
Security Cryptography Whatever
52 Episodes • By Deirdre Connolly, Thomas Ptacek, David Adrian •
securitycryptographywhatever.com...
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
Technology
Tech News
Science
Cryptanalyzing LLMs with Nicholas Carlini
'Let us model our large language model as a has...
more
Jan 28 2025 1h 20m
Chapter 1 12 mins
Mathematical Attacks on AI SecurityChapter 2 4 mins
AI Model Extraction and SecurityChapter 3 13 mins
Model Extraction Security Mechanism AnalysisChapter 4 9 mins
Model Extraction Attack Methodology DiscussionChapter 5 11 mins
Training Data Extraction Attack MethodologyChapter 6 8 mins
Data Poisoning Attacks and DefensesChapter 7 6 mins
AI Security Defense Challenges and StrategiesChapter 8 9 mins
Exploring AI Model CapabilitiesChapter 9 5 mins
Challenges in AI Model Security
Biden’s Cyber-Everything Bagel with Carole House
Just a few days before turning off the lights, the B...
more
Jan 21 2025 57m
Quantum Willow with John Schanck and Samuel Jacques
THE QUANTUM COMPUTERS ARE COMING...right? We got Sam...
more
Dec 18 2024 53m
Chapter 1 14 mins
Advancements in Quantum Error CorrectionChapter 2 13 mins
Classical Decoders in Quantum ComputingChapter 3 8 mins
Advancements in Quantum Gate Error CorrectionChapter 4 6 mins
Resource States in Quantum ComputationChapter 5 10 mins
Future Prospects in Quantum Computing
Dual_EC_DRBG with Justin Schuh and Matthew Green
Nothing we have ever recorded on SCW has brought so ...
more
Dec 7 2024 1h 7m
Chapter 1 9 mins
Debate on Dual EC BackdoorChapter 2 6 mins
NSA's Dual EC Backdoor ControversyChapter 3 3 mins
Technical Director Explains NSA's Randomness MethodChapter 4 11 mins
NSA's Dual EC Backdoor DilemmaChapter 5 12 mins
Debate on Intentional Crime vs NegligenceChapter 6 6 mins
Discussion on NetScreen Firewall VulnerabilityChapter 7 11 mins
NSA's Dual EC Backdoor DebateChapter 8 4 mins
Cryptographers Debate NSA's Dual EC BackdoorChapter 9 1 min
Debate on Backdoor Intent and Capability
A Little Bit of Rust Goes a Long Way with Android's Jeff Vander Stoep
You may not be rewriting the world in Rust, but if y...
more
Oct 15 2024 1h 13m
Chapter 1 10 mins
Security and Memory Safety in AndroidChapter 2 6 mins
Evaluating Memory Safety and Security BoundariesChapter 3 6 mins
Scaling Memory-Safe Code for SecurityChapter 4 5 mins
Assessing Memory Safety for Future CodeChapter 5 6 mins
Memory Safety and Security ProgressChapter 6 10 mins
Analyzing Memory Safety Issue TrendsChapter 7 14 mins
Transitioning to Memory-Safe CodeChapter 8 13 mins
Practical Approach to Memory Safety
Campaign Security
With the 2024 United States Presidential Election ri...
more
Oct 13 2024 1h 23m
Telegram with Matthew Green
We finally have an excuse to tear down Telegram! The...
more
Sep 7 2024 1h 4m
Chapter 1 9 mins
Cryptocurrency and the French Legal SystemChapter 2 6 mins
Telegram's Finite Field Crypto ParametersChapter 3 11 mins
Cryptographic Protocol Vulnerabilities and ConcernsChapter 4 4 mins
Messaging Protocol Security ConcernsChapter 5 3 mins
Modern Messaging Protocol Security EvaluationChapter 6 9 mins
Inadequacies of IGE Encryption ModeChapter 7 13 mins
Encrypted Messaging Protocol VulnerabilitiesChapter 8 4 mins
Cross-Border Legal System Comparison
Summertime Sadness
Are you going to be in Vegas during BlackHat / DEF C...
more
Jul 25 2024 57m
Chapter 1 2 mins
Vegas PartyChapter 2 25 mins
CrowdstrikeChapter 3 10 mins
NIST StandardsChapter 4 19 mins
BlackHat
Zero Day Markets with Mark Dowd
We have Mark Dowd on, founder of Aziumuth Security a...
more
Jun 24 2024 1h 25m
Chapter 1 1 hr 3 mins
Mark DowdChapter 2 22 mins
After Dark
ekr
iykykTranscript: https://securitycryptographywhateve...
more
May 24 2024 1h 48m
Chapter 1 5 mins
History of Internet Security ProtocolsChapter 2 9 mins
Evolution of TLS Protocol VersionChapter 3 10 mins
Evolution of TLS and SecurityChapter 4 10 mins
Certificate Transparency Design and ImplementationChapter 5 4 mins
Advancements in Private Information RetrievalChapter 6 7 mins
Complexities of Certificate Transparency ImplementationChapter 7 9 mins
Design Constraints in Digital SignaturesChapter 8 11 mins
Challenges in Internet Security and DNSChapter 9 13 mins
Post-Quantum Cryptography and Adoption TrendsChapter 10 12 mins
Binary Transparency and Security ModelsChapter 11 12 mins
Security Measures for Web Applications
STIR/SHAKEN with Paul Grubbs and Josh Brown
Josh Brown and Paul Grubbs join us to describe how t...
