Cryptography FM is a weekly podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM to talk about it with your host, Nadim Kobeissi.
C
Cryptography FM


1
Episode 12: Special Real World Crypto 2021 Pre-Conference Coverage!
1:37:46
1:37:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:37:46
Every year, the IACR Real World Cryptography symposium brings together researchers, engineers and practitioners in applied cryptography to discuss cryptography that matters, in the real world. To me, this is the big one! The one cryptography conference that matters the most. Who needs proceedings when you’ve got so much excitement in the air, and s…
C
Cryptography FM


1
Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate
38:08
38:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:08
The race for post-quantum cryptographic signature primitives is in its final lap over at NIST, which recently announced DILITHIUM, FALCON and Rainbow as the three signature primitive finalists. But a paper recently published by KU Leuven researcher Ward Beullens claims to find serious weaknesses in the security of Rainbow, one of those three finali…
C
Cryptography FM


1
Episode 10: Exploiting Authenticated Encryption Key Commitment!
46:34
46:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:34
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarantees “key commitment”: the notion that ciphertext should decrypt to a va…
C
Cryptography FM


1
Episode 9: Off-the-Record Messaging and PKI Implementations!
41:41
41:41
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:41
Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time. Now, more than a decade later, Off-the-Record messag…
C
Cryptography FM


1
Episode 8: Breaking Elliptic-Curve Signatures With LadderLeak!
42:29
42:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:29
Elliptic-curve signatures have become a highly used cryptographic primitive in secure messaging, TLS as well as in cryptocurrencies due to their high speed benefits over more traditional signature schemes. However, virtually all signature schemes are known to be susceptible to misuse, especially when information about the nonce is leaked to an atta…
C
Cryptography FM


1
Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!
45:10
45:10
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:10
Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’…
C
Cryptography FM


1
Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!
41:26
41:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:26
Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention. But what about using zero-knowledge proofs to prove the existence of a software…
C
Cryptography FM


1
Episode 5: Isogeny-based Cryptography for Dummies!
48:34
48:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
48:34
The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have …
C
Cryptography FM


1
Episode 4: Formally Verifying Your Taxes With Catala!
43:56
43:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:56
Anyone who’s looked at the French civil code -- or, God forbid, the French tax code -- will tell you that it takes more than a mere human mind to decipher its meaning, given how it’s been growing and growing ever since it was established by Napoleon hundreds of years ago. Well, Catala is a new project that takes this adage perhaps a bit too literal…
C
Cryptography FM


1
Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!
45:36
45:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:36
Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin. While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in Ja…
C
Cryptography FM


1
Episode 2: Breaking Lightweight Symmetric Cryptography!
34:24
34:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:24
Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases whe…
C
Cryptography FM


1
Episode 1: Post-Quantum TLS With KEMs Instead of Signatures!
35:43
35:43
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:43
TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is its potential for resistance to attacks that utilize quantum computing – computers that, theoretically, could factor the products of large primes and s…