Security Cryptography Whatever
Deirdre Connolly, Thomas Ptacek, David Adrian
1 Listener
All episodes
Best episodes
Seasons
Top 10 Security Cryptography Whatever Episodes
Goodpods has curated a list of the 10 best Security Cryptography Whatever episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Security Cryptography Whatever for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Security Cryptography Whatever episode by adding your comments to the episode page.
Attacking Lattice-based Cryptography with Martin Albrecht
Security Cryptography Whatever
11/13/23 • 57 min
Returning champion Martin Albrecht joins us to help explain how we measure the security of lattice-based cryptosystems like Kyber and Dilithium against attackers. QRAM, BKZ, LLL, oh my!
Transcript: https://securitycryptographywhatever.com/2023/11/13/lattice-attacks/
Links:
- https://pq-crystals.org/kyber/index.shtml
- https://pq-crystals.org/dilithium/index.shtml
- https://eprint.iacr.org/2019/930.pdf
- https://en.wikipedia.org/wiki/Short_integer_solution_problem
- Frodo: https://eprint.iacr.org/2016/659
- https://csrc.nist.gov/CSRC/media/Events/third-pqc-standardization-conference/documents/accepted-papers/ribeiro-saber-pq-key-pqc2021.pdf
- https://en.wikipedia.org/wiki/Hermite_normal_form
- https://en.wikipedia.org/wiki/Wagner%E2%80%93Fischer_algorithm
- https://www.math.auckland.ac.nz/~sgal018/crypto-book/ch18.pdf
- https://eprint.iacr.org/2019/1161
- QRAM: https://arxiv.org/abs/2305.10310
- https://en.wikipedia.org/wiki/Lenstra%E2%80%93Lenstra%E2%80%93Lov%C3%A1sz_lattice_basis_reduction_algorithm
- MATZOV improved dual lattice attack: https://zenodo.org/records/6412487
- https://eprint.iacr.org/2008/504.pdf
- https://eprint.iacr.org/2023/302.pdf
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
1 Listener
Nate Lawson II
Security Cryptography Whatever
09/29/22 • 83 min
This episode got delayed because David got COVID. Anyway, here's Nate Lawson: The Two Towers.
- Steven Chu: https://en.wikipedia.org/wiki/Steven_Chu
- CFB: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_(CFB)
- CCFB: https://link.springer.com/chapter/10.1007/11502760_19
- XXTEA: https://en.wikipedia.org/wiki/XXTEA
- CHERI: https://cseweb.ucsd.edu/~dstefan/cse227-spring20/papers/watson:cheri.pdf
Transcript:
https://securitycryptographywhatever.com/2022/09/29/nate-lawson-ii/
Errata:
- Pedram Amini did in fact do Pai Mei
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Cancellable Crypto Takes and Real World Crypto
Security Cryptography Whatever
04/13/22 • 71 min
Live from Amsterdam, it's cancellable crypto hot takes! A fun little meme, plus a preview of the Real World Crypto program!
Transcript:
https://securitycryptographywhatever.com/2022/04/12/cancellable-crypto-takes-and-real-world-crypto/
Links:
Tony's twete: https://twitter.com/bascule/status/1512539700220805124
Real World Crypto 2022: https://rwc.iacr.org/2022
Merch! https://merch.scwpodcast.com
Find us at:
https://twitter.com/scwpod
https://twitter.com/durumcrustulum
https://twitter.com/tqbf
https://twitter.com/davidcadrian
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Why do we think anything is secure, with Steve Weis
Security Cryptography Whatever
06/29/23 • 46 min
What does P vs NP have to do with cryptography? Why do people love and laugh about the random oracle model? What's an oracle? What do you mean factoring and discrete log don't have proofs of hardness? How does any of this cryptography stuff work, anyway? We trapped Steve Weis into answering our many questions.
