Gesamtlänge aller Episoden: 18 hours 27 minutes
For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer...
Nadim and Lucas talk to Neil Madden about his discovery of the "Psychic Signatures" vulnerability in Java, allowing attackers to completely bypass cryptographic signature checks in Java platforms in highly sensitive security contexts.
Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers...
Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.
Were GPRS's encryption ciphers deliberately backdoored? Nadim discusses this question with cryptanalysts Gaëtan Leurent and Håvard Raddum.
Nadim discusses a new line of cross-protocol attacks on TLS with Marcus Brinkmann and Robert Merget, made possible via the new ALPACA Attack, research published this year at the USENIX Security Symposium.
Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms
Mathy Vanhoef breaks Wi-Fi security yet again, with a new frame aggregation attack that affects all Wi-Fi encryption standards since 1997 and up to today.
Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.
Nadim talks with Yehuda Lindell and Nigel Smart of Unbound Security about how multi-party computation can enter the real world, away from the blank slate of academia.