cryptography
/cryptography1431
A place to discuss the math that secures the world. Message for an invite.
Amazing write up on how zk snarks are derived. The math is weirdly both complex but also simple at the same time
https://ebuchman.github.io/pdf/snarks.pdf
https://ebuchman.github.io/pdf/snarks.pdf
“Dance like no one’s watching. Encrypt like everyone is.”
read in someone’s bio, hadn’t heard this before, cute
read in someone’s bio, hadn’t heard this before, cute
Quantum computer can’t break your seed phrase
@ncitron.eth taking a break from pumping out Helios PRs
I guess we might not be totally screwed if NP isn't hard
https://www.quantamagazine.org/cryptographers-discover-a-new-foundation-for-quantum-secrecy-20240603/
https://www.quantamagazine.org/cryptographers-discover-a-new-foundation-for-quantum-secrecy-20240603/
So hard the birthday problem ain’t helpin
Very cool! One question that comes to me is: given that only the decryption authority can decrypt the amounts, can the recipient know what they received? Can users query their balance? Do they need to request threshold re-encryption to do so?
New draft cryptography guidance from the NIST. Lots of deprecations that won’t surprise. https://csrc.nist.gov/pubs/sp/800/131/a/r3/ipd
The advice on signatures is interesting: if you have 112 bits of security then you should be safe for a while, and instead of merely transitioning to 128 you should jump to post-quantum as soon as that’s feasible.
The advice on signatures is interesting: if you have 112 bits of security then you should be safe for a while, and instead of merely transitioning to 128 you should jump to post-quantum as soon as that’s feasible.
I noticed while checking out GIMPS’s announcement of a probable new Mersenne prime that their software generates quickly checkable proofs that the Fermat test was done correctly, using VDFs. https://www.mersenneforum.org/node/19621
Fun survey of vulnerabilities in E2EE cloud storage providers. Unauthenticated encryption is a theme. https://brokencloudstorage.info
There is a remarkably close parallel between the problems of the physicist and those of the cryptographer. The system on which a message is enciphered corresponds to the laws of the universe, the intercepted messages to the evidence available, the keys for a day or a message to important constants which have to be determined. The correspondence is very close, but the subject matter of cryptography is very easily dealt with by discrete machinery, physics not so easily.
- Alan Turing
- Alan Turing
How would you eli5 commitments?
A paper I like by J. Bonneau and @socrates1024: what if we didn't have public-key cryptography? It turns out that, in principle, we could still make a blockchain by using commit-and-reveal to prove knowledge of hash preimages
https://jbonneau.com/doc/BM14-SPW-fawkescoin.pdf
https://jbonneau.com/doc/BM14-SPW-fawkescoin.pdf
If the govt has a backdoor into TEE keys, they can potentially throw people in jail that use it for private data storage/retrieval.
They can generate a valid TEE attestation for serving something very illegal.
If the courts respect TEE attestations, they have this power.
They can generate a valid TEE attestation for serving something very illegal.
If the courts respect TEE attestations, they have this power.
Another side-project: age-mnemonic. It uses the same tech as cryptoasset wallets to generate one or more keys from a single mnemonic phrase.
https://bbjubjub2494.github.io/age-hier
https://bbjubjub2494.github.io/age-hier
til: whatsapps's has an auditable mapping of phone numbers to public keys
https://www.youtube.com/watch?v=_N4Q05z5vPE
https://www.youtube.com/watch?v=_N4Q05z5vPE
What is the best way of handling overflows or underflows when building a cryptography library? @cassie @bbjubjub.eth
Another side-project: it picks one or more items using drand verifiable randomness. Double-implemented in Go and Rust. I've used it to raffle CTF prizes internally although I'm not 100% satisfied with the design.
https://github.com/bbjubjub2494/dshuf
https://github.com/bbjubjub2494/dshuf
Side project of mine: threshold encryption for Age. I'm taking my time to finish it, but I think it could be useful for coordinated disclosure and backups.
https://github.com/bbjubjub2494/age-threshold
https://github.com/bbjubjub2494/age-threshold
Cooking up some Threshold Crypto 101 slides...