#cryptanalysis — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cryptanalysis, aggregated by home.social.
-
working on a codebook app (for creating simple codebooks and encoding / decoding messages with or without pre-modern encryption); a more ambitious codebook generator (up to 100,000-ish entries plus beaucoup homophones); and a codebook decryptor page that explains maybe a bit to much about how to attack code and code + encryption messages.
-
New Cryptanalysis of the Fiat-Shamir Protocol https://www.schneier.com/blog/archives/2025/09/new-cryptanalysis-of-the-fiat-shamir-protocol.html #academicpapers #Uncategorized #cryptanalysis #protocols #hashes
-
New Cryptanalysis of the Fiat-Shamir Protocol
A couple of months ago, a new paper demonstrated some new attacks against the Fiat-Shamir transformation. Quanta published a <a href="https://www.quantamagazine.org/computer-scientists-figure-o... https://www.schneier.com/blog/archives/2025/09/new-cryptanalysis-of-the-fiat-shamir-protocol.html
#academicpapers #Uncategorized #cryptanalysis #protocols #hashes
-
🤔 Ah yes, the riveting world of Sigint fiction, where #cryptanalysis is as thrilling as watching paint dry on a damp day in February. 🕵️♂️🎨 Clearly, only the John Buchan #Journal could make decrypting wartime #ciphers sound as exciting as reading your car's manual. 📚🚗
https://siginthistorian.blogspot.com/2025/02/sigint-in-fiction.html #SigintFiction #JohnBuchan #ThrillingReading #HackerNews #ngated -
CW: research review
N. Mouha and C. Celi, "A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm"¹
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been present since the final-round update of Keccak was submitted to the National Institute of Standards and Technology (NIST) SHA-3 hash function competition in January 2011, and is present in the eXtended Keccak Code Package (XKCP) of the Keccak team. It affects all software projects that have integrated this code, such as the scripting languages Python and PHP Hypertext Preprocessor (PHP). The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (without any restrictions on values to be XORed and even far beyond the location of the original buffer), thereby making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective. First, we provide Python and PHP scripts that cause segmentation faults when vulnerable versions of the interpreters are used. Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. The vulnerability applies to all hash value sizes, and all 64-bit Windows, Linux, and macOS operating systems, and may also impact cryptographic algorithms that require SHA-3 or its variants, such as the Edwards-curve Digital Signature Algorithm (EdDSA) when the Edwards448 curve is used. We introduce the Init-Update-Final Test (IUFT) to detect this vulnerability in implementations.
#ResearchPapers #IACR #Cryptanalysis #CVE202237454 #SHA3 #Keccak #HashFunction #Vulnerability
__
¹ https://eprint.iacr.org/2023/331 -