Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
📻 Siste episoder av Cryptography FM
Her er de nyeste episodene tilgjengelige via RSS-feeden:
Episode 24: CryptoHack's Collection of Cryptic Conundrums! (00:49:18)
For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a...
Episode 23: Psychic Signatures in Java! (00:53:20)
On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatu...
Episode 22: Three Lessons from Threema: Breaking a Secure Messenger! (00:52:12)
Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Arm...
Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics! (00:46:52)
Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.
Links and papers discussed i...
Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2! (00:42:56)
A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of G...
Episode 19: Cross-Protocol Attacks on TLS with ALPACA! (00:41:44)
TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was d...
Episode 18: Optimizing Cryptography for Microcontrollers! (00:36:56)
Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded pla...
Episode 17: Breaking Wi-Fi With Frame Attacks! (00:35:58)
Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have be...
Episode 16: Contact Discovery in Mobile Messengers! (00:46:44)
Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contac...
Episode 15: Bringing Secure Multiparty Computation to the Real World! (00:46:50)
Secure multi-party computation is a fascinating field in cryptography, researching how to allow multiple parties to compute secure operations over inputs while keeping those inputs private. This makes...
Episode 14: Schnorr, Factoring and Lattices! (00:46:30)
On March 1st, 2021, a curious paper appeared on the Cryptology ePrint Archive: senior cryptographer Claus Peter Schnorr submitted research that claims to use lattice mathematics to improve the fast fa...
Episode 13: Zero-Knowledge STARKs in the Real World! (00:47:00)
Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical...
Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage! (01:37:46)
Every year, the IACR Real World Cryptography symposium brings together researchers, engineers and practitioners in applied cryptography to discuss cryptography that matters, in the real world. To me, ...
Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate! (00:38:08)
The race for post-quantum cryptographic signature primitives is in its final lap over at NIST, which recently announced DILITHIUM, FALCON and Rainbow as the three signature primitive finalists. But a ...
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given re...
Episode 9: Off-the-Record Messaging and PKI Implementations! (00:41:41)
Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced ...
Elliptic-curve signatures have become a highly used cryptographic primitive in secure messaging, TLS as well as in cryptocurrencies due to their high speed benefits over more traditional signature sch...
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS! (00:45:10)
Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat featur...
Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs! (00:41:26)
Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kin...
Episode 5: Isogeny-based Cryptography for Dummies! (00:48:34)
The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for p...
Episode 4: Formally Verifying Your Taxes With Catala! (00:43:56)
Anyone who’s looked at the French civil code -- or, God forbid, the French tax code -- will tell you that it takes more than a mere human mind to decipher its meaning, given how it’s been growing and ...
Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees! (00:45:36)
Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.
While the origi...
Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography ...
Episode 1: Post-Quantum TLS With KEMs Instead of Signatures! (00:35:43)
TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is i...
Side 1 av 1
Cryptography FM - Gratis RSS Feed for Norsk Podcast | OpenPodMe | OpenPodMe - Åpen RSS for Norske Podcaster