Cryptography FM

In-depth, substantive discussions on the latest news and research in applied cryptography.

About the show

Cryptography FM is a weekly podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM to talk about it with your host, Nadim Kobeissi.

Cryptography FM on social media

Episodes

  • Episode 14: Schnorr, Factoring and Lattices!

    March 30th, 2021  |  46 mins 30 secs

    Did Schnorr "destroy RSA" with his surprising ePrint submission? Lattice cryptography expert Léo Ducas joins Nadim from CWI, Amsterdam to discuss this topic and more on Cryptography FM.

  • Episode 13: Zero-Knowledge STARKs in the Real World!

    March 14th, 2021  |  47 mins
    zero-knowledge proofs

    Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.

  • Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!

    January 7th, 2021  |  1 hr 37 mins
    real world crypto

    In this special episode, Nadim and Benjamin go through the entire program of IACR Real World Crypto 2021 in preparation for an exciting conference!

  • Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate!

    December 8th, 2020  |  38 mins 8 secs
    post-quantum cryptography, signature schemes

    Serious weaknesses are uncovered in one of NIST's post-quantum cryptography finalists. Ward Beullens joins us to talk about his new research and more.

  • Episode 10: Exploiting Authenticated Encryption Key Commitment!

    December 1st, 2020  |  46 mins 34 secs
    authenticated encryption

    Ange Albertini and Stefan Kölbl discuss how new research from Google, the University of Haifa and Amazon is exploiting authenticated encryption to make a PDF decrypt into... a different PDF. And much more.

  • Episode 9: Off-the-Record Messaging and PKI Implementations!

    November 20th, 2020  |  41 mins 41 secs
    secure messaging

    Sofía Celi of Cloudflare talks about the latest version of Off-the-Record secure messaging protocol, why deniability is important, and more.

  • Episode‌ ‌8:‌ ‌Breaking‌ ‌Elliptic-Curve‌ ‌Signatures‌ ‌With‌ ‌LadderLeak!‌

    November 17th, 2020  |  42 mins 29 secs
    elliptic curve cryptography, side channel attacks

    LadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.

  • Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!

    November 10th, 2020  |  45 mins 10 secs
    secure messaging

    Raphael Robert from Wire talks about how MLS wants to scale secure messaging to groups with hundreds or even thousands of participants.

  • Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!

    November 3rd, 2020  |  41 mins 26 secs
    zero-knowledge proofs

    Dr. David Archer of Galois discusses using zero-knowledge proof in order to prove the existence (or lack of) a software vulnerability without sharing details about the vulnerability itself.

  • Episode 5: Isogeny-based Cryptography for Dummies!

    October 27th, 2020  |  48 mins 34 secs
    csidh

    Luca Deo Feo and Hart Montgomery try to explain isogeny-based cryptography to Nadim.

  • Episode 4: Formally Verifying Your Taxes With Catala!

    October 20th, 2020  |  43 mins 56 secs
    formal methods

    Formal verification has been used to prove the security of cryptographic protocols like Signal and TLS – but can it also be used to verify the correctness of legislation? Denis Merigoux tells us about how Catala wants to use formal methods to verify the French tax code.

  • Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!

    October 13th, 2020  |  45 mins 36 secs
    hash functions

    Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general.