“Draw the outputs of a key encapsulation mechanism, bound together, being checked by a computer, pixel art” by DALL-E 3. Libraries Binding Hierarchy Fujisaki-Okamoto Transform ML-KEM Next Steps To enable secure and efficient communication with nearly anyone at any time, the cryptography running on our devices makes heavy use of the ability to establish short shared secrets over insecure channels and networks. For a while now, such secret establishment has, among others, been achieved by m...| The Cryptography Caffè ☕
Here is the story of how we traced a cryptographic vulnerability through a major software supply-chain to uncover a flaw in its identity verification process.| The Cryptography Caffè ☕
In this blog post, we describe how we at SandboxAQ, together with Cryspen, formally verified key components of Sandwich—an open-source, unified API that simplifies the use of cryptographic libraries for developers, enabling crypto-agility.| cryptographycaffe.sandboxaq.com
This post describes a survey of 20 million public keys from diverse sources on the Internet and cryptographic weaknesses found.| cryptographycaffe.sandboxaq.com
This blogpost describes our investigation and proof of concept to enhance the security of Signal Messenger key management on desktop.| cryptographycaffe.sandboxaq.com
This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".| cryptographycaffe.sandboxaq.com
This blog post gives an overview of the area of formally verified cryptography and SandboxAQ's activities in this area.| cryptographycaffe.sandboxaq.com
This blog post describes the main idea of each of our three papers that have been accepted at CRYPTO 2024.| cryptographycaffe.sandboxaq.com
This blogpost discusses the Real World PQC workshop we hosted in March 2024 in Toronto, followed by our teams attendance and participation at RSA in May.| cryptographycaffe.sandboxaq.com
This blogpost describes the papers, presentations, and attendees from the SandboxAQ cybersecurity group at the IACR flagship conference Eurocrypt 2024.| cryptographycaffe.sandboxaq.com
A blog post from our attendence and participation at the 5th NIST PQC Standardization conference which took place on April 10-12 2024 in Maryland, USA| cryptographycaffe.sandboxaq.com
This post explains the concept of federated learning in cross-silo settings and its potential use-cases for network security applications.| cryptographycaffe.sandboxaq.com
This post gives a brief explanation of our research paper about attestation in FIDO2.| cryptographycaffe.sandboxaq.com
“An image for a blog post named “TurboTLS implementation in Sandwich”.” by Dall-E2 Welcome back to Cryptography Caffe! In this blog post, I’ll be talking about how Thomas Bailleux and I did some transport fancy protocol manipulation using Sandwich’s (github) tunnel abstraction to reduce TLS handshake latency. You perhaps have read about TurboTLS on our blog before. In this post, I’ll walk you through some new Sandwich IO objects for the experimental protocol TurboTLS that are av...| The Cryptography Caffè ☕
This blogpost describes work that encoded a hard lattice problem, $K$-DSP, into a quantum Hamiltonian, with implications for lattice cryptography.| cryptographycaffe.sandboxaq.com
In this post, we will take a deep dive into the three ingredients that make up a perfect Sandwich: context-time configuration, tunnel-time configuration, and an I/O interface. We'll take a look at how each ingredient adds its unique flavor to the mix, and how they all come together to create a secure and efficient tunnel.| cryptographycaffe.sandboxaq.com
This blog is an introduction to FHE. Rather than diving into mathematical details, we aim to provide to the reader a higher level overview of what FHE can be used for, and the different scenarios or setups that leverage FHE.| cryptographycaffe.sandboxaq.com
This article provides an overview the intersection of artificial intelligence and cybersecurity, which has led to a new era of both promise and peril.| cryptographycaffe.sandboxaq.com
We sketch the main ideas behind the ALTEQ post-quantum signature scheme in this blogpost, assuming not much more from the reader than knowledge of elementary linear algebra.| cryptographycaffe.sandboxaq.com
This blogpost announces and describes the first release of Sandwich, our open-source cryptography library aimed to bring modern cryptography and enable crypto-agility to the open-source community.| cryptographycaffe.sandboxaq.com
Expand to watch the recording of the workshop.| cryptographycaffe.sandboxaq.com
In this blog post, we will take a deep dive into the construction of NTT, and how it speeds up polynomial multiplication.| cryptographycaffe.sandboxaq.com
This blogpost describes the idea for batch signing, an idea started in 2019 at the IETF, which we revisit for use with post-quantum signature schemes.| cryptographycaffe.sandboxaq.com
This blogpost describes Hypercube-SDitH (Syndrome Decoding in the Head), a new code-based signature that significantly improves upon previously known works.| cryptographycaffe.sandboxaq.com
In a recent paper we proposed TurboTLS, a simple modification of the TLS protocol, using client-based UDP fragmentation to exchange the Client Hello and Server Hello messages of a TLS connection.| cryptographycaffe.sandboxaq.com
This article provides an overview of the current state of large multimodal language models and their safety and privacy concerns.| cryptographycaffe.sandboxaq.com
In this blog post, we will take a look at polynomial multiplication and view it from the perspective of convolutions. This sets the stage for why we need NTT.| cryptographycaffe.sandboxaq.com
This post covers recent research results on side-channel attacks on Kyber, a post-quantum cryptography cryptosystem.| cryptographycaffe.sandboxaq.com
In this post, we delve a bit more into the relationship between crypto-agility and cybersecurity.| cryptographycaffe.sandboxaq.com
In this blog post, we are going to go through some of the fundamentals of Module LWE, and build up KYBER from scratch step-by-step.| cryptographycaffe.sandboxaq.com
This post will explain recent research results about whether the de facto standard for passwordless authentication, called the FIDO2 protocol, is 'quantum-ready'.| cryptographycaffe.sandboxaq.com
In this post we will explain the core idea behind a recently published attack against one kind of key exchange protocol. Specifically, we will discuss "signal leakage attacks" against key exchange protocols, which are based on the Learning with Errors (LWE) problem under "key re-use".| cryptographycaffe.sandboxaq.com
This year, some of the most notable and groundbreaking cryptanalysis attacks were made public. In this post we delve a bit more into the main takeaways of these cryptanalysis results.| cryptographycaffe.sandboxaq.com
This post introduces the first end-to-end post-quantum secure implementation of the FIDO2 protocol, which we have recently open-sourced.| cryptographycaffe.sandboxaq.com