Crypt Pulse
Leadership in Cryptogrpahy Research Communities
2024-05-11| This topic is highly relevant for anyone involved in “academic research”. The authors investigate the role of leadership as a mean for simulating more effective research in emerging communities in computer science (CS). Far most perceived criteria for being successful is the number of publications and citations. This, however, may promote quantity over quality and sometimes lead to closed cycles of research, which certainly does not serve any good for real scientific progress. Indeed some scientific communities make more relative progress than others, even under similar conditions. We argue that leadership plays an important role for guiding any community to the right direction: Full PDF
Crypto Fix Needed: Glitch Found in Popular Security Algorithms
2023-12-03 This research highlights the importance of constantly reviewing and improving these algorithms to ensure their robustness against potential attacks. The vulnerability identified by Nicky Mouha doesn’t break the underlying algorithms, but rather exploits weaknesses in specific implementations. Think of it like finding a loose brick in a castle wall: it doesn’t mean the entire castle is compromised, but it’s definitely a security risk that needs to be addressed. Developers of software and services utilizing these algorithms are now working on implementing fixes to address the vulnerability. Users should make sure to keep their software up to date to benefit from these fixes.
The Discovery of Magnetic Backdoors
2023-12-03 A very interesting study shows that voice-enabled devices, which are increasingly common in homes and workplaces, can be manipulated using magnetic fields. This could lead to unauthorized access or control of these devices. MagBackdoor reveals a novel magnetic field attack that uses a loudspeaker to inject malicious commands into voice-enabled devices. By focusing on the magnetic threat to loudspeakers, it stealthily manipulates sound production. The closely packed internal audio systems inevitably pick up this malicious sound.
Widely Spread Spread New Flaws of Wi-Fi Encryption
2023-12-02 Security researchers Schepers, Domien, Ranganathan, and Vanhoef exploited power-save features to trick access points into leaking frames in plaintext, or encrypted using the group or an all-zero key. In detailed report, they demonstrates how an attacker can override and control the security context of frames that are yet to be queued. This exploits a design flaw in hotspot-like networks and allows the attacker to force an access point to encrypt yet-to-be-queued frames using an adversary-chosen key, thereby bypassing Wi-Fi encryption entirely. The attacks have a widespread impact as they affect various devices and operating systems (Linux, FreeBSD, iOS, and Android) and can be used to hijack TCP connections or intercept client and web traffic.
Timekeepers of the Future need Change
2023-12-01 In a world where technology is advancing at an unprecedented pace, security remains a paramount concern. A recent study titled Time for Change presented at USENIX 2023, sheds light on this critical issue. The research, conducted by Claudio Anliker, Giovanni Camurati, and Srdjan Capkun from ETH Zurich, unveils two novel attacks against UWB, which offers precise localization, making it a key player in secure ranging applications such as keyless car entry systems and contact tracing apps. The researchers discovered that the very element that keeps us in sync the clock could be the Achilles heel of UWB secure ranging. By manipulating the clock, attackers could trick the system, leading to severe security breaches.
The Silent Threat in SSH Key Security
2023-11-05 A groundbreaking discovery has been made. Researchers have unveiled a silent threat lurking in the shadows of Secure Shell (SSH) key security. A paper published in CCS23, titled Passive SSH Key Compromise via Lattices, reveals that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature computation. The paper shows that for the signature parameters commonly in use for SSH, there is an efficient lattice attack to recover the private key in case of a signature fault. The paper provides a security analysis of the SSH, IKEv1, and IKEv2 protocols in this scenario, and uses the attack to discover hundreds of compromised keys in the wild from several independently vulnerable implementations.
Decoding Starlink: Can SpaceX’s satellites power a new GPS?
2022-10-21 A team of researchers has cracked the code of SpaceX’s Starlink satellites, potentially paving the way for a new, independent navigation system. But is it too good to be true? GPS has become our go-to for everything from finding our way home to tracking our workouts. But what if there was another option, one that wasn’t controlled by a single country? That’s the dream of a team of researchers who have managed to reverse-engineer the signals from SpaceX’s Starlink constellation, turning them into a makeshift navigation system, as MIT Tech review rightly highlighted it.
How a Weekend Laptop Session Broke the Rainbow
2022-06-21 In the world of cryptography, there’s a complex signature scheme known as Rainbow. It’s been a finalist in the NIST Post-Quantum Cryptography standardization project, which is a big deal in the cryptography community. The Rainbow signature scheme has been around since 2005 and is based on the Oil and Vinegar signature scheme, which has withstood all cryptanalysis since 1999.
However, a recent study has found a vulnerability in the Rainbow algorithm that allows it to be broken in just 53 hours, or roughly a weekend, on a standard laptop. This is a significant finding because it means that the security provided by the Rainbow signature scheme might not be as robust as previously thought.
The Impact of zxcvbn on Password Security
2020-04-25 The research, conducted by Daniel Lowe Wheeler from Dropbox Inc., introduces zxcvbn, a compact, swift tool designed to estimate password strength. This tool stands out for its ability to provide accurate and conservative estimates at low magnitudes, making it particularly effective in mitigating online attacks. The introduction of ‘zxcvbn’ has had a profound impact on the industry. By providing users with real-time feedback on password strength, ‘zxcvbn’ empowers users to make informed decisions, thereby bolstering their defense against potential cyber threats.
Deep Learning is the New Frontier in Cracking Crypto
2016-09-24 A new player has entered the arena: deep learning. A recent study has shown that deep learning techniques can be used to break cryptographic implementations.
The researchers behind this study have proposed a novel approach to breaking cryptographic implementations using deep learning techniques. They used a large-scale dataset of cryptographic primitives and their implementations to train a neural network. This neural network can predict whether an implementation is vulnerable to certain attacks or not.
In simple terms, the researchers trained a computer program to recognize patterns in the way cryptographic algorithms are implemented. These patterns can reveal vulnerabilities that could be exploited by attackers.