Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

00:00

The Most Complicated Attack on a Paper

The NACL-A-E scheme uses a key derivation step and then they use the same nonce, I think, across the two different. So you think you've got a nonce, re-use vulnerability, but you haven't, actually, because the two heasier are different. And there it would be much nicer, I guess, if the metadata could just have been incorporated as associated data and you had an AAD kind of interface, but that's not what NACL provides. so indeed, I think they were a bit hamstrung by her.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app