Post-Quantum RSA

A very detailed study showing that RSA can be re-engineered in order to remain practical, yet it will no longer be broken by a quantum computer. The essence of the proposal is a multiple-prime RSA with great many 4096-bit primes and with 1 Terabyte public key. A significant potential weakness [for which however there is no …

Continue reading ‘Post-Quantum RSA’ »

Silvio Micali – A Genius Which Will Stay in the Bottle

Silvio Micali, one of the most brilliant computer scientists on this planet has just re-invented democracy or blockchains or finance or law order and public authority and few other things, with his ALGORAND system. And some other brilliant crypto innovators are also doing the same thing: see DFINITY. Possibly this is what we really want, a …

Continue reading ‘Silvio Micali – A Genius Which Will Stay in the Bottle’ »

Interesting Parts in CIA Leaks

Schneier wrote: 8,761 classified CIA documents […] 2012-2016 […]it sounds like this cache of documents wasn’t taken from the CIA and given to WikiLeaks for publication, but has been passed around the community for a while — and incidentally some part of the cache was passed to WikiLeaks. […]  extraordinary collection […] several hundred million lines …

Continue reading ‘Interesting Parts in CIA Leaks’ »

Is PGP Bankrupt?

In the last few years, we have seen an increased awareness that PGP/GPG is a dinosaur of 1990s crypto, and it does not satisfy the need of modern users for secure communication. PGP model has many perverse effects: like creating a single point of failure where all sensitive communications are compromised with cracking one single …

Continue reading ‘Is PGP Bankrupt?’ »

Blockchain Privacy – Part 2: Stealth Addresses

Privacy In Part 1 we covered why privacy is essential for widespread cryptocurrency adoption, and concluded that neither Bitcoin nor Ethereum, or even ZCash is suitable for the task we’re wanting to solve: anonymity with efficiency. (Also the bonus property of needing no trusted setup)! COOL THING 1: STEALTH ADDRESSES The benefits of using stealth …

Continue reading ‘Blockchain Privacy – Part 2: Stealth Addresses’ »

D-Day For Z.Cash

Today the first ever truly anonymous crypto currency ZEC went live. The full P2P client can be downloaded from here [Linux only for now]. The total number of ZEC coins will be only 21 million, like in bitcoin. Zerocash also reproduces few other unreasonable properties known from bitcoin: bizarre monetary policy with inelastic monetary supply and block halving every …

Continue reading ‘D-Day For Z.Cash’ »

Controversy Around Profitability of AltCoin Investment

There is a considerable controversy around whether investing in a balanced basket of cryptocoins is a good idea. Two serious sources show that this sort of investment enjoys steady growth without a lot of downturns, cf. DLT10 Index and a recent detailed study which concentrates on a shorter period with excellent returns since Jan 2016 (cf. also …

Continue reading ‘Controversy Around Profitability of AltCoin Investment’ »

How Many 1024-bit Primes Have Backdoors?

So how did the NSA backdoored the Internet or did they??? New ground-breaking paper shows that DSA and DH mod P keys with 1024 bits are vulnerable to practical backdoors which can be exploited to break our secure communications. Few highlights: For such trapdoored primes the DL problem can be solved in 2 months by an academic cluster. The …

Continue reading ‘How Many 1024-bit Primes Have Backdoors?’ »

UCL InfoSec Visit at Bletchley Park – 2 Oct 2016

    Home Work After a bombe demonstration by a WW2 veteran Ruth Bourne and BP bombe experts, students have been asked to further study at home how Enigma was broken, see our hand-out. More details can be found in our teaching materials “Enigma and Block Ciphers – 100 years of cryptanalysis with non-commutative combinations …

Continue reading ‘UCL InfoSec Visit at Bletchley Park – 2 Oct 2016’ »