Owl, a new augmented password-authenticated key exchange protocol
Light Blue Touchpaper » Cryptology
by Feng Hao
1M ago
In 2008, I wrote a blog to introduce J-PAKE, a password-authenticated key exchange (PAKE) protocol (joint work with Peter Ryan). The goal of that blog was to invite public scrutiny of J-PAKE. Sixteen years later, I am pleased to say that no attacks on J-PAKE have been found and that the protocol has been used in many real-world applications, e.g., Google Nest, ARM Mbed, Amazon Fire stick, Palemoon sync and Thread products.   J-PAKE is a balanced PAKE, meaning that both sides must hold the same secret for mutual authentication. In the example of the J-PAKE-based IoT commissioning proc ..read more
Visit website
Grasping at straw
Light Blue Touchpaper » Cryptology
by Ross Anderson
4M ago
Britain’s National Crime Agency has spent the last five years trying to undermine encryption, saying it might stop them arresting hundreds of men every month for downloading indecent images of children. Now they complain that most of the men they do prosecute escape jail. Eight in ten men convicted of image offences escaped an immediate prison sentence, and the NCA’s Director General Graeme Biggar describes this as “striking”. I agree, although the conclusions I draw are rather different. In Chatcontrol or Child Protection? I explained how the NCA and GCHQ divert police resources from tackling ..read more
Visit website
The Pre-play Attack in Real Life
Light Blue Touchpaper » Cryptology
by Ross Anderson
11M ago
Recently I was contacted by a Falklands veteran who was a victim of what appears to have been a classic pre-play attack; his story is told here. Almost ten years ago, after we wrote a paper on the pre-play attack, we were contacted by a Scottish sailor who’d bought a drink in a bar in Las Ramblas in Barcelona for €33, and found the following morning that he’d been charged €33,000 instead. The bar had submitted ten transactions an hour apart for €3,300 each, and when we got the transaction logs it turned out that these transactions had been submitted through three different banks. What’s more ..read more
Visit website
Interop: One Protocol to Rule Them All?
Light Blue Touchpaper » Cryptology
by Ross Anderson
1y ago
Everyone’s worried that the UK Online Safety Bill and the EU Child Sex Abuse Regulation will put an end to end-to-end encryption. But might a law already passed by the EU have the same effect? The Digital Markets Act ruled that users on different platforms should be able to exchange messages with each other. This opens up a real Pandora’s box. How will the networks manage keys, authenticate users, and moderate content? How much metadata will have to be shared, and how? In our latest paper, One Protocol to Rule Them All? On Securing Interoperable Messaging, we explore the security tensions, the ..read more
Visit website
Three Paper Thursday: Vēnī, Vīdī, Vote-y – Election Security
Light Blue Touchpaper » Cryptology
by Nicholas Boucher
3y ago
With the recent quadrennial instantiation of the US presidential election, discussions of election security have predictably resurged across much of the world. Indeed, news cycles in the US, UK, and EU abound with talking points surrounding the security of elections. In light of this context, we will use this week’s Three Paper Thursday to shed light on the technical challenges, solutions, and opportunities in designing secure election systems. This post will focus on the technical security of election systems. That said, the topic of voter manipulation techniques such as disinformation campai ..read more
Visit website

Follow Light Blue Touchpaper » Cryptology on FeedSpot

Continue with Google
Continue with Apple
OR