Learn Verification of Cryptographic Protocols

Hi,

In the last few years, I have been interested in cryptography. I took courses at the university on the subject, as well as MOOCs (Coursera Cyprtography I) or reading books. This allowed me to learn about cryptographic primitives and building blocks but not so much about protocols such as TLS or Signal protocol. There is sometimes a brief description with a general overview of how the protocol works and its security properties but nothing on how we can reason and proves these properties. After some research, I found this article https://galois.com/blog/2021/05/who-is-verifying-their-cryptographic-protocols/ or this one https://bblanche.gitlabpages.inria.fr/publications/BlanchetETAPS12.pdf and it seems that proving properties of protocols uses techniques similar to verification of software with software prover. I would like to know if any of you have good resources (courses, books,…) to recommend for learning about these topics. Thank you.

πŸ‘︎ 27
πŸ’¬︎
πŸ‘€︎ u/Zulres
πŸ“…︎ Oct 31 2021
🚨︎ report
From Vitalik: An introduction to some of the cryptographic techniques used in Halo (#Zcash) and other recent protocols vitalik.ca/general/2021/1…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/upremus
πŸ“…︎ Nov 05 2021
🚨︎ report
What are the most overrated cryptographic schemes, protocols, conferences, etc.?

So?

πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/davidw_-
πŸ“…︎ Sep 08 2021
🚨︎ report
Military grade cryptographic Security Protocol reddit.com/gallery/omos1p
πŸ‘︎ 603
πŸ’¬︎
πŸ‘€︎ u/KushTej
πŸ“…︎ Jul 18 2021
🚨︎ report
The best cryptographic protocol ever!

I'm happy to share with you my greatest work yet "The best cryptographic protocol ever!". It contains all valuable hard-earned secret crypto knowledge that I've accumulated over the years!
https://cryptosubtlety.medium.com/the-best-cryptographic-protocol-ever-31ee5108aaa2

πŸ‘︎ 24
πŸ’¬︎
πŸ‘€︎ u/cryptosubtlety
πŸ“…︎ Jun 03 2021
🚨︎ report
Cryptographic protocol which provides cheat-protection in p2p games -- Does such a thing exist?

During the pandemic I come up with ideas for new software projects every few days, even if I don't really even start any of them and lately I was thinking about gaming and which problems could arise, if you program a open source game (besides the financial problems).

So I came up with a though experiment and want to ask you, what you think about it, and if someone of you maybe even knows about a program that realizes what I'm talking about.

Lets assume a game developed by a few voluntary devs, who maintain a small round based table top game, but the devs want the game to stay functional without themselves, or the devs of a fork being in need to maintain a server for the online multiplayer mode. So the multiplayer mode is planed to work with peer2peer connections without a neutral server controlling the game and maybe a discord or a subreddit where people can find their opponents. Most multiplayer games sooner or later get problems with hackers when they become popular and writing hacks gets much easier if the program is open source, because anyone could just create a fork of the game which just includes hacks. So I was thinking about some ways to define a protocol, which can be used to make at least those kinds of cheating impossible, I was able to come up with, like

  • looking at the cards in your opponents hand or other informations you're not supposed to know
  • manipulate the outcome of the rng of dice rolls or drawing cards

and I actually had some ideas to solve those problems. For the dice manipulation cheat maybe choosing a seed for the rng at the beginning of the game, sending the encrypted seed to the other player, making a protocol of everything that happens during the game and sending the key for decrypting the seed after the end of the game, so that the client of the other player can check, if everything what my rng did during the game is consistent with the seed chosen at the beginning.

Now I was interested, if games which work like this already exist and googling for a while didn't give me any results. So I'm asking you, if you know any games with such some kind of cryptographic anti-cheat system, or if the idea is to ridiculous to assume that anyone would ever implement it.

πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/OlgOron
πŸ“…︎ Apr 19 2021
🚨︎ report
"Skynet is a collection of cryptographic protocols for storing and retrieving data over the Internet. Skynet can be viewed as an alternative infrastructure for the Internet, providing much of the same functionality except that all data is user controlled instead of corporation controlled." blog.sia.tech/a-deep-dive…
πŸ‘︎ 47
πŸ’¬︎
πŸ‘€︎ u/sia-steve
πŸ“…︎ Jun 15 2021
🚨︎ report
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols eprint.iacr.org/2019/426.…
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/ZeoChill
πŸ“…︎ Jul 24 2021
🚨︎ report
⛓️ Great discussion between Balaji Srinivasan and Tim Ferriss on the value of creating a community data sharing protocol enforced by cryptographic proofing. This is a key value proposition of the Streamr Network β€” testnet coming this summer! πŸŽ™οΈ Listen here (36:30): youtu.be/eim8REOYLzA?t=21…
πŸ‘︎ 12
πŸ’¬︎
πŸ‘€︎ u/thamilton5
πŸ“…︎ May 18 2021
🚨︎ report
Dfinity allows the Internet Computer protocol to securely manage user identities on certain apps without usernames, passwords, or cryptographic keys.
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/CryptoRonaldo
πŸ“…︎ May 12 2021
🚨︎ report
Q makes unsubstantiated claim about security flaw in security protocol PGP that would enable them to outlive 8chan, cites old security flaw that isn't related to the cryptographic strength of PGP
πŸ‘︎ 140
πŸ’¬︎
πŸ“…︎ Nov 23 2019
🚨︎ report
Ilan Komargodski, Ph.D., NTT Researcher in their Cryptography & Information Security Lab, talking about his work in designing new cryptographic protocols for secure cloud computation radioideaxme.com/2020/07/…
πŸ‘︎ 118
πŸ’¬︎
πŸ‘€︎ u/ObjectiveGround5
πŸ“…︎ Jul 24 2020
🚨︎ report
Harmony Protocol (ONE) Driving Utility Cryptographic Innovation and Decentralized Community thecurrencyanalytics.com/…
πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/TheCurrencyA
πŸ“…︎ Sep 12 2020
🚨︎ report
One Year of Verifpal: Understanding Verifpal’s Relationship With Cryptographic Protocol Security blog.symbolic.software/20…
πŸ‘︎ 13
πŸ’¬︎
πŸ‘€︎ u/beefhash
πŸ“…︎ Sep 06 2020
🚨︎ report
Ilan Komargodski, Ph.D., NTT Researcher in their Cryptography & Information Security Lab, talking about his work in designing new cryptographic protocols for secure cloud computation radioideaxme.com/2020/07/…
πŸ‘︎ 24
πŸ’¬︎
πŸ‘€︎ u/ObjectiveGround5
πŸ“…︎ Jul 24 2020
🚨︎ report
Are there cryptographic protocols that have homomorphic properties with respect to closest vector in a set?

More specifically, Assume v1 has a closest vector in set V = {V1, V2, V3, V4} which is V2. I encrypt v1 with some small random noise, r1, and get enc(v1+r1) I encrypt V with some small random noise, and get new set {enc(V1+R1), enc(V2+R2), enc(V3+R3), enc(V4+R4)}. The encrypted vector should have the same closest vector in the encrypted set, in other words, enc(v1+r1) should have closest vector enc(V2+R2) if noise is small enough. Are there any schemes which have this homomorphism and are secure?

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/fontisawesome
πŸ“…︎ Aug 27 2020
🚨︎ report
Cornell Post-Doc, Ilan Komargodski, Ph.D., now NTT Researcher in the Cryptography & Information Security Lab, talking about his work in designing new cryptographic protocols for secure cloud computation radioideaxme.com/2020/07/…
πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/ObjectiveGround5
πŸ“…︎ Jul 24 2020
🚨︎ report
Ilan Komargodski, Ph.D., NTT Researcher in their Cryptography & Information Security Lab, talking about his work in designing new cryptographic protocols for secure cloud computation radioideaxme.com/2020/07/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/ObjectiveGround5
πŸ“…︎ Jul 24 2020
🚨︎ report
Ilan Komargodski, Ph.D., NTT Researcher in their Cryptography & Information Security Lab, talking about his work in designing new cryptographic protocols for secure cloud computation radioideaxme.com/2020/07/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/ObjectiveGround5
πŸ“…︎ Jul 24 2020
🚨︎ report
Bitcoin’s real contribution to the world is its source code. The blockchain, the network protocol, the cryptographic verification β€” anyone can take this and build a currency with any economic properties their community needs. falkvinge.net/2013/11/06/…
πŸ‘︎ 551
πŸ’¬︎
πŸ‘€︎ u/accountt1234
πŸ“…︎ Dec 19 2013
🚨︎ report
A platform that is deeply rooted in science and brings to the world tech advancements on all levels of the protocol, resulting in a blockchain unmatched in cryptographic security and transaction speed. meetcrypto.net/concordium…
πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/CoreyGilligan
πŸ“…︎ May 23 2020
🚨︎ report
Hardcoded cryptographic key in the FortiGuard services communication protocol