more
Apr 30 2024 1h 1m
Chapter 1 5 mins
Combatting Robocall Scams With Stir-ShakenChapter 2 14 mins
Telephone Network Protocols and SecurityChapter 3 10 mins
Phone Call Authentication and DeniabilityChapter 4 6 mins
Protocol Issues in Telephone NetworksChapter 5 10 mins
Telecom Privacy Risks in Metadata SharingChapter 6 4 mins
Challenges and Solutions in PKIChapter 7 8 mins
Certificate Transparency and Security Improvements
Cryptography Tier List
(NSFW) Three AI-generated guests rank cryptography t...
more
Mar 23 2024 19m
Chapter 1 11 mins
Modern Cryptography Tier List DiscussionChapter 2 8 mins
Ranking Cryptographic Concepts and Algorithms
Post-Quantum iMessage with Douglas Stebila
Apple iMessage is getting a big upgrade! Not only ar...
more
Mar 3 2024 55m
Chapter 1 16 mins
Apple's Post-Quantum iMessage Security AnalysisChapter 2 10 mins
Hybrid Key Agreement Protocols and SecurityChapter 3 11 mins
Cryptographic Deniability in MessagingChapter 4 15 mins
Messaging Security Protocol Updates
High-assurance Post-Quantum Crypto with Franziskus Kiefer and Karthik Bhargavan
We welcome Franziskus and Karthik from Cryspen to di...
more
Jan 29 2024 56m
Chapter 1 11 mins
ML-KEM Implementation in RustChapter 2 7 mins
High-assurance Software DevelopmentChapter 3 11 mins
Understanding Secret Independence and Crypto ProofsChapter 4 12 mins
Vulnerabilities in ML-KEM Encryption ProcessChapter 5 6 mins
Protocol DesignChapter 6 6 mins
Transitioning to Rust and Post-Quantum Cryptography
Encrypting Facebook Messenger with Jon Millican and Timothy Buck
Facebook Messenger has finally been end-to-end encry...
more
Dec 23 2023 59m
Chapter 1 12 mins
Facebook Messenger and Instagram DMsChapter 2 7 mins
Labyrinth and Cryptographic User ExperienceChapter 3 12 mins
Understanding Cryptographic Labels and ORFChapter 4 11 mins
Emerging Trends in Encryption DesignChapter 5 6 mins
Code Verify Extension and Instagram DMsChapter 6 8 mins
Discussion on Post-Quantum Security and Encryption
Attacking Lattice-based Cryptography with Martin Albrecht
Returning champion Martin Albrecht joins us to help ...
more
Nov 13 2023 57m
Chapter 1 13 mins
Analyzing the Security of Post-Quantum CryptographyChapter 2 5 mins
Finding Short Vectors in LatticesChapter 3 9 mins
Quantum Speedup in CryptographyChapter 4 9 mins
Understanding and Applying BKZ AlgorithmChapter 5 9 mins
Lattice-Based Cryptanalysis and ImprovementsChapter 6 5 mins
RAM and Storage in Classical AttacksChapter 7 4 mins
Discussion on AES Quantum Computing Costs
Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted
We're back! Signal rolled out a protocol change...
more
Nov 7 2023 1h 19m
Chapter 1 13 mins
Issues With Encrypted Jabber CommunicationsChapter 2 8 mins
App and Web Security ChallengesChapter 3 7 mins
Benefits and Limitations of Web EncryptionChapter 4 5 mins
Benefits and Challenges of Browser-Based CryptographyChapter 5 13 mins
Web App Security and Distribution ModelsChapter 6 5 mins
Web Security and Signal Key ExchangeChapter 7 14 mins
X3DH Protocol and Signal's Key ExchangeChapter 8 10 mins
Camry Encapsulation Attack and Secure Encryption
'Jerry Solinas deserves a raise' with Steve Weis
We explore how the NIST curve parameter seeds were g...
more
Oct 12 2023 57m
Cruel Summer: hybrid signatures, Downfall, Zenbleed, 2G downgrades, hurricanes, earthquakes
We're back from our summer vacation! We're...
more
Sep 13 2023 58m
Chapter 1 7 mins
Microarchitectural Vulnerabilities and Cybersecurity ConferencesChapter 2 14 mins
Discussion on VulnerabilitiesChapter 3 11 mins
Crypto Attacks and JWT VulnerabilitiesChapter 4 10 mins
Encryption and Post-Quantum Security DiscussionChapter 5 13 mins
Post-Quantum Cryptography and Signature Schemes
Why do we think anything is secure, with Steve Weis
What does P vs NP have to do with cryptography? Why ...
more
Jun 29 2023 46m
Elon's Encrypted DMs with Matthew Garrett
Are Twitter’s new encrypted DMs unreadable even if y...
more
May 29 2023 52m
WhatsApp Key Transparency with Jasleen Malvai and Kevin Lewi
WhatsApp has announced they’re rolling out key trans...
more
May 6 2023 55m
Messaging Layer Security (MLS) with Raphael Robert
Messaging Layer Security (MLS) 1.0 is (basically) he...
more
Apr 22 2023 55m
Real World: Crypto: 2023
Real World Cryptography 2023 is happening any moment...
more
Mar 25 2023 54m
Threema with Kenny Patterson, Scarlata Matteo, & Truong Kien Tuong
Another day, another ostensibly secure messenger tha...
more
Jan 27 2023 1h 3m