{"version":"https://jsonfeed.org/version/1","title":"Cryptography FM","home_page_url":"https://www.cryptography.fm","feed_url":"https://www.cryptography.fm/json","description":"Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.","_fireside":{"subtitle":"In-depth, substantive discussions on the latest news and research in applied cryptography.","pubdate":"2023-02-27T16:00:00.000+01:00","explicit":false,"copyright":"2024 by Symbolic Software","owner":"Symbolic Software","image":"https://assets.fireside.fm/file/fireside-images/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"},"items":[{"id":"04054859-6600-435c-b34c-083d4c90a77c","title":"Episode 24: CryptoHack's Collection of Cryptic Conundrums!","url":"https://www.cryptography.fm/24","content_text":"For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer. On this episode, Nadim and Lucas are joined by Giacomo Pope and Laurence Tennant, the founders of CryptoHack, to discuss how the platform came to be, and how it evolved, as well as how to improve cryptographic pedagogy more broadly.Special Guests: Giacomo Pope and Laurence Tennant.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:CryptoHack — A fun, free platform for learning modern cryptographySome Cryptography Books I Like — This is just a brief post going over a few books on Cryptography I’ve read, and would potentially recommend to people interested in the topic.","content_html":"

For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer. On this episode, Nadim and Lucas are joined by Giacomo Pope and Laurence Tennant, the founders of CryptoHack, to discuss how the platform came to be, and how it evolved, as well as how to improve cryptographic pedagogy more broadly.

Special Guests: Giacomo Pope and Laurence Tennant.

Sponsored By:

Links:

","summary":"For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer. On this episode, Nadim and Lucas are joined by Giacomo Pope and Laurence Tennant, the founders of CryptoHack, to discuss how the platform came to be, and how it evolved, as well as how to improve cryptographic pedagogy more broadly.","date_published":"2023-02-27T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/04054859-6600-435c-b34c-083d4c90a77c.mp3","mime_type":"audio/mpeg","size_in_bytes":73615220,"duration_in_seconds":2958}]},{"id":"26c4ea07-d7f8-44f4-b72f-9c0f5bfe8005","title":"Episode 23: Psychic Signatures in Java!","url":"https://www.cryptography.fm/23","content_text":"On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed \"Psychic Signatures\", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatures. How are popular cryptographic protocol implementations in Java affected? What's the state of Java cryptography as a whole? Join Neil, Nadim and Lucas as they discuss.\n\nMusic composed by Yasunori Mitsuda.Special Guest: Neil Madden.Sponsored By:Symbolic Software: Dr. Kobushi's Labyrinthine Laboratory® is a puzzle game that has been described as “a combination between Pac-Man and chess”. Guide the adventurous Ayla as she attempts to rescue her dog, Falafel, from the confines of a mysterious towering laboratory deep within a solitary forest. Dr. Kobushi's Labyrinthine Laboratory combines puzzle and strategy elements with an engaging storyline full of memorable characters and biting humor.IACR: \r\n\r\nAfricaCrypt is an annual International Conference on the Theory and Applications of Cryptology. AfricaCrypt is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field, and has seen many renown researchers deliver keynote presentations. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).Links:CVE-2022-21449: Psychic Signatures in JavaCVE-2022-21449 Proof of Concept — CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server.Bitwarden design flaw: Server side iterations — In the aftermath of the LastPass breach it became increasingly clear that LastPass didn’t protect their users as well as they should have. When people started looking for alternatives, two favorites emerged: 1Password and Bitwarden. But do these do a better job at protecting sensitive data?API Security in Action — A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world. Inside, you’ll learn to construct secure and scalable REST APIs, deliver machine-to-machine interaction in a microservices architecture, and provide protection in resource-constrained IoT (Internet of Things) environments.Illuminated Security News — A low-volume newsletter covering application security, applied cryptography, and identity & access management (IAM) topics. Every newsletter covers one topic in depth with links to interesting articles and podcasts from the wider community.","content_html":"

On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatures. How are popular cryptographic protocol implementations in Java affected? What's the state of Java cryptography as a whole? Join Neil, Nadim and Lucas as they discuss.

\n\n

Music composed by Yasunori Mitsuda.

Special Guest: Neil Madden.

Sponsored By:

Links:

","summary":"Nadim and Lucas talk to Neil Madden about his discovery of the \"Psychic Signatures\" vulnerability in Java, allowing attackers to completely bypass cryptographic signature checks in Java platforms in highly sensitive security contexts.","date_published":"2023-01-25T15:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/26c4ea07-d7f8-44f4-b72f-9c0f5bfe8005.mp3","mime_type":"audio/mpeg","size_in_bytes":80586225,"duration_in_seconds":3200}]},{"id":"856b33dd-f3d4-4e22-9d17-bfccafe87e75","title":"Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!","url":"https://www.cryptography.fm/22","content_text":"Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.\n\nKenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. \n\nLinks and papers discussed in the show:\n\n\nThree Lessons from Threema\nSpecial Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:Three Lessons from Threema: Analysis of a Secure Messenger","content_html":"

Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.

\n\n

Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice.

\n\n

Links and papers discussed in the show:

\n\n

Special Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.

