• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From cryptographyengineering.com

Let’s talk about AI and end-to-end encryption

12 30

Recently I came across a fantastic new paper by a group of NYU and Cornell researchers entitled “How to think about end-to-end encryption and AI.” I’m extremely grateful to see th…

#mlsec #aiagents #cypherpunk #generativeAI #surveillance #AI #encryption #privacy

20h ago

From cryptographyengineering.com

Is Telegram really an encrypted messaging app?

1 1

This blog is reserved for more serious things, and ordinarily I wouldn’t spend time on questions like the above. But much as I’d like to spend my time writing about exciting topics, som…

on Aug 28

From cryptographyengineering.com

How does the NSA break SSL?

0 0

A few weeks ago I wrote a long post about the NSA’s ‘BULLRUN’ project to subvert modern encryption standards. I had intended to come back to this at some point, since I didn&#8217…

on Dec 19

From cryptographyengineering.com

Why is Signal asking users to set a PIN, or “A few thoughts on Secure Value Recovery”

0 0

Over the past several months, Signal has been rolling out a raft of new features to make its app more usable. One of those features has recently been raising a bit of controversy with users. This i…

on Dec 5

From cryptographyengineering.com

Should you use SRP?

0 0

This page has some wonky notes about the Secure Remote Password protocol. TL;DR: I don’t like it. It’s also not obviously broken. But it’s inefficient and you should use OPAQUE. L…

on Sep 18

From cryptographyengineering.com

A riddle wrapped in a curve

0 0

If you’re looking for a nice dose of crypto conspiracy theorizing and want to read a paper by some very knowledgeable cryptographers, I have just the paper for you. Titled “A Riddle Wrapped in an E…

on Aug 6

From cryptographyengineering.com

Zero Knowledge Proofs: An illustrated primer

0 0

One of the best things about modern cryptography is the beautiful terminology. You could start any number of punk bands (or Tumblrs) named after cryptography terms like ‘hard-core predicate&#…

on Jun 24

From cryptographyengineering.com

A Few Thoughts on Cryptographic Engineering

0 0

Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.

on Jun 24

From cryptographyengineering.com

Beyond public key encryption

0 0

One of the saddest and most fascinating things about applied cryptography is how little cryptography we actually use. This is not to say that cryptography isn’t widely used in industry &#8212…

on May 17

From cryptographyengineering.com

A quick post on Chen’s algorithm

0 0

If you’re a normal person — that is, a person who doesn’t obsessively follow the latest cryptography news — you probably missed last week’s cryptography bombshell. That news comes…

on Apr 17

From cryptographyengineering.com

Attack of the week: Airdrop tracing

0 0

It’s been a while since I wrote an “attack of the week” post, and the fault for this is entirely mine. I’ve been much too busy writing boring posts about Schnorr signatures!…

on Jan 21

From cryptographyengineering.com

How does Apple (privately) find your offline devices?

0 0

At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”. Unlike Apple’s “Find my iPhone”, which uses cellular communication and the lost…

on Dec 27, 2023

From cryptographyengineering.com

On Ghost Users and Messaging Backdoors

0 0

The past few years have been an amazing time for the deployment of encryption. In ten years, encrypted web connections have gone from a novelty into a requirement for running a modern website. Smar…

on Dec 18, 2023

From cryptographyengineering.com

To Schnorr and beyond (part 2)

0 0

This post continues a long, wonky discussion of Schnorr signature schemes and the Dilithium post-quantum signature. You may want to start with Part 1. In the previous post I discussed the intuition…

on Nov 30, 2023

From cryptographyengineering.com

To Schnorr and beyond (Part 1)

0 0

Warning: extremely wonky cryptography post. Also, possibly stupid and bound for nowhere. One of the hardest problems in applied cryptography (and perhaps all of computer science!) is explaining why…

on Oct 6, 2023

From cryptographyengineering.com

What’s the matter with PGP?

0 0

Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google’s end-to-end email extension. This is a Big Deal. With providers like Google and Yahoo onboa…

on Oct 1, 2023