logo
episode-header-image
Oct 2020
34m 24s

Episode 2: Breaking Lightweight Symmetri...

Symbolic Software
About this episode

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.

Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.

In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.

But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?

Links and papers discussed in the show:

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: Léo Perrin.

Sponsored By:

Up next
Feb 2023
Episode 24: CryptoHack's Collection of Cryptic Conundrums!
For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and a ... Show More
49m 18s
Jan 2023
Episode 23: Psychic Signatures in Java!
On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatu ... Show More
53m 20s
Jan 2023
Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!
Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been w ... Show More
52m 12s
Recommended Episodes
Apr 2023
How Does Historical Cryptology Work?
To crack ciphers written centuries ago, historical cryptologists have to be half artist, half accountant, and use some of the most powerful computing tools known today. Learn how a team cracked Mary, Queen of Scots's code in this episode of BrainStuff, based on this article: http ... Show More
8m 12s
Mar 2021
S15:E6 - What is cryptography and how to get into it (Marcus Carey)
In this episode, we talk about cryptography with Marcus Carey, enterprise architect at ReliaQuest. Marcus talks about going to the military and learning cryptography, what cryptography is, and the foundational things you need to know in order to make sure the apps you’re building ... Show More
35m 36s
Aug 2023
Quantum computing: A threat to asymmetric encryption.
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the meaning of quantum computing through a cybersecurity perspective with CyberWire Hash Table guests Dr. Georgian Shea, Chief Technologist at the Foundation for Defense of Democracies, and Jonathan Fr ... Show More
17m 33s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Mar 2022
In Machines We Trust: When an algorithm gets it wrong (Encore)
The team that brings you In Machines We Trust has much to be grateful for—a brand new season of this show, a big awards nomination for The Extortion Economy, a show about ransomware that we made with ProPublica, and our new investigative series, Curious Coincidence. We celebrate ... Show More
19m 52s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ... Show More
25m 10s
Jan 2024
High-assurance Post-Quantum Crypto with Franziskus Kiefer and Karthik Bhargavan
We welcome Franziskus and Karthik from Cryspen to discuss their new high-assurance implementation of ML-KEM (the final form of Kyber), discussing how formal methods can both help provide correctness guarantees, security assurances, and performance wins for your crypto code! Trans ... Show More
56m 13s
Nov 2019
Cryptographers, quantum computers and the war for information | Craig Costello
In this glimpse into our technological future, cryptographer Craig Costello discusses the world-altering potential of quantum computers, which could shatter the limits set by today’s machines -- and give code breakers a master key to the digital world. See how Costello and his fe ... Show More
16m 19s
Aug 2023
AI & Crypto
with @alive_eth @danboneh @smc90This week's all-new episode covers the convergence of two important, very top-of-mind trends: AI (artificial intelligence) & blockchains/ crypto. These domains together have major implications for how we all live our lives everyday; so this episode ... Show More
1h 2m