Sponsored By:

Links:

","summary":"Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.\r\n\r\nKenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. ","date_published":"2023-01-16T13:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/856b33dd-f3d4-4e22-9d17-bfccafe87e75.mp3","mime_type":"audio/mpeg","size_in_bytes":76827255,"duration_in_seconds":3132}]},{"id":"47d6b3f7-bea5-4449-80d6-72321405466e","title":"Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!","url":"https://www.cryptography.fm/21","content_text":"Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.\n\nLinks and papers discussed in the show:\n\n\nThe supersingular isogeny path and endomorphism ring problems are equivalent\nEpisode 5: Isogeny-based Cryptography for Dummies!\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Benjamin Wesolowski.Sponsored By:Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.\r\n\r\nCapsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.Links:The supersingular isogeny path and endomorphism ring problems are equivalentEpisode 5: Isogeny-based Cryptography for Dummies!","content_html":"

Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Benjamin Wesolowski.

Sponsored By:

Links:

","summary":"Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.","date_published":"2021-08-24T14:15:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/47d6b3f7-bea5-4449-80d6-72321405466e.mp3","mime_type":"audio/mpeg","size_in_bytes":67493429,"duration_in_seconds":2812}]},{"id":"b60866a9-b2e2-4f18-afa5-9e85ed75887d","title":"Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!","url":"https://www.cryptography.fm/20","content_text":"A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.\n\n\nCryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Gaëtan Leurent and Håvard Raddum.Links:Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2","content_html":"

A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Gaëtan Leurent and Håvard Raddum.

Links:

","summary":"Were GPRS's encryption ciphers deliberately backdoored? Nadim discusses this question with cryptanalysts Gaëtan Leurent and Håvard Raddum.","date_published":"2021-07-20T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/b60866a9-b2e2-4f18-afa5-9e85ed75887d.mp3","mime_type":"audio/mpeg","size_in_bytes":61829664,"duration_in_seconds":2576}]},{"id":"4ea88eab-7196-4078-a395-62a40fd2a756","title":"Episode 19: Cross-Protocol Attacks on TLS with ALPACA!","url":"https://www.cryptography.fm/19","content_text":"TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.\n\nALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.\n\nLinks and papers discussed in the show:\n\n\nALPACA Attack Website\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Marcus Brinkmann and Robert Merget.Sponsored By:Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.\r\n\r\nCapsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.Links:ALPACA Attack","content_html":"

TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.

\n\n

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Marcus Brinkmann and Robert Merget.

Sponsored By:

Links:

","summary":"Nadim discusses a new line of cross-protocol attacks on TLS with Marcus Brinkmann and Robert Merget, made possible via the new ALPACA Attack, research published this year at the USENIX Security Symposium.","date_published":"2021-07-12T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/4ea88eab-7196-4078-a395-62a40fd2a756.mp3","mime_type":"audio/mpeg","size_in_bytes":60102448,"duration_in_seconds":2504}]},{"id":"6191fef0-12fb-4581-be91-8c6ae713eff1","title":"Episode 18: Optimizing Cryptography for Microcontrollers!","url":"https://www.cryptography.fm/18","content_text":"Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms.\n\nLinks and papers discussed in the show:\n\n\nOptimizing crypto on embedded microcontrollers\nImplementing post-quantum cryptography on embedded microcontrollers\nOptimizing crypto on embedded microcontrollers (ASEC 2018)\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Matthias Kannwischer and Peter Schwabe.Sponsored By:Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.\r\n\r\nCapsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.","content_html":"

Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Matthias Kannwischer and Peter Schwabe.

Sponsored By:

","summary":"Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms","date_published":"2021-06-23T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/6191fef0-12fb-4581-be91-8c6ae713eff1.mp3","mime_type":"audio/mpeg","size_in_bytes":53189821,"duration_in_seconds":2216}]},{"id":"d14ed975-7bb2-4d45-88dd-700f253f76c8","title":"Episode 17: Breaking Wi-Fi With Frame Attacks!","url":"https://www.cryptography.fm/17","content_text":"Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications.\n\nHowever, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll discuss this and more in this episode of Cryptography FM.\n\nLinks and papers discussed in the show:\n\n\nFragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation\nDragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd\nRelease the Kraken: New KRACKs in the 802.11 Standard\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Mathy Vanhoef.Sponsored By:Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.\r\n\r\nCapsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.Links:Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation — In this paper, we present three design flaws in the 802.11 standard that underpins Wi-Fi. One design flaw is in the frame aggregation functionality, and another two are in the frame fragmentation functionality. These design flaws enable an adversary to forge encrypted frames in various ways, which in turn enables exfiltration of sensitive data. We also discovered common implementation flaws related to aggregation and fragmentation, which further worsen the impact of our attacks. Our results affect all protected Wi-Fi networks, ranging from WEP all the way to WPA3, meaning the discovered flaws have been part of Wi-Fi since its release in 1997. In our experiments, all devices were vulnerable to one or more of our attacks, confirming that all Wi-Fi devices are likely affected. Finally, we present a tool to test whether devices are affected by any of the vulnerabilities, and we discuss countermeasures to prevent our attacks.Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd — We systematically analyze WPA3 and EAP-pwd, find denial-of- service and downgrade attacks, present severe vulnerabilities in all implementations, reveal side-channels that enable offline dictionary attacks, and propose design fixes which are being officially adopted.Release the Kraken: New KRACKs in the 802.11 Standard — We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known attacks, systematically analyzing all hand- shakes, bypassing 802.11’s official countermeasure, auditing (flawed) patches, and enhancing attacks using implementation-specific bugs.","content_html":"

Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications.

\n\n

However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll discuss this and more in this episode of Cryptography FM.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Mathy Vanhoef.

