In response to a FOIA request, the NSA released “Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, with a lot of redactions. Weirdly, this is the second time...
Read moreImprovements in Brute Force Attacks
March 17 2025New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
Abstract: Key lengths in symmetric cryptography are determined...
Read more
Implementing Cryptography in AI Systems
February 21 2025Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”
Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them...
Read more
New Advances in the Understanding of Prime Numbers
December 19 2024Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based public-key algorithms, but every little bit matters.
Read moreMatthew Green on Telegram’s Encryption
August 28 2024Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not. EDITED TO ADD (8/28): Another good explainer from Kaspersky.
Read moreOn the Voynich Manuscript
August 13 2024Really interesting article on the ancient-manuscript scholars who are applying their techniques to the Voynich Manuscript.
No one has been able to understand the writing yet, but there are...
Read moreSecurity Analysis of the EU’s Digital Wallet
June 27 2024A group of cryptographers have analyzed the eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet.
Read moreBreaking the M-209
June 25 2024Interesting paper about a German cryptanalysis machine that helped break the US M-209 mechanical ciphering machine. The paper contains a good description of how the M-209 works.
Read moreRecovering Public Keys from Signatures
June 20 2024Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to know whether a...
Read moreDemo of AES GCM Misuse Problems
June 14 2024This is really neat demo of the security problems arising from reusing nonces with a symmetric cipher in GCM mode.
Read more
Recent Comments