Summary

Top Articles:

  • Germany Talking about Banning End-to-End Encryption
  • New SHA-1 Attack
  • Why Are Cryptographers Being Denied Entry into the US?
  • Applied Cryptography is Banned in Oregon Prisons
  • Intel Microcode Decryptor
  • SHA-3 Buffer Overflow
  • Security Analysis of the EU’s Digital Wallet
  • New Revelations from the Snowden Documents
  • Practically-exploitable Cryptographic Vulnerabilities in Matrix
  • MEGA attack explainer

Security Analysis of the EU’s Digital Wallet

Published: 2024-06-27 11:06:32

Popularity: 16

Author: Bruce Schneier

Keywords:

  • Uncategorized
  • credentials
  • cryptanalysis
  • cryptography
  • EU
  • identification
  • 🤖: "Digital wallet hack"

    A group of cryptographers have analyzed the eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet.

    ...more

    Encryption At Rest: Whose Threat Model Is It Anyway?

    Published: 2024-06-04 12:30:14

    Popularity: None

    Author: scottarc.blog via lcapaldo

    Keywords:

  • security
  • cryptography
  • 🤖: "Data breach"

    Comments

    ...more

    New Revelations from the Snowden Documents

    Published: 2023-09-21 11:03:43

    Popularity: 10

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • academic papers
  • backdoors
  • cryptography
  • Edward Snowden
  • NSA
  • privacy
  • Schneier news
  • surveillance
  • Jake Appelbaum’s PhD thesis contains several new revelations from the classified NSA documents provided to journalists by Edward Snowden. Nothing major, but a few more tidbits. Kind of amazing that that all happened ten years ago. At this point, those documents are more historical than anything else. And it’s unclear who has those archives anymore. According to Appelbaum, The Intercept destroyed their copy. I recently published an essay about my experiences ten years ago.

    ...more

    Removing PGP from PyPI

    Published: 2023-05-23 14:53:43

    Popularity: None

    Author: carlmjohnson@users.lobste.rs (carlmjohnson)

    Keywords:

  • python
  • security
  • cryptography
  • Comments

    ...more

    Breaking SHA256: length extension attacks in practice (with Go)

    Published: 2023-05-24 18:12:23

    Popularity: None

    Author: Zamicol@users.lobste.rs (Zamicol)

    Keywords:

  • security
  • go
  • cryptography
  • Comments

    ...more

    SHA-3 Buffer Overflow (Part 2)

    Published: 2023-05-30 18:30:30

    Popularity: 2

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    Towards End-to-End Encryption for Direct Messages in the Fediverse

    Published: 2022-11-22 10:59:01

    Popularity: None

    Author: soatok@users.lobste.rs (soatok)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    SHA-3 Buffer Overflow

    Published: 2022-10-21 06:52:33

    Popularity: 24

    Author: sjamaan@users.lobste.rs (sjamaan)

    Keywords:

  • security
  • cryptography
  • 🤖: "Crashing bad!"

    Comments

    ...more

    Practically-exploitable Cryptographic Vulnerabilities in Matrix

    Published: 2022-09-29 19:39:34

    Popularity: 6

    Author: df@users.lobste.rs (df)

    Keywords:

  • pdf
  • security
  • cryptography
  • 🤖: "Matrix meltdown"

    Comments

    ...more

    Intel Microcode Decryptor

    Published: 2022-07-19 12:38:57

    Popularity: 68

    Author: wizardishungry@users.lobste.rs (wizardishungry)

    Keywords:

  • security
  • hardware
  • assembly
  • cryptography
  • Comments

    ...more

    MEGA attack explainer

    Published: 2022-06-22 10:46:03

    Popularity: 3

    Author: jbert@users.lobste.rs (jbert)

    Keywords:

  • security
  • cryptography
  • 🤖: "Ransomware alert"

    Comments

    ...more

    Themes from Real World Crypto 2022

    Published: 2022-05-04 20:11:58

    Popularity: None

    Author: crazyloglad@users.lobste.rs (crazyloglad)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    badkeys.info - checking cryptographic keys for known vulnerabilities

    Published: 2022-04-25 15:25:02

    Popularity: None

    Author: hanno@users.lobste.rs (hanno)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    Fermat Attack on RSA

    Published: 2022-03-14 14:42:35

    Popularity: None

    Author: hanno@users.lobste.rs (hanno)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    New SHA-1 Attack

    Published: 2020-01-08 15:38:49

    Popularity: 364

    Author: Bruce Schneier

    Keywords:

  • academic papers
  • certifications
  • cryptography
  • encryption
  • forgery
  • impersonation
  • keys
  • PGP
  • SHA-1
  • 🤖: ""Hash fail""

    There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7,...

    ...more

    Applied Cryptography is Banned in Oregon Prisons

    Published: 2019-07-05 18:52:51

    Popularity: 314

    Author: Bruce Schneier

    Keywords:

  • Applied Cryptography
  • books
  • censorship
  • cryptography
  • prisons
  • 🤖: "Coded out"

    My Applied Cryptography is on a list of books banned in Oregon prisons. It's not me -- and it's not cryptography -- it's that the prisons ban books that teach people to code. The subtitle is "Algorithms, Protocols, and Source Code in C" -- and that's the reason. My more recent Cryptography Engineering is a much better book for prisoners,...

    ...more

    Germany Talking about Banning End-to-End Encryption

    Published: 2019-05-24 13:39:37

    Popularity: 551

    Author: Bruce Schneier

    Keywords:

  • crypto wars
  • cryptography
  • encryption
  • Germany
  • 🤖: "gov snooping 📱👻"

    Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn't say how. (Cory Doctorow has previously explained why this would be impossible.) The article is in German, and I would...

    ...more

    Why Are Cryptographers Being Denied Entry into the US?

    Published: 2019-05-17 11:18:10

    Popularity: 357

    Author: Bruce Schneier

    Keywords:

  • borders
  • cryptography
  • national security policy
  • security conferences
  • In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't attend an awards ceremony in DC because of visa issues. (You can listen to his recorded acceptance speech.) I've heard of two other prominent cryptographers who are in the same...

    ...more

    A peek into build provenance for Homebrew

    Published: 2024-05-14 14:00:58

    Popularity: None

    Author: blog.trailofbits.com by yossarian

    Keywords:

  • ruby
  • security
  • cryptography
  • Comments

    ...more

    end