After figuring out how to design secure ciphers, cryptographers tried to find how to make secure ciphers as simple as possible. Permutation-based cryptography is the
Author: JP Aumasson
Forum EPFL 2014 Crypto Challenge
For the Forum EPFL 2014 job fair, we created a crypto challenge—in the spirit of CTF hacking contests—and offered to award a quadcopter drone to
SHA-1 backdooring and exploitation
This content was originally published on the website of the Malicious SHA-1 project. Summary This is about the Malicious SHA-1 project, a research project that
NORX for CAESAR
NORX is a new cipher designed by Philipp Jovanovic, Samuel Neves, and yours truly (in this order). NORX’ features make it superior to legacy algorithms
Insomni’hack + writeup GigPanG echo
This year's Insomni'hack CTF was even better than the previous years, with a higher level both on the challenges side and on the participating teams
The NSA Conference
This week I was in San Francisco to attend the RSA Conference, where I gave and attended a couple of talks, met some old and