Cryptographic design review of Ockam
Trail of Bits Blog » Cryptography
by Trail of Bits
1M ago
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de Pol In October 2023, Ockam hired Trail of Bits to review the design of its product, a set of protocols that aims to enable secure communication (i.e., end-to-end encrypted and mutually authenticated channels) across various heterogeneous networks. A secure system starts at the design phase, which lays the foundation for secure implementation and deployment, particularly in cryptography, where a secure design can prevent entire vulnerabilities. In this blog post, we give some insight into our cryptographic design review of Ockam’s pr ..read more
Visit website
Circomspect has been integrated into the Sindri CLI
Trail of Bits Blog » Cryptography
by Trail of Bits
2M ago
By Jim Miller Our tool Circomspect is now integrated into the Sindri command-line interface (CLI)! We designed Circomspect to help developers build Circom circuits more securely, particularly given the limited tooling support available for this novel programming framework. Integrating this tool into a development environment like that provided by Sindri is a significant step toward more widespread use of Circomspect and thus better support for developers writing Circom circuits. Developing zero-knowledge proof circuits is a difficult task. Even putting aside technical complexities, running non ..read more
Visit website
Breaking the shared key in threshold signature schemes
Trail of Bits Blog » Cryptography
by Lauren Miorcec
2M ago
By Fredrik Dahlgren Today we are disclosing a denial-of-service vulnerability that affects the Pedersen distributed key generation (DKG) phase of a number of threshold signature scheme implementations based on the Frost, DMZ21, GG20, and GG18 protocols. The vulnerability allows a single malicious participant to surreptitiously raise the threshold required to reconstruct the shared key, which could cause signatures generated using the shared key to be invalid. We first became aware of this vulnerability on a client engagement with Chainflip last year. When we reviewed Chainflip’s implementation ..read more
Visit website
Cloud cryptography demystified: Amazon Web Services
Trail of Bits Blog » Cryptography
by Trail of Bits
2M ago
By Scott Arciszewski This post, part of a series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Amazon Web Services (AWS): when to use them, when not to use them, and important usage considerations. Stay tuned for future posts covering other cloud services. At Trail of Bits, we frequently encounter products and services that make use of cloud providers’ cryptography offerings to satisfy their security goals. However, some cloud providers’ cryptography tools and services have opaque names or non-obvious use cases. This is particularly true f ..read more
Visit website
Chaos Communication Congress (37C3) recap
Trail of Bits Blog » Cryptography
by Trail of Bits
2M ago
Last month, two of our engineers attended the 37th Chaos Communication Congress (37C3) in Hamburg, joining thousands of hackers who gather each year to exchange the latest research and achievements in technology and security. Unlike other tech conferences, this annual gathering focuses on the interaction of technology and society, covering such topics as politics, entertainment, art, sustainability—and, most importantly, security. At the first Congress in the 80s, hackers showcased weaknesses in banking applications over the German BTX system; this year’s theme, “Unlocked,” highlighted breakin ..read more
Visit website
Tag, you’re it: Signal tagging in Circom
Trail of Bits Blog » Cryptography
by Trail of Bits
3M ago
By Tjaden Hess We at Trail of Bits perform security reviews for a seemingly endless stream of applications that use zero-knowledge (ZK) proofs. While fast new arithmetization and folding libraries like Halo2, Plonky2, and Boojum are rapidly gaining adoption, Circom remains a mainstay of ZK circuit design. We’ve written about Circom safety before in the context of Circomspect, our linter and static analyzer; in this post, we will look at another way to guard against bugs in your Circom circuits using a lesser-known language feature called signal tags. We present four simple rules for incorporat ..read more
Visit website
We build X.509 chains so you don’t have to
Trail of Bits Blog » Cryptography
by Trail of Bits
3M ago
By William Woodruff For the past eight months, Trail of Bits has worked with the Python Cryptographic Authority to build cryptography-x509-verification, a brand-new, pure-Rust implementation of the X.509 path validation algorithm that TLS and other encryption and authentication protocols are built on. Our implementation is fast, standards-conforming, and memory-safe, giving the Python ecosystem a modern alternative to OpenSSL’s misuse- and vulnerability-prone X.509 APIs for HTTPS certificate verification, among other protocols. This is a foundational security improvement that will benefit ever ..read more
Visit website
Celebrating our 2023 open-source contributions
Trail of Bits Blog » Cryptography
by Trail of Bits
3M ago
At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about our tools… In 2023, our employees submitted over 450 pull requests (PRs) that were merged into non-Trail of Bits repositories. This demonstrates our commitment to securing the software ecosystem as a whole and to improving software quality for everyone. A representative list of contributions appears at the end of this post, but here are some highlights: Sigstore-conformance, a vital component of our Sigstore ini ..read more
Visit website
A trail of flipping bits
Trail of Bits Blog » Cryptography
by Trail of Bits
4M ago
By Joop van de Pol Trusted execution environments (TEE) such as secure enclaves are becoming more popular to secure assets in the cloud. Their promise is enticing because when enclaves are properly used, even the operator of the enclave or the cloud service should not be able to access those assets. However, this leads to a strong attacker model, where the entity interacting with the enclave can be the attacker. In this blog post, we will examine one way that cryptography involving AES-GCM, ECDSA, and Shamir’s secret sharing algorithm can fail in this setting—specifically, by using the Forbid ..read more
Visit website
Publishing Trail of Bits’ CodeQL queries
Trail of Bits Blog » Cryptography
by Trail of Bits
5M ago
By Paweł Płatek We are publishing a set of custom CodeQL queries for Go and C. We have used them to find critical issues that the standard CodeQL queries would have missed. This new release of a continuously updated repository of CodeQL queries joins our public Semgrep rules and Automated Testing Handbook in an effort to share our technical expertise with the community. For the initial release of our internal CodeQL queries, we focused on issues like misused cryptography, insecure file permissions, and bugs in string methods: Language Query name Vulnerability description Go Message not ha ..read more
Visit website

Follow Trail of Bits Blog » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR