❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 25 June 2024Main stream
Before yesterdayMain stream

Recovering Public Keys from Signatures

20 June 2024 at 07:10

Interesting summary of various ways to derive the public key from digitally signed files.

Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead have a message and a signature, assume the signature is valid, and want to know which public key signed it? A rather delightful property if you want to attack anonymity in some proposed β€œeverybody just uses cryptographic signatures for everything” scheme.

Every Queen Song, Analyzed

By: dbx
17 June 2024 at 13:20
www.queensongs.info is your comprehensive guide to the music of Queen.

Start with the Discography. Then dive a little deeper on the Studio Info Page with track-by-track analysis of the recordings, including all kinds of detailed info about the studio recording process like who did what on each track with what instrument. Why not listen along to some MIDI Tracks while you read what the band was up to On This Day in History? Want to play along? Start with the Sheet Music and Tablature organized by album. And when you're ready, take the plunge into the 600 page Form and Analysis of every Queen song ever

β€˜cors-parser’ npm package hides cross-platform backdoor in PNG files

By: Ax Sharma
11 June 2024 at 11:00

'cors-parser' is neither a cure for Cross-Origin Resource Sharing (CORS) vulnerabilities nor a "parser" for interpreting same-origin policies of a website. Instead, the npm package employs a form of steganography to download what may appear to be PNG images at first. These "images," however, contain encoded instructions to drop malware β€” a backdoor on target systems.

The post β€˜cors-parser’ npm package hides cross-platform backdoor in PNG files appeared first on Security Boulevard.

Study: Three skulls of medieval Viking women were deliberately elongated

10 June 2024 at 17:53
Artificially modified skull from the female Viking individual in Havor, Hablingbo parish, Gotland.

Enlarge / Artificially modified skull from a female Viking individual in Havor, Hablingbo parish, Gotland. (credit: Β© SHM/Johnny Karlsson 2008-11-05/CC BY 2.5 SE)

German archaeologists discovered that the skulls of three medieval Viking women found on the Swedish island of Gotland in the Baltic Sea showed evidence of an unusual procedure to elongate their skulls. The process gave them an unusual and distinctive appearance, according to a paper published in the journal Current Swedish Archaeology. Along with evidence that the Viking men from the island may have deliberately filed their teeth, the discovery sheds light on the role body modification may have played in Viking culture

When people hear about Viking body modification, they probably think of Viking tattoos, particularly since the History Channel series Vikings popularized that notion. But whether actual Vikings sported tattoos is a matter of considerable debate. There is no mention of tattoos in the few Norse sagas and poetry that have survived, although other unusual physical characteristics are often mentioned, such as scars.

The only real evidence comes from a 10th century travel account by an Arab traveler and trader named Ahmad Ibn Fadlan, whose travel account, Mission to the Volga, describes the Swedish Viking traders ("Rusiyyah") he met in the Middle Volga region of Russia. "They are dark from the tips of their toes right up to their necksβ€”trees, pictures, and the like," Ibn Fadlan wrote. But the precise Arabic translation is unclear, and there is no hard archaeological evidence, since human skin typically doesn't preserve for centuries after a Viking burial.

Read 7 remaining paragraphs | Comments

New Lattice Cryptanalytic Technique

15 April 2024 at 07:04

A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems.

A few things to note. One, this paper has not yet been peer reviewed. As this comment points out: β€œWe had already some cases where efficient quantum algorithms for lattice problems were discovered, but they turned out not being correct or only worked for simple special cases.” I expect we’ll learn more about this particular algorithm with time. And, like many of these algorithms, there will be improvements down the road.

Two, this is a quantum algorithm, which means that it has not been tested. There is a wide gulf between quantum algorithms in theory and in practice. And until we can actually code and test these algorithms, we should be suspicious of their speed and complexity claims.

And three, I am not surprised at all. We don’t have nearly enough analysis of lattice-based cryptosystems to be confident in their security.

EDITED TO ADD (4/20): The paper had a significant error, and has basically been retracted. From the new abstract:

Note: Update on April 18: Step 9 of the algorithm contains a bug, which I don’t know how to fix. See Section 3.5.9 (Page 37) for details. I sincerely thank Hongxun Wu and (independently) Thomas Vidick for finding the bug today. Now the claim of showing a polynomial time quantum algorithm for solving LWE with polynomial modulus-noise ratios does not hold. I leave the rest of the paper as it is (added a clarification of an operation in Step 8) as a hope that ideas like Complex Gaussian and windowed QFT may find other applications in quantum computation, or tackle LWE in other ways.

In Memoriam: Ross Anderson, 1956–2024

10 April 2024 at 07:08

Last week, I posted a short memorial of Ross Anderson. The Communications of the ACM asked me to expand it. Here’s the longer version.

EDITED TO ADD (4/11): Two weeks before he passed away, Ross gave an 80-minute interview where he told his life story.

Ross Anderson

31 March 2024 at 20:21

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge.

I can’t remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. (Okay, he created bothβ€”I helped.) It was before 1998, when we wrote about the problems with key escrow systems. I was one of the people he brought to the Newton Institute, at Cambridge University, for the six-month cryptography residency program he ran (I mistakenly didn’t stay the whole time)β€”that was in 1996.

I know I was at the first Fast Software Encryption workshop in December 1993, another conference he created. There I presented the Blowfish encryption algorithm. Pulling an old first-edition of Applied Cryptography (the one with the blue cover) down from the shelf, I see his name in the acknowledgments. Which means that sometime in early 1993β€”probably at Eurocrypt in Lofthus, Norwayβ€”I, as an unpublished book author who had only written a couple of crypto articles for Dr. Dobb’s Journal, asked him to read and comment on my book manuscript. And he said yes. Which means I mailed him a paper copy. And he read it. And mailed his handwritten comments back to me. In an envelope with stamps. Because that’s how we did it back then.

I have known Ross for over thirty years, as both a colleague and a friend. He was enthusiastic, brilliant, opinionated, articulate, curmudgeonly, and kind. Pick up any of his academic papersβ€”there are manyβ€”and odds are that you will find a least one unexpected insight. He was a cryptographer and security engineer, but also very much a generalist. He published on block cipher cryptanalysis in the 1990s, and the security of large-language models last year. He started conferences like nobody’s business. His masterwork book, Security Engineeringβ€”now in its third editionβ€”is as comprehensive a tome on cybersecurity and related topics as you could imagine. (Also note his fifteen-lecture video series on that same page. If you have never heard Ross lecture, you’re in for a treat.) He was the first person to understand that security problems are often actually economic problems. He was the first person to make a lot of those sorts of connections. He fought against surveillance and backdoors, and for academic freedom. He didn’t suffer fools in either government or the corporate world.

He’s listed in the acknowledgments as a reader of every one of my books from Beyond Fear on. Recently, we’d see each other a couple of times a year: at this or that workshop or event. The last time I saw him was last June, at SHB 2023, in Pittsburgh. We were having dinner on Alessandro Acquistiβ€˜s rooftop patio, celebrating another successful workshop. He was going to attend my Workshop on Reimagining Democracy in December, but he had to cancel at the last minute. (He sent me the talk he was going to give. I will see about posting it.) The day before he died, we were discussing how to accommodate everyone who registered for this year’s SHB workshop. I learned something from him every single time we talked. And I am not the only one.

My heart goes out to his wife Shireen and his family. We lost him much too soon.

EDITED TO ADD (4/10): I wrote a longer version for Communications of the ACM.

❌
❌