24 episodes

Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.

Cryptography FM Symbolic Software

    • Science
    • 4.7 • 12 Ratings

Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.

    Episode 24: CryptoHack's Collection of Cryptic Conundrums!

    Episode 24: CryptoHack's Collection of Cryptic Conundrums!

    For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer. On this episode, Nadim and Lucas are joined by Giacomo Pope and Laurence Tennant, the founders of CryptoHack, to discuss how the platform came to be, and how it evolved, as well as how to improve cryptographic pedagogy more broadly.
    Special Guests: Giacomo Pope and Laurence Tennant.
    Sponsored By:
    Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:
    CryptoHack — A fun, free platform for learning modern cryptographySome Cryptography Books I Like — This is just a brief post going over a few books on Cryptography I’ve read, and would potentially recommend to people interested in the topic.

    • 49 min
    Episode 23: Psychic Signatures in Java!

    Episode 23: Psychic Signatures in Java!

    On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatures. How are popular cryptographic protocol implementations in Java affected? What's the state of Java cryptography as a whole? Join Neil, Nadim and Lucas as they discuss.


    Music composed by Yasunori Mitsuda.
    Special Guest: Neil Madden.
    Sponsored By:
    Symbolic Software: Dr. Kobushi's Labyrinthine Laboratory® is a puzzle game that has been described as “a combination between Pac-Man and chess”. Guide the adventurous Ayla as she attempts to rescue her dog, Falafel, from the confines of a mysterious towering laboratory deep within a solitary forest. Dr. Kobushi's Labyrinthine Laboratory combines puzzle and strategy elements with an engaging storyline full of memorable characters and biting humor.IACR:

    AfricaCrypt is an annual International Conference on the Theory and Applications of Cryptology. AfricaCrypt is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field, and has seen many renown researchers deliver keynote presentations. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).Links:
    CVE-2022-21449: Psychic Signatures in JavaCVE-2022-21449 Proof of Concept — CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server.Bitwarden design flaw: Server side iterations — In the aftermath of the LastPass breach it became increasingly clear that LastPass didn’t protect their users as well as they should have. When people started looking for alternatives, two favorites emerged: 1Password and Bitwarden. But do these do a better job at protecting sensitive data?API Security in Action — A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world. Inside, you’ll learn to construct secure and scalable REST APIs, deliver machine-to-machine interaction in a microservices architecture, and provide protection in resource-constrained IoT (Internet of Things) environments.Illuminated Security News — A low-volume newsletter covering application security, applied cryptography, and identity & access management (IAM) topics. Every newsletter covers one topic in depth with links to interesting articles and podcasts from the wider community.

    • 53 min
    Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!

    Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!

    Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.


    Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice.


    Links and papers discussed in the show:



    Three Lessons from Threema
    Special Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.
    Sponsored By:
    Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.Links:
    Three Lessons from Threema: Analysis of a Secure Messenger

    • 52 min
    Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!

    Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!

    Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.


    Links and papers discussed in the show:



    The supersingular isogeny path and endomorphism ring problems are equivalent
    Episode 5: Isogeny-based Cryptography for Dummies!


    Music composed by Toby Fox and performed by Sean Schafianski.
    Special Guest: Benjamin Wesolowski.
    Sponsored By:
    Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

    Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.Links:
    The supersingular isogeny path and endomorphism ring problems are equivalentEpisode 5: Isogeny-based Cryptography for Dummies!

    • 46 min
    Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!

    Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!

    A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.



    Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2


    Music composed by Toby Fox and performed by Sean Schafianski.
    Special Guests: Gaëtan Leurent and Håvard Raddum.
    Links:
    Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2

    • 42 min
    Episode 19: Cross-Protocol Attacks on TLS with ALPACA!

    Episode 19: Cross-Protocol Attacks on TLS with ALPACA!

    TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.


    ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.


    Links and papers discussed in the show:



    ALPACA Attack Website


    Music composed by Toby Fox and performed by Sean Schafianski.
    Special Guests: Marcus Brinkmann and Robert Merget.
    Sponsored By:
    Capsule Social: At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

    Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.Links:
    ALPACA Attack

    • 41 min

Customer Reviews

4.7 out of 5
12 Ratings

12 Ratings

Dmnius ,

Amazing material

The quality of the material and research make this podcast stand out on its own. The presentation and exploration of cryptographic topics is well crafted, and as a bonus the guests he finds to discuss topics related to cryptography and cryptanalysis add even more.
Thank you for making this, can’t wait for the next one, and I highly recommend it to anyone interested in security, cryptography, and privacy!

Top Podcasts In Science

Hidden Brain
Hidden Brain, Shankar Vedantam
Something You Should Know
Mike Carruthers | OmniCast Media | Cumulus Podcast Network
Radiolab
WNYC Studios
Ologies with Alie Ward
Alie Ward
Reinvent Yourself with Dr. Tara
Dr. Tara Swart Bieber
StarTalk Radio
Neil deGrasse Tyson

You Might Also Like