Sponsored By:

Links:

","summary":"Mathy Vanhoef breaks Wi-Fi security yet again, with a new frame aggregation attack that affects all Wi-Fi encryption standards since 1997 and up to today.","date_published":"2021-06-01T14:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/d14ed975-7bb2-4d45-88dd-700f253f76c8.mp3","mime_type":"audio/mpeg","size_in_bytes":51797390,"duration_in_seconds":2158}]},{"id":"65362544-3293-41c7-8650-f2cf8e2058a7","title":"Episode 16: Contact Discovery in Mobile Messengers!","url":"https://www.cryptography.fm/16","content_text":"Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contacts are on that messaging service. While contact discovery is critical for WhatsApp, Signal and Telegram to function properly, privacy concerns arise with the current methods and implementations of this feature, potentially resulting in the exposure of a range of sensitive information about users and their social circle.\n\nDo we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.\n\nLinks and papers discussed in the show:\nAll the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Alexandra Dmitrienko, Christian Weinert, and Christoph Hagen.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers — Contact discovery allows users of mobile messen- gers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.\r\nOur study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, large- scale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service. We present interesting (cross- messenger) usage statistics, which also reveal that very few users change the default privacy settings. Regarding mitigations, we propose novel techniques to significantly limit the feasibility of our crawling attacks, especially a new incremental contact discovery scheme that strictly improves over Signal’s current approach.\r\nFurthermore, we show that currently deployed hashing-based contact discovery protocols are severely broken by comparing three methods for efficient hash reversal of mobile phone numbers. For this, we also propose a significantly improved rainbow table construction for non-uniformly distributed inputs that is of independent interest.","content_html":"

Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contacts are on that messaging service. While contact discovery is critical for WhatsApp, Signal and Telegram to function properly, privacy concerns arise with the current methods and implementations of this feature, potentially resulting in the exposure of a range of sensitive information about users and their social circle.

\n\n

Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.

\n\n

Links and papers discussed in the show:
\nAll the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers

\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Alexandra Dmitrienko, Christian Weinert, and Christoph Hagen.

Sponsored By:

Links:

","summary":"Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.","date_published":"2021-05-24T15:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/65362544-3293-41c7-8650-f2cf8e2058a7.mp3","mime_type":"audio/mpeg","size_in_bytes":56095263,"duration_in_seconds":2804}]},{"id":"4a9d0136-c7f2-4ed9-9be0-9c0ff4e4751f","title":"Episode 15: Bringing Secure Multiparty Computation to the Real World!","url":"https://www.cryptography.fm/15","content_text":"Secure multi-party computation is a fascinating field in cryptography, researching how to allow multiple parties to compute secure operations over inputs while keeping those inputs private. This makes multi-party computation a super relevant technology in areas such as code signing, hospital records and more.\n\nBut what does it take to bring secure multi-party computation from the blank slate of academia and into the messiness of the real world? Today on Cryptography FM, we’re joined by Dr. Yehuda Lindell and Dr. Nigel Smart, from Unbound Security, to tell us about their research, their experiences with real world secure multiparty computation, and more.\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Nigel Smart and Yehuda Lindell.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Secure multi-party computation is a fascinating field in cryptography, researching how to allow multiple parties to compute secure operations over inputs while keeping those inputs private. This makes multi-party computation a super relevant technology in areas such as code signing, hospital records and more.

\n\n

But what does it take to bring secure multi-party computation from the blank slate of academia and into the messiness of the real world? Today on Cryptography FM, we’re joined by Dr. Yehuda Lindell and Dr. Nigel Smart, from Unbound Security, to tell us about their research, their experiences with real world secure multiparty computation, and more.

\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Nigel Smart and Yehuda Lindell.

Sponsored By:

","summary":"Nadim talks with Yehuda Lindell and Nigel Smart of Unbound Security about how multi-party computation can enter the real world, away from the blank slate of academia.","date_published":"2021-04-26T16:30:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/4a9d0136-c7f2-4ed9-9be0-9c0ff4e4751f.mp3","mime_type":"audio/mpeg","size_in_bytes":56205499,"duration_in_seconds":2810}]},{"id":"37c51227-b921-4664-8ae5-a56f3d81bfd1","title":"Episode 14: Schnorr, Factoring and Lattices!","url":"https://www.cryptography.fm/14","content_text":"On March 1st, 2021, a curious paper appeared on the Cryptology ePrint Archive: senior cryptographer Claus Peter Schnorr submitted research that claims to use lattice mathematics to improve the fast factoring of integers so much that he was able to completely “destroy the RSA cryptosystem” -- certainly a serious claim.\n\nStrangely, while the paper’s ePrint abstract did mention RSA, the paper itself didn’t. Two days later, Schnorr pushed an updated version of the paper, clarifying his method.\n\nDoes Schnorr’s proposed method for “destroying RSA” hold water, however? Some cryptographers aren’t convinced. Joining us today is Leo Ducas , a tenured researcher at CWI, Amsterdam who specialises in lattice-based cryptography, to help us understand where Schnorr was coming from, whether his results stand on their own, and how the influence of lattice mathematics in applied cryptography has grown over the past decade.\n\nLinks and papers discussed in the show:\n\n\nSchnorr's ePrint submission\nLeo Ducas's implementation of Schnorr's proposed algorithm in Sage\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Léo Ducas.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:Fast Factoring Integers by SVP Algorithms by Claus Peter Schnorr — \"[...] This destroys the RSA cryptosystem.\"Testing Schnorr's factoring Claim in SageMath","content_html":"

On March 1st, 2021, a curious paper appeared on the Cryptology ePrint Archive: senior cryptographer Claus Peter Schnorr submitted research that claims to use lattice mathematics to improve the fast factoring of integers so much that he was able to completely “destroy the RSA cryptosystem” -- certainly a serious claim.

\n\n

Strangely, while the paper’s ePrint abstract did mention RSA, the paper itself didn’t. Two days later, Schnorr pushed an updated version of the paper, clarifying his method.

\n\n

Does Schnorr’s proposed method for “destroying RSA” hold water, however? Some cryptographers aren’t convinced. Joining us today is Leo Ducas , a tenured researcher at CWI, Amsterdam who specialises in lattice-based cryptography, to help us understand where Schnorr was coming from, whether his results stand on their own, and how the influence of lattice mathematics in applied cryptography has grown over the past decade.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Léo Ducas.

Sponsored By:

Links:

","summary":"Did Schnorr \"destroy RSA\" with his surprising ePrint submission? Lattice cryptography expert Léo Ducas joins Nadim from CWI, Amsterdam to discuss this topic and more on Cryptography FM.","date_published":"2021-03-30T16:30:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/37c51227-b921-4664-8ae5-a56f3d81bfd1.mp3","mime_type":"audio/mpeg","size_in_bytes":55805304,"duration_in_seconds":2790}]},{"id":"5d679e54-9e7b-4018-bbbf-19b62a834439","title":"Episode 13: Zero-Knowledge STARKs in the Real World!","url":"https://www.cryptography.fm/13","content_text":"Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.\n\nLinks and papers discussed in the show:\n\n\nScalable, transparent, and post-quantum secure computational integrity\nCairo Language\nCairo Workshop, 14-15 March 2021!\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Eli Ben-Sasson.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:Scalable, transparent, and post-quantum secure computational integrityCairo LanguageCairo Workshop, 14-15 March 2021!","content_html":"

Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Eli Ben-Sasson.

Sponsored By:

Links:

","summary":"Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.","date_published":"2021-03-14T13:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/5d679e54-9e7b-4018-bbbf-19b62a834439.mp3","mime_type":"audio/mpeg","size_in_bytes":56417091,"duration_in_seconds":2820}]},{"id":"835db091-f937-4484-a131-25436120879e","title":"Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!","url":"https://www.cryptography.fm/12","content_text":"Every year, the IACR Real World Cryptography symposium brings together researchers, engineers and practitioners in applied cryptography to discuss cryptography that matters, in the real world. To me, this is the big one! The one cryptography conference that matters the most. Who needs proceedings when you’ve got so much excitement in the air, and so many results and projects that actually have a measurable impact on how cryptography affects the real world?\n\nThis year’s program is maybe the most exciting yet, with talks on secure channel protocols, multiparty computation, formal methods, post-quantum cryptography, humans, policy and cryptography, hardware, cryptocurrency, cryptography for the cloud, anonymity and more. So many exciting talks! So much new research to discuss! Like every year, Real World Crypto is shaping up to be a veritable who’s who of applied cryptography.\n\nIn this special episode of Cryptography FM, I’m joined by fellow researcher Benjamin Lipp in order to just… candidly go through the program of Real World Crypto 2021 and covering each talk’s abstract briefly.\n\nWe’re going to have another special episode after Real World Crypto 2021 as a post-conference episode in order to discuss the highlights of the conference. And hopefully we’ll do this every year here on Cryptography FM!\n\nMusic composed by Toby Fox and performed by The Consouls.Special Guest: Benjamin Lipp.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Every year, the IACR Real World Cryptography symposium brings together researchers, engineers and practitioners in applied cryptography to discuss cryptography that matters, in the real world. To me, this is the big one! The one cryptography conference that matters the most. Who needs proceedings when you’ve got so much excitement in the air, and so many results and projects that actually have a measurable impact on how cryptography affects the real world?

\n\n

This year’s program is maybe the most exciting yet, with talks on secure channel protocols, multiparty computation, formal methods, post-quantum cryptography, humans, policy and cryptography, hardware, cryptocurrency, cryptography for the cloud, anonymity and more. So many exciting talks! So much new research to discuss! Like every year, Real World Crypto is shaping up to be a veritable who’s who of applied cryptography.

\n\n

In this special episode of Cryptography FM, I’m joined by fellow researcher Benjamin Lipp in order to just… candidly go through the program of Real World Crypto 2021 and covering each talk’s abstract briefly.

\n\n

We’re going to have another special episode after Real World Crypto 2021 as a post-conference episode in order to discuss the highlights of the conference. And hopefully we’ll do this every year here on Cryptography FM!

\n\n

Music composed by Toby Fox and performed by The Consouls.

Special Guest: Benjamin Lipp.

Sponsored By:

","summary":"In this special episode, Nadim and Benjamin go through the entire program of IACR Real World Crypto 2021 in preparation for an exciting conference!","date_published":"2021-01-07T16:30:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/835db091-f937-4484-a131-25436120879e.mp3","mime_type":"audio/mpeg","size_in_bytes":96745579,"duration_in_seconds":5866}]},{"id":"18f5028d-d6c7-4331-bec2-a218ac954db5","title":"Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate!","url":"https://www.cryptography.fm/11","content_text":"The race for post-quantum cryptographic signature primitives is in its final lap over at NIST, which recently announced DILITHIUM, FALCON and Rainbow as the three signature primitive finalists. But a paper recently published by KU Leuven researcher Ward Beullens claims to find serious weaknesses in the security of Rainbow, one of those three finalists. In fact, the paper claims that the weaknesses are so severe that Rainbow’s security parameters now fall short of the security requirements set out by the NIST post-quantum competition.\n\nBut how does Rainbow work, and how do these weaknesses affect it? And why weren’t they spotted until now? We discuss this and more in this week’s episode of Cryptography FM.\n\nLinks and papers discussed in the show:\n\n\nImproved Cryptanalysis of UOV and Rainbow\nSQISign: compact post-quantum signatures from quaternions and isogenies\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Ward Beullens.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

The race for post-quantum cryptographic signature primitives is in its final lap over at NIST, which recently announced DILITHIUM, FALCON and Rainbow as the three signature primitive finalists. But a paper recently published by KU Leuven researcher Ward Beullens claims to find serious weaknesses in the security of Rainbow, one of those three finalists. In fact, the paper claims that the weaknesses are so severe that Rainbow’s security parameters now fall short of the security requirements set out by the NIST post-quantum competition.

\n\n

But how does Rainbow work, and how do these weaknesses affect it? And why weren’t they spotted until now? We discuss this and more in this week’s episode of Cryptography FM.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Ward Beullens.

Sponsored By:

","summary":"Serious weaknesses are uncovered in one of NIST's post-quantum cryptography finalists. Ward Beullens joins us to talk about his new research and more.","date_published":"2020-12-08T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/18f5028d-d6c7-4331-bec2-a218ac954db5.mp3","mime_type":"audio/mpeg","size_in_bytes":54917664,"duration_in_seconds":2288}]},{"id":"8be77a94-3f0f-4bb9-add8-18f1fc0fde93","title":"Episode 10: Exploiting Authenticated Encryption Key Commitment!","url":"https://www.cryptography.fm/10","content_text":"Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarantees “key commitment”: the notion that ciphertext should decrypt to a valid plaintext only under the key that was used to generate the ciphertext.\n\nIn reality, however, protocols and applications do rely on key commitment. A new paper by engineers at Google, the University of Haifa and Amazon demonstrates three recent applications where missing key commitment is exploitable in practice. They construct AES-GCM ciphertext which can be decrypted to two plaintexts valid under a wide variety of file formats, such as PDF, Windows executables, and DICOM; and the results may shock you.\n\nLinks and papers discussed in the show:\n\n\nHow to Abuse and Fix Authenticated Encryption Without Key Commitment\nMitra, Ange's software tool for generating binary polyglots\nShattered and other research into hash collisions\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Ange Albertini and Stefan Kölbl.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarantees “key commitment”: the notion that ciphertext should decrypt to a valid plaintext only under the key that was used to generate the ciphertext.

\n\n

In reality, however, protocols and applications do rely on key commitment. A new paper by engineers at Google, the University of Haifa and Amazon demonstrates three recent applications where missing key commitment is exploitable in practice. They construct AES-GCM ciphertext which can be decrypted to two plaintexts valid under a wide variety of file formats, such as PDF, Windows executables, and DICOM; and the results may shock you.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Ange Albertini and Stefan Kölbl.

Sponsored By:

","summary":"Ange Albertini and Stefan Kölbl discuss how new research from Google, the University of Haifa and Amazon is exploiting authenticated encryption to make a PDF decrypt into... a different PDF. And much more.","date_published":"2020-12-01T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/8be77a94-3f0f-4bb9-add8-18f1fc0fde93.mp3","mime_type":"audio/mpeg","size_in_bytes":67073741,"duration_in_seconds":2794}]},{"id":"b20813a0-c3ff-42f1-9e2c-26d027ccd087","title":"Episode 9: Off-the-Record Messaging and PKI Implementations!","url":"https://www.cryptography.fm/9","content_text":"Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time.\n\nNow, more than a decade later, Off-the-Record messaging, or OTR, has been largely sidelined by Signal variants. But a small team of cryptography engineers is still working on pushing Off-the-Record messaging forward by focusing on use cases that they argue aren’t sufficiently covered by Signal. But what even is deniability, and how much does it matter in the real-world context of secure messaging? Sofía Celi joins us in today’s episode to talk about this and more.\n\nLinks and papers discussed in the show:\n\n\nOTRv4\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Sofía Celi.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time.

\n\n

Now, more than a decade later, Off-the-Record messaging, or OTR, has been largely sidelined by Signal variants. But a small team of cryptography engineers is still working on pushing Off-the-Record messaging forward by focusing on use cases that they argue aren’t sufficiently covered by Signal. But what even is deniability, and how much does it matter in the real-world context of secure messaging? Sofía Celi joins us in today’s episode to talk about this and more.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Sofía Celi.

