The history of this blog might very well be a cautionary tail (sic) about scope creep. AJ The Original Vision For Dhole Moments Originally, I just wanted a place to write about things too long for …| Dhole Moments
There seems to be a lot of interest among software developers in the various cryptographic building blocks (block ciphers, hash functions, etc.), and more specifically how they stack up against eac…| Dhole Moments
When it comes to AES-GCM, I am not a fan. Most of my gripes fall into one of two categories: Gripes with AES itself Gripes with AES-GCM as a construction However, one of my gripes technically belon…| Dhole Moments
How and why XSalsa20/XChaCha were designed, and why they’re secure.| Dhole Moments
As we look upon the sunset of a remarkably tiresome year, I thought it would be appropriate to talk about cryptographic wear-out. What is cryptographic wear-out? It’s the threshold when you&#…| Dhole Moments
Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance within my friends and colleagues in applied cryptography for studying systems that use Authenticated Enc…| Dhole Moments
I don’t consider myself exceptional in any regard, but I stumbled upon a few cryptography vulnerabilities in Matrix’s Olm library with so little effort that it was nearly accidental. It…| Dhole Moments
Threema boldly claims to be more secure than Signal. Does this hold up to scrutiny?| Dhole Moments
Canonicalization Attacks occur when a protocol that feeds data into a hash function used in a Message Authentication Code (MAC) or Digital Signature calculation fails to ensure some property that&#…| Dhole Moments