Two Particularly Rare Enigma Machines Made in France

Enigma cipher machines are rare collector items which are worth a small fortune. It is estimated that at least 50,000 Enigma machines have been manufactured during the WW2. Some Enigma machines are more exceptional than other, as there are much fewer of them left. When Polish code breakers went to France after Poland was overrun by …

Continue reading ‘Two Particularly Rare Enigma Machines Made in France’ »

Super Fast Elliptic Curve Cryptography

Microsoft have released a new free ECC library which is up to 5x faster than with the traditional elliptic curve P-256 (which was so far the most commonly used curve in practical applications) and a also up to 3x faster than a well-known alternative Curve25519.   Bitcoin elliptic curve belongs to the category “special therefore suspicious” and have been …

Continue reading ‘Super Fast Elliptic Curve Cryptography’ »

How Islamic State Terrorists Encrypt Their Messages

      According to BBC and many other sources, islamic state terrorists use a messaging app called Telegram to encrypt communications for groups of users. On the surface, Telegram developers seem to support high security standards: they have published the spec and API and funded in November 2014 a handsome 300,000 USD cash prize for cracking …

Continue reading ‘How Islamic State Terrorists Encrypt Their Messages’ »

Speed Matters

Some work done at UCL regarding bitcoin and speed: HOW to crack bitcoin passwords at a very high speed: brainflayer cracker where we read that: “The bulk of Brainflayer was written by Ryan Castellucci. Nicolas Courtois and Guangyan Song contributed the code in ec_pubkey_fast.c which more than doubles the speed of public key computations compared with …

Continue reading ‘Speed Matters’ »

NSA Plans To Retire Current Cryptography Standards

Breaking news: the cryptography that we all know and use, such AES-128, SHA-1 and SHA-256, RSA/DH, and the most commonly used elliptic curve P-256 (a.k.a. secp256r1) are NO LONGER wholeheartedly supported by the NSA. In fact most of these, if not all, are not quite recommended anymore. Until now and for the last 10+ years the NSA and the …

Continue reading ‘NSA Plans To Retire Current Cryptography Standards’ »

UCL Code Breaking Competition Winners Announced

On the V-Day and the 70th anniversary of defeating the Nazi Germany, we need to remember how much this victory was owed to code breakers at Bletchley Park and elsewhere. UCL code breaking competition On this day it is my pleasure to announce the winners of the 2015 UCL Code Breaking competition. The winners are: Joint …

Continue reading ‘UCL Code Breaking Competition Winners Announced’ »

Half of All Elliptic Curves Broken???

New paper in a series of how to solve Elliptic Curve Discrete Log Problem (ECDLP) in characteristic 2 with sub-exponential complexity. More results on this topic are expected. Remark: it seems to me that the main assumption about degree falls and solvability which is at the heart of this paper, is simply entirely wrong. Recent developments: …

Continue reading ‘Half of All Elliptic Curves Broken???’ »

TrueCrypt Security Audit Results

The final report can be found here. The report identifies 4 major vulnerabilities, 2 of them are judged of high severity and are as follows: The most commonly used windows versions of TrueCrypt were found to have a specific problem with calling the function CryptAcquireContext which is used in Truecrypt exclusively for the purpose of …

Continue reading ‘TrueCrypt Security Audit Results’ »

Large Scale Bitcoin Thefts Continue

Another theft in a series: nearly 2 millions of dollars are missing from the BTER exchange. A specific transaction created by the thief can be found here. The theft took place on 14 Feb 2015. [added later] Another theft of some 250,000 USD has occurred at another Chinese exchange on 27 Jan 2015. Here some Internet posts …

Continue reading ‘Large Scale Bitcoin Thefts Continue’ »

The Era of Irresponsibility Is Coming to An End?

A wind of change is blowing inside the bitcoin community. For many many years the dominant ideology in bitcoin community was that open source software such as bitcoin is “secure”, and that you need to trust the infinite wisdom of the crowd who will find all the bugs and fix them, the wisdom of the …

Continue reading ‘The Era of Irresponsibility Is Coming to An End?’ »