You are here |
blog.hboeck.de | ||
| | | |
blog.cryptographyengineering.com
|
|
| | | | Believe it or not, there's a new attack on SSL. Yes, I know you're thunderstruck. Let's get a few things out of the way quickly. First, this is not another Heartbleed. It's bad, but it's not going to destroy the Internet. Also, it applies only to SSLv3, which is (in theory) an obsolete protocol that... | |
| | | |
blog.cryptographyengineering.com
|
|
| | | | Update: I've addeda link to a page at Royal Holloway describing the new attack. Listen, if you're using RC4 as your primary ciphersuite in SSL/TLS, now would be a great time to stop. Ok, thanks, are we all on the same page? No? I guess we need to talk about this a bit more. You... | |
| | | |
neilmadden.blog
|
|
| | | | Note: this post will probably only really make sense to cryptography geeks. In "When a KEM is notenough", I described how to construct multi-recipient (public key) authenticated encryption. A naïve approach to this is vulnerable to insider forgeries: any recipient can construct a new message (to the same recipients) that appears to come from the... | |
| | | |
jmanton.wordpress.com
|
|
| | The following hints atwhy the quintic equation cannot be solved using radicals. It follows the approach in the first part of Ian Stewart's book "Galois Theory". If time permits, a future post will summarise the approach in V. B. Alekseev's book "Abel's Theorem in Problems and Solutions". Another candidate is Klein's book "Lectures on the... |