While analyzing Signal with Markus, I noticed that Signal’s Curve25519-based ECDH doesn’t validate public keys, and in particular will accept the 0 point as a
Category: Crypto
Auditing code for crypto flaws: the first 30 minutes
Auditing your code for proper crypto use is extremely important. However, what if it’s not generally your focus? If your job today is to find
How (not) to break your (EC)DSA
During an internal project pertaining to automated cryptographic testing, we discovered that many implementations don’t respect standard specifications, especially signature algorithms. Let us take a
What does “secure” mean for an authenticated cipher?
This week I am in Tokyo to present a research paper in cryptography at the 24th International Conference on Fast Software Encryption, the reference academic
On CIA Crypto
On Tuesday, Wikileaks released a tranche of alleged Top Secret CIA documents, many involving explanations of their cryptographic requirements. Reading through the documents turned out
Why Replace SHA-1 with BLAKE2?
Unless you’ve lived under a rock for the last twelve years, you must know that the cryptographic hash function SHA-1 is broken, in the sense