#Cryptanalysis

Schneier on Security RSSSchneier_rss@burn.capital
2025-05-19

The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)”

“Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, was just declassified—with a lot of redactions—by the NSA.
I... schneier.com/blog/archives/202

#Uncategorized #cryptanalysis #mathematics #reports #NSA

2025-04-22

The US, UK, and Japan signed the London Naval Treaty OTD in 1930, regulating #submarine warfare and limiting shipbuilding; see where US #cryptanalysis monitored Japan's plans toilet-guru.com/submarine.html #history

2025-04-22

The US, UK, and Japan signed the London Naval Treaty OTD in 1930, regulating submarine warfare and limiting shipbuilding; see where US #cryptanalysis monitored Japan's plans cromwell-intl.com/travel/usa/n #travel #history

2025-04-04

Isoroku Yamamoto, born OTD in 1884, was commander-in-chief of the Imperial Japanese Combined Fleet during World War II, until his plane was shot down thanks to Allied #cryptanalysis cromwell-intl.com/cybersecurit #cybersecurity #history

Schneier on Security RSSSchneier_rss@burn.capital
2025-03-17

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
... schneier.com/blog/archives/202

#academicpapers #Uncategorized #cryptanalysis #keys

N-gated Hacker Newsngate
2025-03-10

🤔 Ah yes, the riveting world of Sigint fiction, where is as thrilling as watching paint dry on a damp day in February. 🕵️‍♂️🎨 Clearly, only the John Buchan could make decrypting wartime sound as exciting as reading your car's manual. 📚🚗
siginthistorian.blogspot.com/2

N-gated Hacker Newsngate
2025-03-04

🤓 Oh, look! An "breaking" that isn't exhaustive but promises to hold your hand while you pretend to be a cryptanalyst! 🤯 Because nothing screams "serious cryptographer" like starting with a cheat sheet and a recommendation to try the real thing. 🙄
davidwong.fr/blockbreakers/

Schneier on Security RSSSchneier_rss@burn.capital
2025-02-21

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”
Abstract: The wide adoption of deep neural networks (DNNs) raises the ques... schneier.com/blog/archives/202

#academicpapers #Uncategorized #cryptanalysis #cryptography #AI

2025-02-12

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Daniel Genkin, Daniel Genkin, Eran Tromer

cs-people.bu.edu/tromer/papers

#hacking #cryptography #cryptanalysis #extraction

Aleksei Udovenkohellman@mathstodon.xyz
2025-01-06

I am (still) looking for a #postdoc on #cryptanalysis of post-quantum signatures (1.5 years duration, starting soon), in Luxembourg. The scope is broad though code-based / multivariate / equation solving experiences are preferable. More details on iacr.org/jobs/item/3875 #jobopening

2025-01-01
'period'
'cipher period'
'periodic range'
'periodic limit'
'periodicity'

This is not to be confused with 'cryptoperiod' or 'key period' or 'key time domain' which refers to the time a key is valid.

The 'period' refers to the length of the cipher stream or generator stream before it repeats from the initial keying or initialization state. Some ciphers may be considered unsafe before reaching this generator period for other reasons, such as mode mixing.

For example we might say the generator period is 2^155337 which means after generating that much data the stream would cycle back to its initial values. If the amount of data fed into the cipher stream exceeds the period then security is compromised (theoretically, in practice it might be unnoticed by an attacker).

Last I checked AES has a period of something like 2^39 - 256 for the same key. Your key schedule should be automatically handling that anyway to a much smaller limit.

The cipher period limitation may be referred to as:

'maximum safe ciphertext length' or 'maximum safe message size'

#cryptography #cipher #cryptanalysis #cryptology #crypto #math #encryption
2024-12-31

🙌#call4reading

✍️Quantum #Cryptanalysis on #A5/1 Stream cipher #by Swamy Naidu Allu and Appala Naidu Tentu

🔗cspub-ijcisim.org/index.php/ij

Einstein^Diogenes@UniverseLinkazuresaipan@defcon.social
2024-12-21

Pro-cryptos for what? Not for crypto currency (you have to worship cops and the government which is opposed to BTC). Not for online privacy and counter mass surveillance to enforce the 4th amemdment of the Consititution.
Just crypto for oppressing the population and launching the missiles? That must be why nearly every person in a democracy supports our subjugators. Why not opt out of being violated and robbed of sense instead?

Crypto-anarchism intelligence
youtube.com/watch?v=ZVLbpC3HBM
#MoneroCommunity

Joseph K. Liu (pronounced 'lieu')
eprint.iacr.org/2019/508

#Monero RingCT #cryptanalysis heruistics
odysee.com/chainalysis-monero-

Breaking Monero
youtube.com/watch?v=WOyC6OB6ez

Schneier on Security RSSSchneier_rss@burn.capital
2024-12-18

New Advances in the Understanding of Prime Numbers

Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based publ... schneier.com/blog/archives/202

#Uncategorized #cryptanalysis #mathematics

2024-12-18

🤩#call4reading

✍️Quantum rotational #cryptanalysis for preimage #recovery of round-reduced #Keccak #by Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, and Baocang Wang

🔗10.26421/QIC23.3-4-3

FreddyB Aviation Photographycvvhrn@sfba.social
2024-12-08

what up NSA peeps. Don’t want to leave USN Group 6 out either #FtMeede #cryptanalysis #NSA #codes #nosuchagency

Schneier on Security RSSSchneier_rss@burn.capital
2024-08-28

Matthew Green on Telegram’s Encryption

Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not.... schneier.com/blog/archives/202

#Uncategorized #cryptanalysis #encryption #Telegram

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst