AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
C2S Cryptography
Attack is a sort of hacked up authenticated key exchange where to finally authenticate the key exchange, you send this Vouchbox blob. It's like a very classical cross protocol attack and it comes about because of key reuse across the protocols. Because we found a lot of computers lying around in the back of our lab that we used to pull off some, I guess, is called stunt cryptography now.