs

    Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.

  • Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!

    July 20th, 2021  |  42 mins 56 secs
    cryptanalysis, gprs

    Were GPRS's encryption ciphers deliberately backdoored? Nadim discusses this question with cryptanalysts Gaëtan Leurent and Håvard Raddum.

  • Episode 19: Cross-Protocol Attacks on TLS with ALPACA!

    July 12th, 2021  |  41 mins 44 secs

    Nadim discusses a new line of cross-protocol attacks on TLS with Marcus Brinkmann and Robert Merget, made possible via the new ALPACA Attack, research published this year at the USENIX Security Symposium.

  • Episode 18: Optimizing Cryptography for Microcontrollers!

    June 23rd, 2021  |  36 mins 56 secs
    low-level cryptography, software implementations

    Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms

  • Episode 17: Breaking Wi-Fi With Frame Attacks!

    June 1st, 2021  |  35 mins 58 secs

    Mathy Vanhoef breaks Wi-Fi security yet again, with a new frame aggregation attack that affects all Wi-Fi encryption standards since 1997 and up to today.

  • Episode 16: Contact Discovery in Mobile Messengers!

    May 24th, 2021  |  46 mins 44 secs
    secure messaging

    Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.

  • Episode 15: Bringing Secure Multiparty Computation to the Real World!

    April 26th, 2021  |  46 mins 50 secs
    multi-party computation

    Nadim talks with Yehuda Lindell and Nigel Smart of Unbound Security about how multi-party computation can enter the real world, away from the blank slate of academia.

  • Episode 14: Schnorr, Factoring and Lattices!

    March 30th, 2021  |  46 mins 30 secs
    lattice cryptography, rsa

    Did Schnorr "destroy RSA" with his surprising ePrint submission? Lattice cryptography expert Léo Ducas joins Nadim from CWI, Amsterdam to discuss this topic and more on Cryptography FM.

  • Episode 13: Zero-Knowledge STARKs in the Real World!

    March 14th, 2021  |  47 mins
    zero-knowledge proofs

    Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.

  • Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!

    January 7th, 2021  |  1 hr 37 mins
    real world crypto

    In this special episode, Nadim and Benjamin go through the entire program of IACR Real World Crypto 2021 in preparation for an exciting conference!

  • Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate!

    December 8th, 2020  |  38 mins 8 secs
    post-quantum cryptography, signature schemes

    Serious weaknesses are uncovered in one of NIST's post-quantum cryptography finalists. Ward Beullens joins us to talk about his new research and more.

  • Episode 10: Exploiting Authenticated Encryption Key Commitment!

    December 1st, 2020  |  46 mins 34 secs
    authenticated encryption

    Ange Albertini and Stefan Kölbl discuss how new research from Google, the University of Haifa and Amazon is exploiting authenticated encryption to make a PDF decrypt into... a different PDF. And much more.