Nick Sullivan Profile picture
Aug 10, 2018 3 tweets 1 min read Twitter logo Read on Twitter
If you’re at #DEFCON2018, swing by the @CryptoVillage to see @mahrudsay’s talk about Tor at 1:30pm. I promise it will be very interesting.
If you want to beta test opportunistic onion and are a Cloudflare customer, you can sign up for the beta at onion-beta@cloudflare.com.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Nick Sullivan

Nick Sullivan Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @grittygrease

Aug 18, 2018
Crypto 2018 has affiliated events this year, which is fun. I’m currently attending the Quantum-safe Cryptography for Industry event, a big focus of mine lately. crypto.iacr.org/2018/affevents…

@Cloudflare is a sponsor of Crypto this year, so come see me if you want a webcam cover!
We just heard from Adrian Stanger from the NSA. There is high confidence in the NIST process and no plans to invest in QKD. Algorithm recommendations (key agreement and signatures) to be made around 2023-24. There are no plans to replace AES-256 or SHA2-384.
Brian LaMacchia of @MSFTResearch gives an overview of the cryptographic algorithm transitions we’ve gone through so far in the 21st century.
Read 8 tweets
Aug 12, 2018
Thread.

I was recently privy to a conversation in which some really smart people in security shared their favorite papers or articles. Security engineering, like other disciplines, has a rich history worth learning from.

I'm going to list some of these papers in this thread.
New Directions in Cryptography - Whitfield Diffie and Martin Hellman (1976)

It's hard to emphasize just how revolutionary the concept of public key cryptography is. This paper started it all, introducing D-H key agreement and digital signatures.

ee.stanford.edu/~hellman/publi…
Reflections on Trusting Trust - Ken Thompson (1984)

This paper succinctly describes the concept that it's not enough to trust software, you also need to trust the software that compiles the software, and the software that compiles the compiler, and so on

archive.ece.cmu.edu/~ganger/712.fa…
Read 16 tweets
Aug 6, 2018
If you're in Vegas this week and looking for a change in scenery, reach out to me about @Cloudflare. We're building the next generation of internet services, and are at the forefront of deploying new cryptographic technology online.
This thread includes some highlights from the last few years. If you have a history of innovating at scale and these are the kind of projects that you love to do, let me know. The Cloudflare Crypto Team is hiring in San Francisco, London, and New York.
boards.greenhouse.io/cloudflare/job…
Read 15 tweets
Apr 9, 2018
I’ll be tweeting about some post-quantum crypto things as the come up this week in this thread.
LEDAkem is a code-based crypto primitive for key encapsulation based on quasi-cyclic low-density parity-check codes (QC-LDPC). Large-ish keys (7KB+), slow (100ms+), but compact private keys, only simple binary field math and based on NP-complete problem. ledacrypt.org
Learning Parity with Noise (LPN) is a problem used in code-based crypto. A new algorithm to decode linear codes with many errors was introduced that reduces the security level of some LPN schemes. Key idea is the use of the nearest neighbor search. eprint.iacr.org/2017/1139.pdf
Read 41 tweets
Apr 4, 2018
I want to highlight a behind-the-scenes change that improves the security guarantees provided by Cloudflare’s global HTTPS service. Since last year, Cloudflare has been using a different set of session ticket encryption keys (STEKs) in each datacenter for TLS resumption.
Previously, the same key was used across multiple datacenters, rotated every hour (blog.cloudflare.com/tls-session-re…). This was modeled after work by @j4cob and @jmhodges at Twitter (blog.twitter.com/engineering/en…) with more aggressive key rotation.
This aggressive rotation of ticket keys was not something server operators had attempted at scale and it uncovered some interesting client bugs, most notably in Microsoft Schannel (blog.cloudflare.com/microsoft-tls-…).
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(