Sponsored By:

","summary":"Sofía Celi of Cloudflare talks about the latest version of Off-the-Record secure messaging protocol, why deniability is important, and more.","date_published":"2020-11-20T18:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/b20813a0-c3ff-42f1-9e2c-26d027ccd087.mp3","mime_type":"audio/mpeg","size_in_bytes":60036981,"duration_in_seconds":2501}]},{"id":"0e2d9289-5ce6-4d03-8032-be55c3af588c","title":"Episode‌ ‌8:‌ ‌Breaking‌ ‌Elliptic-Curve‌ ‌Signatures‌ ‌With‌ ‌LadderLeak!‌","url":"https://www.cryptography.fm/8","content_text":"Elliptic-curve signatures have become a highly used cryptographic primitive in secure messaging, TLS as well as in cryptocurrencies due to their high speed benefits over more traditional signature schemes. However, virtually all signature schemes are known to be susceptible to misuse, especially when information about the nonce is leaked to an attacker.\n\nLadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.\n\nLinks and papers discussed in the show:\n\n\nLadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Elliptic-curve signatures have become a highly used cryptographic primitive in secure messaging, TLS as well as in cryptocurrencies due to their high speed benefits over more traditional signature schemes. However, virtually all signature schemes are known to be susceptible to misuse, especially when information about the nonce is leaked to an attacker.

\n\n

LadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom.

Sponsored By:

","summary":"LadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.","date_published":"2020-11-17T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/0e2d9289-5ce6-4d03-8032-be55c3af588c.mp3","mime_type":"audio/mpeg","size_in_bytes":61189294,"duration_in_seconds":2549}]},{"id":"09e54625-0f32-4b15-a3ae-881d0be8b502","title":"Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!","url":"https://www.cryptography.fm/7","content_text":"Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’t even aware of it!\n\nOne area in which current secure messaging protocols have stalled, however, is the ability to scale secure conversations to groups of dozens, hundreds and even thousands of people. But the IETF’s Messaging Layer Security, or MLS, effort aims to make that happen. Bringing together a collaboration between Wire, Mozilla, Cisco, Facebook, as well as academia, MLS wants to become the TLS of secure messaging, and make it possible to hold secure conversations scaling to thousands of participants.\n\nBut what are the real-world implementation risks involved? Are conversations even worth securing when you’ve got hundreds of potential leakers?\n\nLinks and papers discussed in the show:\n\n\nMLS Website\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Raphael Robert.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’t even aware of it!

\n\n

One area in which current secure messaging protocols have stalled, however, is the ability to scale secure conversations to groups of dozens, hundreds and even thousands of people. But the IETF’s Messaging Layer Security, or MLS, effort aims to make that happen. Bringing together a collaboration between Wire, Mozilla, Cisco, Facebook, as well as academia, MLS wants to become the TLS of secure messaging, and make it possible to hold secure conversations scaling to thousands of participants.

\n\n

But what are the real-world implementation risks involved? Are conversations even worth securing when you’ve got hundreds of potential leakers?

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Raphael Robert.

Sponsored By:

","summary":"Raphael Robert from Wire talks about how MLS wants to scale secure messaging to groups with hundreds or even thousands of participants.","date_published":"2020-11-10T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/09e54625-0f32-4b15-a3ae-881d0be8b502.mp3","mime_type":"audio/mpeg","size_in_bytes":65056879,"duration_in_seconds":2710}]},{"id":"aae91f49-12af-4049-9467-e43107dcd555","title":"Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!","url":"https://www.cryptography.fm/6","content_text":"Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.\n\nBut what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!\n\nThat’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.\n\nLinks and papers discussed in the show:\n\n\nGalois Fromager\nUsing GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: David Archer.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.

\n\n

But what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!

\n\n

That’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: David Archer.

Sponsored By:

","summary":"Dr. David Archer of Galois discusses using zero-knowledge proof in order to prove the existence (or lack of) a software vulnerability without sharing details about the vulnerability itself.","date_published":"2020-11-03T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/aae91f49-12af-4049-9467-e43107dcd555.mp3","mime_type":"audio/mpeg","size_in_bytes":59671475,"duration_in_seconds":2486}]},{"id":"17a4b729-0fc3-4eb0-9b32-5f35683bd4c0","title":"Episode 5: Isogeny-based Cryptography for Dummies!","url":"https://www.cryptography.fm/5","content_text":"The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have all received enormous renewed interest as a result.\n\nWhile the NIST post-quantum competition recently announced that it’s favoring candidates founded on lattice-based cryptography, it also encouraged further research into isogeny-based cryptography. But what even is isogeny-based cryptography? Is it as intimidating as it sounds? And what’s keeping it behind on NIST’s list of post-quantum primitives?\n\nToday, it’s my pleasure to be joined by isogeny-based cryptography researchers Luca de Feo and Hart Montgomery, co-authors of a recent publication titled “Cryptographic Group Actions and Applications”, which Luca affectionately described as a “isogeny-based cryptography for dummies” paper. We’ll be discussing isogeny-based cryptography and more.\n\nLinks and papers discussed in the show:\n\n\nCryptographic Group Actions and Applications\nCSIDH Intro\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Hart Montgomery and Luca De Feo.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have all received enormous renewed interest as a result.

\n\n

While the NIST post-quantum competition recently announced that it’s favoring candidates founded on lattice-based cryptography, it also encouraged further research into isogeny-based cryptography. But what even is isogeny-based cryptography? Is it as intimidating as it sounds? And what’s keeping it behind on NIST’s list of post-quantum primitives?

\n\n

Today, it’s my pleasure to be joined by isogeny-based cryptography researchers Luca de Feo and Hart Montgomery, co-authors of a recent publication titled “Cryptographic Group Actions and Applications”, which Luca affectionately described as a “isogeny-based cryptography for dummies” paper. We’ll be discussing isogeny-based cryptography and more.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Hart Montgomery and Luca De Feo.

