Two Particularly Rare Enigma Machines Made in France

Enigma cipher machines are rare collector items which are worth a small fortune. It is estimated that at least 50,000 Enigma machines have been manufactured during the WW2. Some Enigma machines are more exceptional than other, as there are much fewer of them left. When Polish code breakers went to France after Poland was overrun by …

Continue reading ‘Two Particularly Rare Enigma Machines Made in France’ »

How Islamic State Terrorists Encrypt Their Messages

      According to BBC and many other sources, islamic state terrorists use a messaging app called Telegram to encrypt communications for groups of users. On the surface, Telegram developers seem to support high security standards: they have published the spec and API and funded in November 2014 a handsome 300,000 USD cash prize for cracking …

Continue reading ‘How Islamic State Terrorists Encrypt Their Messages’ »

Speed Matters

Some work done at UCL regarding bitcoin and speed: HOW to crack bitcoin passwords at a very high speed: brainflayer cracker where we read that: “The bulk of Brainflayer was written by Ryan Castellucci. Nicolas Courtois and Guangyan Song contributed the code in ec_pubkey_fast.c which more than doubles the speed of public key computations compared with …

Continue reading ‘Speed Matters’ »

Criminals Exploit Lack Of Knowledge of How Bitcoin Works

A so called Bitcoin Generator Tool v.2.9 have been released today (Sat 3 Oct 2015) and already 260 downloads within a few hours! It is a ZIP file which claims that it performs full access on the Bitcoin central SQL database and allows one to add bitcoins to his account. Needless to say there is no such …

Continue reading ‘Criminals Exploit Lack Of Knowledge of How Bitcoin Works’ »

NSA Plans To Retire Current Cryptography Standards

Breaking news: the cryptography that we all know and use, such AES-128, SHA-1 and SHA-256, RSA/DH, and the most commonly used elliptic curve P-256 (a.k.a. secp256r1) are NO LONGER wholeheartedly supported by the NSA. In fact most of these, if not all, are not quite recommended anymore. Until now and for the last 10+ years the NSA and the …

Continue reading ‘NSA Plans To Retire Current Cryptography Standards’ »

Trojanized TrueCrypt Software

Open source security software also helps criminals. For example TrueCrypt being free and easy to modify has lowered entry barriers for establishing criminal and cyber-espionnage operations (the same applies, well to Bitcoin software!). Example: Operation Potato Express. A fully functional clone of TrueCrypt was since at least 2011 distributed from Russian web sites such as …

Continue reading ‘Trojanized TrueCrypt Software’ »

Bitcoin Enters White House

The White House has appointed a well known crypto currency expert Ed Felten from Princeton University Computer Science department. This is a good sign, this means that an informed scientific debate, intellectual honesty and common sense have a chance to survive in the crypto currency world. I have started to doubt about it. Felten has many …

Continue reading ‘Bitcoin Enters White House’ »

Half of All Elliptic Curves Broken???

New paper in a series of how to solve Elliptic Curve Discrete Log Problem (ECDLP) in characteristic 2 with sub-exponential complexity. More results on this topic are expected. Remark: it seems to me that the main assumption about degree falls and solvability which is at the heart of this paper, is simply entirely wrong. Recent developments: …

Continue reading ‘Half of All Elliptic Curves Broken???’ »

Large Scale Bitcoin Thefts Continue

Another theft in a series: nearly 2 millions of dollars are missing from the BTER exchange. A specific transaction created by the thief can be found here. The theft took place on 14 Feb 2015. [added later] Another theft of some 250,000 USD has occurred at another Chinese exchange on 27 Jan 2015. Here some Internet posts …

Continue reading ‘Large Scale Bitcoin Thefts Continue’ »