China is Banning TCP/IP

Arguably an open free and neutral Internet network has never existed and it was all a cynical game of telcos, pretending to obey a bunch of public standards and apply international treaties, in order to expand their monopolistic empires abroad and steal business from other telcos. This world of deception, which also has enabled intelligence …

Continue reading ‘China is Banning TCP/IP’ »

30 Years Ago

Exactly 30 years ago, Stasi was dissolved. 13 January 1990. 91,000 full time employees and 189,000 unofficial collaborators and informants lost their jobs and privileges. The German government has done a lot to preserve anything which Stasi has ever done. Some links: At this moment in Brussels, inside the EU Parliament there is an exposition on this …

Continue reading ‘30 Years Ago’ »

A New Documentary about WW2 Cryptanalysis of Enigma

A new documentary tells the story of the discovery of one of the most important cryptography papers of all times. We are talking about an extensive technical report written in German language and entitled “Kurzgefasste Darstellung der Auflösungsmethoden”. For some 80 years it has remained classified, part of the so called Gustave Bertrand WW2 archives. It was …

Continue reading ‘A New Documentary about WW2 Cryptanalysis of Enigma’ »

A Linear Annihilator Property and Strong Biases with Original DES S-boxes

In 2004 I have published a paper [Crypto 2004, Santa Barbara] in which I explain the concept of the so called Bi-Linear attack on DES. The old attack was not extremely strong. It is possible to see that two conditions would be necessary for such an attack to somewhat work well in cryptanalysis of DES: There …

Continue reading ‘A Linear Annihilator Property and Strong Biases with Original DES S-boxes’ »

A New Attack on Data Encryption Standard (DES)

There is abundant literature on the security of Data Encryption Standard (DES or 3DES). Today we have released a new way to attack this cipher, see Section 11 in here. Anyone who reads this paper should immediately see that the high confidence which have developed over decades in research community about our ability to design secure block …

Continue reading ‘A New Attack on Data Encryption Standard (DES)’ »

How to Backdoor a Block Cipher

I have written an elementary tutorial and a first proof of concept about how to backdoor a block cipher in a quite general setting. Potentially it applies to any block cipher. Success is not guaranteed though, see the paper. ADDED 2 JAN 2019: a new paper shows that invariants of higher degree are substantially more powerful. …

Continue reading ‘How to Backdoor a Block Cipher’ »

XYZ and Saving an Extremely Rare Enigma Machine

Public donations are sought by Pilsudski Institute in London. The most prominent host of the institute is an extremely rare WW2 Enigma machine. This machine was made in France during WW2 to assist Polish code breakers in their daily code-breaking tasks [done in close collaboration with Bletchley Park, UK]. Only two such machines exist, see here …

Continue reading ‘XYZ and Saving an Extremely Rare Enigma Machine’ »

UCL InfoSec Visit at Bletchley Park – Friday 29 Sept 2017

Our trip took place 29 Sept 2017.  Some 32 UCL students participated. Students have explored the past in order to find role models for the future.           Due to large numbers, we have split into two groups for a guided Bletchley Park tour, and also had assisted at two bombe demonstrations. …

Continue reading ‘UCL InfoSec Visit at Bletchley Park – Friday 29 Sept 2017’ »