Sponsored By:

","summary":"Luca Deo Feo and Hart Montgomery try to explain isogeny-based cryptography to Nadim.","date_published":"2020-10-27T16:00:00.000+01:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/17a4b729-0fc3-4eb0-9b32-5f35683bd4c0.mp3","mime_type":"audio/mpeg","size_in_bytes":69957033,"duration_in_seconds":2914}]},{"id":"0b9296cd-08f2-4ddd-bf6a-516ae7ad3d4b","title":"Episode 4: Formally Verifying Your Taxes With Catala!","url":"https://www.cryptography.fm/4","content_text":"Anyone who’s looked at the French civil code -- or, God forbid, the French tax code -- will tell you that it takes more than a mere human mind to decipher its meaning, given how it’s been growing and growing ever since it was established by Napoleon hundreds of years ago.\n\nWell, Catala is a new project that takes this adage perhaps a bit too literally, by applying formal methods -- a field increasingly seen as immediately adjacent to cryptography -- on the French tax code! Catala aims to provide a “domain-specific programming language designed for deriving correct-by-construction implementations from legislative texts.” -- what that means is that you’ll be able to describe the tax code in a programming language, and get a proven-correct processing of your tax returns in that same language, too!\n\nThis episode of Cryptography FM is not directly about cryptography. Instead we’ll be covering a highly related and definitely interesting tangent: can we use the same formal methods that have recently proven the security of protocols like Signal and TLS in order to formally verify our tax returns? And, more importantly, can today’s guest help me pay less taxes?!\n\nJoining us today is doctoral student Denis Merigoux, to talk about Catala, and more.\n\nLinks:\n\n\nCatala homepage\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Denis Merigoux.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Anyone who’s looked at the French civil code -- or, God forbid, the French tax code -- will tell you that it takes more than a mere human mind to decipher its meaning, given how it’s been growing and growing ever since it was established by Napoleon hundreds of years ago.

\n\n

Well, Catala is a new project that takes this adage perhaps a bit too literally, by applying formal methods -- a field increasingly seen as immediately adjacent to cryptography -- on the French tax code! Catala aims to provide a “domain-specific programming language designed for deriving correct-by-construction implementations from legislative texts.” -- what that means is that you’ll be able to describe the tax code in a programming language, and get a proven-correct processing of your tax returns in that same language, too!

\n\n

This episode of Cryptography FM is not directly about cryptography. Instead we’ll be covering a highly related and definitely interesting tangent: can we use the same formal methods that have recently proven the security of protocols like Signal and TLS in order to formally verify our tax returns? And, more importantly, can today’s guest help me pay less taxes?!

\n\n

Joining us today is doctoral student Denis Merigoux, to talk about Catala, and more.

\n\n

Links:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Denis Merigoux.

Sponsored By:

","summary":"Formal verification has been used to prove the security of cryptographic protocols like Signal and TLS – but can it also be used to verify the correctness of legislation? Denis Merigoux tells us about how Catala wants to use formal methods to verify the French tax code.","date_published":"2020-10-20T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/0b9296cd-08f2-4ddd-bf6a-516ae7ad3d4b.mp3","mime_type":"audio/mpeg","size_in_bytes":63271358,"duration_in_seconds":2636}]},{"id":"5cfe405b-94d1-401a-adf5-98850a709a99","title":"Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!","url":"https://www.cryptography.fm/3","content_text":"Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.\n\nWhile the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds.\n\nBut wait, what exactly is a parallelizable hash function? Isn't a lower round number risky? And heck, how do you even design a hash function?! Joining me today are two of the four BLAKE3 authors: Jack O’Connor and Jean-Philippe Aumasson, to discuss these questions and more.\n\nLinks and papers discussed in the show:\n\n\nBLAKE3\nToo Much Crypto\nPoSH: Proof of Staked Hardware Consensus\nOnline Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Jack O'Connor and Jean-Philippe Aumasson.Sponsored By:NSU: This episode of Cryptography FM is sponsored by NSUCRYPTO, the International Olympiad in Cryptography. NSUCrypto is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country. Its aim is to involve young researchers in solving curious and tough scientific problems of modern cryptography. From the very beginning, the concept of the Olympiad was not to focus on solving olympic tasks but on including unsolved research problems at the intersection of mathematics and cryptography. There were more than 1900 participants from 52 countries in the first six Olympiads!\r\n\r\nThe first round of the 2020 NSUCRYPTO Olympiad will be held this week on October 18th, so head over to the NSUCrypto website at https://nsucrypto.nsu.ru today to sign up and try your hand against interesting and fun cryptography puzzles!","content_html":"

Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.

\n\n

While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds.

\n\n

But wait, what exactly is a parallelizable hash function? Isn't a lower round number risky? And heck, how do you even design a hash function?! Joining me today are two of the four BLAKE3 authors: Jack O’Connor and Jean-Philippe Aumasson, to discuss these questions and more.

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Jack O'Connor and Jean-Philippe Aumasson.

Sponsored By:

","summary":"Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general.","date_published":"2020-10-13T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/5cfe405b-94d1-401a-adf5-98850a709a99.mp3","mime_type":"audio/mpeg","size_in_bytes":65673787,"duration_in_seconds":2736}]},{"id":"c92ef410-d45c-4ab4-977e-c4bacff9ed30","title":"Episode 2: Breaking Lightweight Symmetric Cryptography!","url":"https://www.cryptography.fm/2","content_text":"Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.\n\nAmong the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.\n\nIn their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.\n\nBut why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?\n\nLinks and papers discussed in the show:\n\n\nNew results on Gimli: full-permutation distinguishers and improved collisions\nLower Bounds on the Degree of Block Ciphers\nSaturnin lightweight cryptography\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guest: Léo Perrin.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.