Transcript:
https://securitycryptographywhatever.com/2023/06/29/why-do-we-think-anything-is-secure-with-steve-weis/
Links:
- The Random Oracle Methodology, Revisited: https://eprint.iacr.org/1998/011.pdf
- Factoring integers with CADO-NFS: https://www.ens-lyon.fr/LIP/AriC/wp-content/uploads/2015/03/JDetrey-tutorial.pdf
- On One-way Functions from NP-Complete Problems: https://eprint.iacr.org/2021/513.pdf
- Seny Kamara's lecture notes on provable security: https://cs.brown.edu/~seny/2950-v/2-provablesecurity.pdf
- How To Simulate It – A Tutorial on the Simulation Proof Technique: https://eprint.iacr.org/2016/046.pdf
- A Survey of Leakage-Resilient Cryptography: https://eprint.iacr.org/2019/302
- A Decade of Lattice Cryptography: https://eprint.iacr.org/2015/939.pdf
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Telegram with Matthew Green
Security Cryptography Whatever
09/07/24 • 64 min
We finally have an excuse to tear down Telegram! Their CEO got arrested by the French, apparently not because the cryptography in Telegram is bad, but special guest Matt Green joined us to talk about how the cryptography is bad anyway, and you probably shouldn't use Telegram as a secure messenger of any kind!
Transcript: https://securitycryptographywhatever.com/2024/09/06/telegram
Links:
- https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/
- Lavabit / Ladar Levinson: https://en.wikipedia.org/wiki/Lavabit
- Pavel Durov indictment statement from French authorities: https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-28%20-%20CP%20TELEGRAM%20mise%20en%20examen.pdf
- MTProto 2.0 protocol spec: https://core.telegram.org/api/end-to-end
- https://words.filippo.io/dispatches/telegram-ecdh/
- MTProto 1.0 (old no longer used): - https://web.archive.org/web/20131220000537/https://core.telegram.org/api/end-to-end#key-generation
- OTR: https://otr.cypherpunks.ca/otr-wpes.pdf
- AES and sha2 used in ‘Infinite Garble Extension’ mode: https://eprint.iacr.org/2015/1177.pdf
- Four Attacks and a Proof for Telegram: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9833666
- History of Telegram e2ee chats availability: https://en.wikipedia.org/wiki/Telegram_(software)#Architecture
- https://securitycryptographywhatever.com/2023/01/27/threema/
- https://securitycryptographywhatever.com/2022/11/02/Matrix-with-Martin-Albrecht-Dan-Jones/
- https://en.wikipedia.org/wiki/Matrix_(protocol), introduced in September 2014
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Tink with Sophie Schmieg
Security Cryptography Whatever
05/28/22 • 67 min
We talk about Tink with Sophie Schmieg, cryptographer and algebraic geometer at Google.
Transcript:
https://securitycryptographywhatever.com/2022/05/28/tink-with-sophie-schmieg/
Links:
- Sophie: https://twitter.com/SchmiegSophie
- Tink: https://github.com/google/tink
- RWC talk: https://youtube.com/watch?t=1028&v=CiH6iqjWpt8
- Where to store keys: https://twitter.com/SchmiegSophie/status/1413502566797778948
- EAX mode: https://en.wikipedia.org/wiki/EAX_mode
- AES-GCM-SIV: https://en.wikipedia.org/wiki/AES-GCM-SIV
- Deterministic AEADs: https://github.com/google/tink/blob/master/docs/PRIMITIVES.md#deterministic-authenticated-encryption-with-associated-data
- Thai Duong: https://twitter.com/XorNinja
- AWS-SDK Vuln: https://twitter.com/XorNinja/status/1310587707605659649
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
NSO group, Pegasus, Zero-Days, i(OS|Message) security
Security Cryptography Whatever
07/26/21 • 59 min
Deirdre, Thomas and David talk about NSO group, Pegasus, whether iOS a burning trash fire, the zero-day market, and whether rewriting all of iOS in Swift is a viable strategy for reducing all these vulns.
Transcript:
https://securitycryptographywhatever.com/2021/07/26/nso-group-pegasus-zero-days-i-os-message-security/
Find us at:
https://twitter.com/durumcrustulum
https://twitter.com/tqbf
https://twitter.com/davidcadrian
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Lattices and Michigan Football with Chris Peikert
Security Cryptography Whatever
03/13/22 • 70 min
We're back! With an episode on lattice-based cryptography, with Professor Chris Peikert of the University of Michigan, David's alma mater. When we recorded this, Michigan football had just beaten Ohio for the first time in a bajillion years, so you get a nerdy coda on college football this time!
Transcript:
https://securitycryptographywhatever.com/2022/03/12/lattices-and-michigan-football-with-chris-peikert/
Slides: https://web.eecs.umich.edu/~cpeikert/pubs/slides-qcrypt.pdf
Links:
He Gives C-Sieves on the CSIDH: https://eprint.iacr.org/2019/725
Lattice-based Cryptography: https://cims.nyu.edu/~regev/papers/pqc.pdf
NIST PQC Competition: https://csrc.nist.gov/Projects/post-quantum-cryptography
The 2nd Bar Ilan Winter School on Cryptography Lattice- Based Cryptography and Applications: https://www.youtube.com/playlist?list=PL8Vt-7cSFnw2OmpCmPLLwSx0-Yqb2ptqO
A Decade of Lattice Cryptography: https://eprint.iacr.org/2015/939.pdf
Find us at:
https://twitter.com/scwpod
https://twitter.com/durumcrustulum
https://twitter.com/tqbf
https://twitter.com/davidcadrian
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Campaign Security with [REDACTED]
Security Cryptography Whatever
10/13/24 • 83 min
With the 2024 United States Presidential Election right around the corner, we talk to an unnamed guest who has worked on cybersecurity for political campaigns in the United States since 2004. We recorded this in late August, 2024.
Transcript: https://securitycryptographywhatever.com/2024/10/13/campaign-security/
Links:
- Active Measures by Thomas Rind: https://us.macmillan.com/books/9780374287269/activemeasures
- Aurora: https://en.wikipedia.org/wiki/Operation\_Aurora
- Google APP announcement, October 2017: https://www.wired.com/story/google-advanced-protection-locks-down-accounts/
- XXD: https://linux.die.net/man/1/xxd
- Adobe Reader October 2016 Security Update: https://helpx.adobe.com/security/products/acrobat/apsb16-33.html
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Hot Cryptanalytic Summer with Steven Galbraith
Security Cryptography Whatever
08/11/22 • 52 min
Are the isogenies kaput?! There's a new attack that breaks all the known parameter sets for SIDH/SIKE, so Steven Galbraith helps explain where the hell this came from, and where isogeny crypto goes from here.
Transcript:
https://securitycryptographywhatever.com/2022/08/11/hot-cryptanalytic-summer-with-steven-galbraith/
Merch: https://merch.scwpodcast.com
Links:
- https://eprint.iacr.org/2022/975.pdf
- https://eprint.iacr.org/2022/1026.pdf
- https://ellipticnews.wordpress.com/2022/07/31/breaking-supersingular-isogeny-diffie-hellman-sidh/
- GPST active adaptive attack against SIDH: https://eprint.iacr.org/2016/859.pdf
- Failing to hash into supersingular isogeny graphs: https://eprint.iacr.org/2022/518.pdf
- https://research.nccgroup.com/2022/08/08/implementing-the-castryck-decru-sidh-key-recovery-attack-in-sagemath/
- Kuperberg attack via Peikert: https://eprint.iacr.org/2019/725.pdf
- SQISign: https://eprint.iacr.org/2020/1240.pdf
- (Post recording) Breaking SIDH in polynomial time:
https://eprint.iacr.org/2022/1038.pdf
"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
Show more best episodes
Show more best episodes
FAQ
How many episodes does Security Cryptography Whatever have?
Security Cryptography Whatever currently has 50 episodes available.
What topics does Security Cryptography Whatever cover?
The podcast is about Security, Mathematics, Podcasts, Technology and Science.
What is the most popular episode on Security Cryptography Whatever?
The episode title 'Attacking Lattice-based Cryptography with Martin Albrecht' is the most popular.
What is the average episode length on Security Cryptography Whatever?
The average episode length on Security Cryptography Whatever is 65 minutes.
How often are episodes of Security Cryptography Whatever released?
Episodes of Security Cryptography Whatever are typically released every 23 days, 10 hours.
When was the first episode of Security Cryptography Whatever?
The first episode of Security Cryptography Whatever was released on Jul 26, 2021.
Show more FAQ
Show more FAQ