Publications about cryptography

From JonDonym Wiki
(Difference between revisions)
Jump to: navigation, search
(sa + brackets (){})
Line 1: Line 1:
 
<iimg>[[Publications about cryptography]]![[Image:en2.png]]</iimg><iimg>[[Veröffentlichungen zu Kryptografie]]![[Image:de2.png]]</iimg>&nbsp;[[Main_Page|Main Page (en)]]
 
<iimg>[[Publications about cryptography]]![[Image:en2.png]]</iimg><iimg>[[Veröffentlichungen zu Kryptografie]]![[Image:de2.png]]</iimg>&nbsp;[[Main_Page|Main Page (en)]]
 +
 
== Publications about cryptography and cryptoanalysis ==
 
== Publications about cryptography and cryptoanalysis ==
  
 
=== Ron was wrong, Whit is right ===
 
=== Ron was wrong, Whit is right ===
 +
 
''Abstract:'' Cryptographic experts have analysed more than 10 million public keys (X509 certificates and OpenPGP keys) and discovered serious problems in some of the X509 certificates it collected. The poor quality certificates are probably being generated by routers, VPN gateways and other embedded devices which use OpenSSL without having an adequate source of random numbers for key generation.
 
''Abstract:'' Cryptographic experts have analysed more than 10 million public keys (X509 certificates and OpenPGP keys) and discovered serious problems in some of the X509 certificates it collected. The poor quality certificates are probably being generated by routers, VPN gateways and other embedded devices which use OpenSSL without having an adequate source of random numbers for key generation.
  
Download: [http://eprint.iacr.org/2012/064.pdf PDF] [https://anonymous-proxy-servers.net/paper/064.pdf lokale Kopie]), 460 kB, 17 pages, English, released Feb. 2012
+
Download: [http://eprint.iacr.org/2012/064.pdf PDF] ([https://anonymous-proxy-servers.net/paper/064.pdf local cache]), 460 kB, 17 pages, English, released 2012-February
  
 
=== AES crypto broken by 'groundbreaking' attack ===
 
=== AES crypto broken by 'groundbreaking' attack ===
 +
 
''Abstract:'' The technique, which was published in the paper allows attackers to recover AES secret keys up to five times faster than using a brute force attack. This research is groundbreaking because it is the first method of breaking single-key AES that is (slightly) faster than brute force. But it doesn't compromise AES in any practical way.
 
''Abstract:'' The technique, which was published in the paper allows attackers to recover AES secret keys up to five times faster than using a brute force attack. This research is groundbreaking because it is the first method of breaking single-key AES that is (slightly) faster than brute force. But it doesn't compromise AES in any practical way.
  
 
Download: [http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf PDF] ([https://anonymous-proxy-servers.net/paper/aesbc.pdf local cache]), 440kB, 33 pages, English, released 2011-August
 
Download: [http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf PDF] ([https://anonymous-proxy-servers.net/paper/aesbc.pdf local cache]), 440kB, 33 pages, English, released 2011-August
 +
 +
== See also ==
 +
 +
* [[Publications_about_JonDonym]]
 +
* [[Publications_about_tracking_and_spying_technologies]]

Revision as of 08:36, 31 March 2012

En2.png De2.png  Main Page (en)

Contents

Publications about cryptography and cryptoanalysis

Ron was wrong, Whit is right

Abstract: Cryptographic experts have analysed more than 10 million public keys (X509 certificates and OpenPGP keys) and discovered serious problems in some of the X509 certificates it collected. The poor quality certificates are probably being generated by routers, VPN gateways and other embedded devices which use OpenSSL without having an adequate source of random numbers for key generation.

Download: PDF (local cache), 460 kB, 17 pages, English, released 2012-February

AES crypto broken by 'groundbreaking' attack

Abstract: The technique, which was published in the paper allows attackers to recover AES secret keys up to five times faster than using a brute force attack. This research is groundbreaking because it is the first method of breaking single-key AES that is (slightly) faster than brute force. But it doesn't compromise AES in any practical way.

Download: PDF (local cache), 440kB, 33 pages, English, released 2011-August

See also

Personal tools