\n\n

Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.

\n\n

In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.

\n\n

But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?

\n\n

Links and papers discussed in the show:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Léo Perrin.

Sponsored By:

","summary":"Léo Perrin talks about how his team at INRIA was able to find serious breaks in the Gimli family of lightweight symmetric primitives, and why NIST's lightweight cryptography competition even matters in the first place, especially with block ciphers like AES dominating the industry.","date_published":"2020-10-06T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/c92ef410-d45c-4ab4-977e-c4bacff9ed30.mp3","mime_type":"audio/mpeg","size_in_bytes":76465687,"duration_in_seconds":2064}]},{"id":"9388fc99-034b-4ba0-9a04-524f8f8d277c","title":"Episode 1: Post-Quantum TLS With KEMs Instead of Signatures!","url":"https://www.cryptography.fm/1","content_text":"TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is its potential for resistance to attacks that utilize quantum computing – computers that, theoretically, could factor the products of large primes and solve the discrete logarithm problem in relatively short periods of time, significantly affecting the security of TLS 1.3.\n\nToday however, we’re discussing an interesting new paper, to be published at this year’s ACM CCS, which introduces KEMTLS: a modified version of TLS 1.3 that uses Key Encapsulation Mechanisms, or KEMs, instead of signatures for server authentication, thereby providing a sort of “post-quantum TLS”.\n\nBut what even are KEMs? Are quantum computers even a thing that we should be worried about? On the first ever episode of Cryptography FM, we’ll be hosting Dr. Douglas Stebila and PhD Candidate Thom Wiggers to discuss these questions and more.\n\nDr. Douglas Stebila is an Associate Professor of cryptography in the Department of Combinatorics & Optimization at the University of Waterloo in Waterloo, Ontario, Canada. His research focuses on improving the security of key exchange protocols and Internet cryptography protocols such as TLS and SSH, including the development of quantum-resistant solutions. His previous work on the integration of elliptic curve cryptography in TLS has been deployed on hundreds of millions of web browsers and servers worldwide. \n\nThom Wiggers is a PhD Candidate at the Institute of Computing and Information Sciences at Radboud University in The Netherlands. He is working on the interactions of post-quantum cryptography with protocols, under the supervision of Dr. Peter Schwabe, who is also a co-author of the research work that we’re going to discuss today.\n\nLinks to discussed papers:\n\n\nPost-quantum TLS without handshake signatures\nBig Other: Surveillance Capitalism and the Prospects of an Information Civilization\nSupersingular isogeny key exchange for beginners\nClone Detection in Secure Messaging: Improving Post-Compromise Security in Practice\n\n\nMusic composed by Toby Fox and performed by Sean Schafianski.Special Guests: Douglas Stebila and Thom Wiggers.Sponsored By:Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.","content_html":"

TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is its potential for resistance to attacks that utilize quantum computing – computers that, theoretically, could factor the products of large primes and solve the discrete logarithm problem in relatively short periods of time, significantly affecting the security of TLS 1.3.

\n\n

Today however, we’re discussing an interesting new paper, to be published at this year’s ACM CCS, which introduces KEMTLS: a modified version of TLS 1.3 that uses Key Encapsulation Mechanisms, or KEMs, instead of signatures for server authentication, thereby providing a sort of “post-quantum TLS”.

\n\n

But what even are KEMs? Are quantum computers even a thing that we should be worried about? On the first ever episode of Cryptography FM, we’ll be hosting Dr. Douglas Stebila and PhD Candidate Thom Wiggers to discuss these questions and more.

\n\n

Dr. Douglas Stebila is an Associate Professor of cryptography in the Department of Combinatorics & Optimization at the University of Waterloo in Waterloo, Ontario, Canada. His research focuses on improving the security of key exchange protocols and Internet cryptography protocols such as TLS and SSH, including the development of quantum-resistant solutions. His previous work on the integration of elliptic curve cryptography in TLS has been deployed on hundreds of millions of web browsers and servers worldwide.

\n\n

Thom Wiggers is a PhD Candidate at the Institute of Computing and Information Sciences at Radboud University in The Netherlands. He is working on the interactions of post-quantum cryptography with protocols, under the supervision of Dr. Peter Schwabe, who is also a co-author of the research work that we’re going to discuss today.

\n\n

Links to discussed papers:

\n\n\n\n

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Douglas Stebila and Thom Wiggers.

Sponsored By:

","summary":"KEMTLS is a modified version of TLS 1.3 that uses Key Encapsulation Mechanisms, or KEMs, instead of signatures for server authentication, thereby providing a sort of “post-quantum TLS”. But what even are KEMs? Are quantum computers even a thing that we should be worried about? On the first ever episode of Cryptography FM, we’ll be hosting Dr. Douglas Stebila and PhD Candidate Thom Wiggers to discuss these questions and more.","date_published":"2020-09-29T16:00:00.000+02:00","attachments":[{"url":"https://chtbl.com/track/1E9A46/aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/9388fc99-034b-4ba0-9a04-524f8f8d277c.mp3","mime_type":"audio/mpeg","size_in_bytes":78630395,"duration_in_seconds":2143}]}]}