Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts124/v4/a7/02/0a/a7020acf-74d8-34e9-7f49-9571abbd6778/mza_13734800070374195878.jpg/600x600bb.jpg
Cryptography FM
Symbolic Software
24 episodes
7 months ago
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
Show more...
Mathematics
Technology,
News,
Tech News,
Science
RSS
All content for Cryptography FM is the property of Symbolic Software and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
Show more...
Mathematics
Technology,
News,
Tech News,
Science
https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2
Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate!
Cryptography FM
38 minutes 8 seconds
4 years ago
Episode 11: Breaking the Rainbow Post-Quantum Cryptography Candidate!

The race for post-quantum cryptographic signature primitives is in its final lap over at NIST, which recently announced DILITHIUM, FALCON and Rainbow as the three signature primitive finalists. But a paper recently published by KU Leuven researcher Ward Beullens claims to find serious weaknesses in the security of Rainbow, one of those three finalists. In fact, the paper claims that the weaknesses are so severe that Rainbow’s security parameters now fall short of the security requirements set out by the NIST post-quantum competition.

But how does Rainbow work, and how do these weaknesses affect it? And why weren’t they spotted until now? We discuss this and more in this week’s episode of Cryptography FM.

Links and papers discussed in the show:

  • Improved Cryptanalysis of UOV and Rainbow
  • SQISign: compact post-quantum signatures from quaternions and isogenies

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Ward Beullens.

Sponsored By:

  • Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.
Cryptography FM
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.