Did anyone else spot the update to this security advisory? https://fortiguard.com/psirt/FG-IR-18-100

Last week it was saying upgrading to 6.0.7 was suggested. Now it has changed to say we should be going to 6.2 branch with no mention of the other branches at all.

The news from last week https://www.zdnet.com/article/some-fortinet-products-shipped-with-hardcoded-encryption-keys/

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/nanonoise
πŸ“…︎ Dec 06 2019
🚨︎ report
So I'm playing Return to Arkham and during Protocol 10, the way into the Arkham city walls glitched so I went to last checkpoint. Now I cant use my cryptographic sequencer to open the door and I'm seemingly stuck. Does anyone know a fix or way to glitch through the door?
πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/Toasty_Cannibal
πŸ“…︎ Sep 10 2019
🚨︎ report
"Military grade cryptographic security protocol" from Arrow. imgur.com/zu6TT1U
πŸ‘︎ 393
πŸ’¬︎
πŸ‘€︎ u/gingersyndrome
πŸ“…︎ Feb 15 2015
🚨︎ report
Verifpal: Cryptographic Protocol Analysis verifpal.com
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/knotdjb
πŸ“…︎ Aug 29 2019
🚨︎ report
Happy 3rd birthday Zcoin! πŸ₯³ We would like to thank all our supporters for believing in our vision to provide the strongest level of anonymity that is possible without sacrificing usability, the auditability of our coin supply and relying on well-established cryptographic protocols.
πŸ‘︎ 13
πŸ’¬︎
πŸ‘€︎ u/Muggles_XZC
πŸ“…︎ Sep 28 2019
🚨︎ report
New Golem Release: this version introduces changes to the Golem protocol and uses different cryptographic methods for signing and serializing messages. blog.golemproject.net/bra…
πŸ‘︎ 50
πŸ’¬︎
πŸ‘€︎ u/mariapaulafn
πŸ“…︎ Jun 06 2018
🚨︎ report
Meet Reuben and Aram who will be presenting at Defcon 2019, the world's largest hacker conference in Las Vegas as part of Monero Village to discuss about Zcoin's experiences and lessons in dealing with cryptographic vulnerabilities along with sharing about our Sigma and Lelantus privacy protocols! monerovillage.com/dc27/sc…
πŸ‘︎ 15
πŸ’¬︎
πŸ‘€︎ u/Muggles_XZC
πŸ“…︎ Jul 26 2019
🚨︎ report
Zerocoin is a new cryptographic extension to Bitcoin that (if adopted) would bring true cryptographic anonymity to Bitcoin. It works at the protocol level and doesn't require new trusted parties or services. blog.cryptographyengineer…
πŸ‘︎ 378
πŸ’¬︎
πŸ‘€︎ u/whitefangs
πŸ“…︎ Apr 11 2013
🚨︎ report
CrypCore it is the most reliable and anonymous exchange that uses ring signatures, confidential transactions and hidden addresses. Crypcore is going to offer a clean cryptographic solvency system and a CryptoNote protocol. This is a high-quality product developed by an experienced team. crypcore.com/
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/natka5
πŸ“…︎ Mar 04 2020
🚨︎ report
Cardano: Cryptographic currency implementing Ouroboros PoS protocol cardanohub.org
πŸ‘︎ 40
πŸ’¬︎
πŸ‘€︎ u/donutloop
πŸ“…︎ Dec 31 2017
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.