January 7th, 2021 | 1 hr 37 mins
real world crypto
In this special episode, Nadim and Benjamin go through the entire program of IACR Real World Crypto 2021 in preparation for an exciting conference!
December 8th, 2020 | 38 mins 8 secs
post-quantum cryptography, signature schemes
Serious weaknesses are uncovered in one of NIST's post-quantum cryptography finalists. Ward Beullens joins us to talk about his new research and more.
December 1st, 2020 | 46 mins 34 secs
Ange Albertini and Stefan Kölbl discuss how new research from Google, the University of Haifa and Amazon is exploiting authenticated encryption to make a PDF decrypt into... a different PDF. And much more.
November 20th, 2020 | 41 mins 41 secs
Sofía Celi of Cloudflare talks about the latest version of Off-the-Record secure messaging protocol, why deniability is important, and more.
November 17th, 2020 | 42 mins 29 secs
elliptic curve cryptography, side channel attacks
LadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.
November 10th, 2020 | 45 mins 10 secs
Raphael Robert from Wire talks about how MLS wants to scale secure messaging to groups with hundreds or even thousands of participants.
November 3rd, 2020 | 41 mins 26 secs
Dr. David Archer of Galois discusses using zero-knowledge proof in order to prove the existence (or lack of) a software vulnerability without sharing details about the vulnerability itself.
October 27th, 2020 | 48 mins 34 secs
Luca Deo Feo and Hart Montgomery try to explain isogeny-based cryptography to Nadim.
October 20th, 2020 | 43 mins 56 secs
Formal verification has been used to prove the security of cryptographic protocols like Signal and TLS – but can it also be used to verify the correctness of legislation? Denis Merigoux tells us about how Catala wants to use formal methods to verify the French tax code.
October 13th, 2020 | 45 mins 36 secs
Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general.
October 6th, 2020 | 34 mins 24 secs
Léo Perrin talks about how his team at INRIA was able to find serious breaks in the Gimli family of lightweight symmetric primitives, and why NIST's lightweight cryptography competition even matters in the first place, especially with block ciphers like AES dominating the industry.
September 29th, 2020 | 35 mins 43 secs
KEMTLS is a modified version of TLS 1.3 that uses Key Encapsulation Mechanisms, or KEMs, instead of signatures for server authentication, thereby providing a sort of “post-quantum TLS”. But what even are KEMs? Are quantum computers even a thing that we should be worried about? On the first ever episode of Cryptography FM, we’ll be hosting Dr. Douglas Stebila and PhD Candidate Thom Wiggers to discuss these questions and more.