An Anomalous Differential Attack on a Block Cipher

In this attack a differential propagates with difficulty for some 20, 40 and up to 64 rounds. We can say that the propagation encounters some “friction”, because the non-linear functions do not always behave as the attacker would like them to behave. Everything looks normal and this is what happens for all block ciphers all …

Continue reading ‘An Anomalous Differential Attack on a Block Cipher’ »

Hacking a Linux PC at a Close Distance without Being Connected to a Network

The attack allows the attacker to execute arbitrary code on another PC running Linux. The exploit is possible due to an extremely serious vulnerability in Bluetooth stack inside Linux. The attacker literally can run an application of his choice on the other PC. The exploit was found by Andy Nguyen, a security researcher at Google. …

Continue reading ‘Hacking a Linux PC at a Close Distance without Being Connected to a Network’ »

China is Banning TCP/IP

Arguably an open free and neutral Internet network has never existed and it was all a cynical game of telcos, pretending to obey a bunch of public standards and apply international treaties, in order to expand their monopolistic empires abroad and steal business from other telcos. This world of deception, which also has enabled intelligence …

Continue reading ‘China is Banning TCP/IP’ »

30 Years Ago

Exactly 30 years ago, Stasi was dissolved. 13 January 1990. 91,000 full time employees and 189,000 unofficial collaborators and informants lost their jobs and privileges. The German government has done a lot to preserve anything which Stasi has ever done. Some links: At this moment in Brussels, inside the EU Parliament there is an exposition on this …

Continue reading ‘30 Years Ago’ »

A New Documentary about WW2 Cryptanalysis of Enigma

A new documentary tells the story of the discovery of one of the most important cryptography papers of all times. We are talking about an extensive technical report written in German language and entitled “Kurzgefasste Darstellung der Auflösungsmethoden”. For some 80 years it has remained classified, part of the so called Gustave Bertrand WW2 archives. It was …

Continue reading ‘A New Documentary about WW2 Cryptanalysis of Enigma’ »

A Linear Annihilator Property and Strong Biases with Original DES S-boxes

In 2004 I have published a paper [Crypto 2004, Santa Barbara] in which I explain the concept of the so called Bi-Linear attack on DES. The old attack was not extremely strong. It is possible to see that two conditions would be necessary for such an attack to somewhat work well in cryptanalysis of DES: There …

Continue reading ‘A Linear Annihilator Property and Strong Biases with Original DES S-boxes’ »