-
The Risks of Lattice KEMs in Post-Quantum Cryptography
Lattice KEMs (Key Encapsulation Mechanisms) have been gaining popularity in recent years as a potential solution for post-quantum cryptography. They are based on the…
-
NSA’s Influence on NIST’s Standardization of Elliptic Curve Cryptography
Yep, you heard it right. The National Security Agency (NSA) has been pulling some serious strings behind the scenes at the National Institute of…
-
NSA’s Dual EC Backdoor: A Technical Interlude
Today we’re going to talk about something that’s been causing quite a stir in the world of cryptography: NSA’s Dual EC backdoor. But before…
-
NSA’s Influence on Commercial Public Key Technologies
Now, before you start rolling your eyes or muttering under your breath, let me just say this: we all know that the NSA has…
-
NSA’s Dual EC Backdoor: A New Directions in Cryptographic Sabotage
Today we’re going to talk about something that’s been causing quite a stir in the world of cryptography: NSA’s Dual EC backdoor. To set…
-
The Flaws of DSA
You know, the one that makes your online banking transactions secure? Well, let me tell you something: it’s not as perfect as we thought.…
-
The Dangers of Weak Encryption
You know what I’m talking about those ***** little algorithms that promise security but deliver nothing more than a false sense of protection. Let…
-
The NSA’s Sabotage of DES
Yep, you heard me right. The very agency tasked with protecting our nation’s secrets decided to undermine one of the most widely used encryption…
-
NSA and Post-Quantum Cryptography: Announcing my second lawsuit against the U.S. government
In response to this threat, the National Institute of Standards and Technology (NIST) announced in 2015 that it would begin developing new standards for…