Episode 24: CryptoHack's Collection of Cryptic Conundrums!

Episode 24: CryptoHack's Collection of Crypti...

Up next

Episode 23: Psychic Signatures in Java!

On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatu ...  Show more

Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!

Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been w ...  Show more

Recommended Episodes

S15:E6 - What is cryptography and how to get into it (Marcus Carey)
CodeNewbie

In this episode, we talk about cryptography with Marcus Carey, enterprise architect at ReliaQuest. Marcus talks about going to the military and learning cryptography, what cryptography is, and the foundational things you need to know in order to make sure the apps you’re building ...  Show more

How Does Historical Cryptology Work?
BrainStuff

To crack ciphers written centuries ago, historical cryptologists have to be half artist, half accountant, and use some of the most powerful computing tools known today. Learn how a team cracked Mary, Queen of Scots's code in this episode of BrainStuff, based on this article: http ...  Show more

How to Protect your Data in the Quantum Era ?
Machine Learning

Podcast with Gautam Siwach and Jin Vanstee ! Speaker - Thomas Harrer , Thomas is an IBM distinguished engineer and CTO for server storage in Europe, Middle East and Africa. His experience is around Hybrid Cloud & AI Platform, Infrastructure for mission critical systems, Cyber Res ...  Show more

Using bidirectionality override characters to obscure code. [Research Saturday]
CyberWire Daily

Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ...  Show more