JP Aumasson Profile Banner
JP Aumasson Profile
JP Aumasson

@veorq

Followers
18,403
Following
930
Media
2,196
Statuses
25,476

cofounder & CSO @taurus_hq , author @cryptolexicon , designer BLAKE2 BLAKE3 SipHash, Signal: jpa.01

Switzerland
Joined June 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@veorq
JP Aumasson
5 months
Changes on EVERY page, new chapter "Cryptocurrency cryptography" inc. PoW, algebraic hashing & Poseidon, multi-signatures, threshold signatures, zero-knowledge proofs, and more. NEW: section about Ed25519; the new Linux PRNG; NIST's PQC standards
Tweet media one
12
106
380
@veorq
JP Aumasson
2 years
something good about Python
Tweet media one
86
1K
11K
@veorq
JP Aumasson
5 years
"CONFIDENTIAL"
Tweet media one
102
269
977
@veorq
JP Aumasson
5 years
beware the 2020 length-extension time-travel attack: if you write a date as 01/02/20, someone could edit it to 01/02/2010 etc. the attack is practical and requires negligible memory
17
280
870
@veorq
JP Aumasson
5 years
it's out will present it at @RealWorldCrypto the paper I'm the proudest of thanks to @sevenps
Tweet media one
34
291
854
@veorq
JP Aumasson
3 years
on a call explaining to someone that cryptography is not just about blockchain and even existed before blockchain send help
23
56
581
@veorq
JP Aumasson
7 years
we've got a BS bingo winner
Tweet media one
15
300
556
@veorq
JP Aumasson
5 years
🤘👏 @dguido
43
73
530
@veorq
JP Aumasson
5 years
"if you see fraud and don't say fraud you're fraud"
8
41
446
@veorq
JP Aumasson
4 years
Hope you’ll like it 😊 This week we’re putting the final touches and checking all the equations, so excited! Shipping in February 2021 🎉 Thanks @billpollock and all the @nostarch team 💙📚 Thanks to all who helped and supported this project 🤗🙏
Tweet media one
35
108
448
@veorq
JP Aumasson
3 years
@vixentael less than a year ago I had a great city guide
Tweet media one
6
5
420
@veorq
JP Aumasson
8 years
Tweet media one
3
327
417
@veorq
JP Aumasson
7 years
email of the day
Tweet media one
20
102
382
@veorq
JP Aumasson
4 years
excellent crypto book by Mike Rosulek, more formal than Serious Crypto and less than Katz/Lindell, and it's free!
Tweet media one
2
148
389
@veorq
JP Aumasson
7 years
now with a subtitle
Tweet media one
19
78
364
@veorq
JP Aumasson
2 years
Murphy's Laws of Cryptography💣 Cryptography turns a security problem into a key management problem. New cryptography generates new attacks. If it's provably secure, it's probably not. Any large enough system will include broken cryptography. Others?
36
104
345
@veorq
JP Aumasson
9 years
best course desc ever
Tweet media one
2
284
309
@veorq
JP Aumasson
8 years
Shamir's 15 predictions for next 15 years
Tweet media one
8
339
314
@veorq
JP Aumasson
4 years
DEFCON quals had a crypto challenge involving anomalous trace-1 curves and their weakness But Python is even weaker than weak curves:
Tweet media one
6
83
307
@veorq
JP Aumasson
7 years
we audited @InputOutputHK 's Ethereum Classic wallet (Mantis), the report is now available
11
98
269
@veorq
JP Aumasson
4 years
real-world cryptanalysis
4
73
281
@veorq
JP Aumasson
9 years
slides of my #shmoocon talk "Crypto, Quantum, Post-Quantum" TL;DR below
Tweet media one
9
254
263
@veorq
JP Aumasson
4 years
BLAKE WON THE SHA-3 COMPETITION!
13
26
259
@veorq
JP Aumasson
4 years
"Lots of people working in cryptography have no deep concern with real application issues. They are trying to discover things clever enough to write papers about." —Whit Diffie
6
54
250
@veorq
JP Aumasson
6 years
in other news: Serious Cryptography sold 10,000 copies in about a year, thanks @billpollock and all the @nostarch team for making this happen!
16
22
247
@veorq
JP Aumasson
7 years
8
134
234
@veorq
JP Aumasson
7 years
"Mathematics and Computation", free draft of a book by Avi Wigderson, it looks excellent
Tweet media one
2
106
235
@veorq
JP Aumasson
4 years
You know Enigma but did you know the Barbie encryption machine (with a Swiss 4-bit microcontroller from EMM) "hidden built-in cryptographic capability (...) mono alphabet substitution cipher, also known as MASC, with 4 different keys"
Tweet media one
7
81
226
@veorq
JP Aumasson
6 years
my Linux system is much faster now! all I had to do was to copy this script in my ~/.bashrc file! thanks @cynicalsecurity for the tip!
14
77
230
@veorq
JP Aumasson
5 years
He can do quantum operations and entanglement on a classical computer (also, speed of light is variable)
17
9
217
@veorq
JP Aumasson
8 years
also applies to bugs disclosure
Tweet media one
1
243
215
@veorq
JP Aumasson
5 years
"a math constant is not a fixed value"
9
17
210
@veorq
JP Aumasson
5 years
Swiss multilingualism: - Swiss-German person calls me, makes an effort to speak Hochdeutsch rather than dialect - I understand but am more comfortable responding in English, so we switch to English - They write me a follow-up email in French - I respond to said email in German
12
21
215
@veorq
JP Aumasson
7 years
IKEA crypto
Tweet media one
4
110
216
@veorq
JP Aumasson
7 years
Now in early access!
Tweet media one
19
104
212
@veorq
JP Aumasson
5 months
Proof review time, we're almost there! 🦜
Tweet media one
8
23
210
@veorq
JP Aumasson
2 years
if something as trivial as a hash function has bugs that take years to be discovered (one in the BLAKE ref code took 7 years), think of ZK proofs systems protocols' and code's complexity
@veorq
JP Aumasson
2 years
> The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (..) making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective.
Tweet media one
4
41
120
14
50
204
@veorq
JP Aumasson
9 years
New car hacking trick discovered, hundreds of models affected! http://t.co/QEPDjOLLGY
Tweet media one
9
211
193
@veorq
JP Aumasson
5 years
economists are notoriously bad at predictions about the economy
Tweet media one
10
79
199
@veorq
JP Aumasson
3 years
you're in Switzerland, you like IT security, are familiar with corporate IT challenges, don't mind client-facing work, and want to work with a cool team? contact me :)
14
55
199
@veorq
JP Aumasson
5 years
the "crypto coding rules" are back at originally started this in 2013, haven't touched it in years, just did some cleanup and update but still lot of work needed! PRs welcome :)
4
89
194
@veorq
JP Aumasson
7 years
* create a silly shitcoin and ICO in 30min: hundreds of RT's, comments, likes, etc. * publish , the most advanced hash-based crypto scheme ever, submission to NIST's post-quantum contest.. *crickets*
14
81
189
@veorq
JP Aumasson
3 years
typical infosec people reasoning: "it's not perfect ergo it's useless"
13
21
187
@veorq
JP Aumasson
2 years
one of the most interesting projects I've seen lately "zero-knowledge verifiable general computing platform based on zk-STARKs and the RISC-V microarchitecture."
6
44
188
@veorq
JP Aumasson
8 years
I typed "password"
Tweet media one
15
101
184
@veorq
JP Aumasson
5 years
Just learnt that Diffie-Hellman and "all encryption" is based on factorization
3
5
175
@veorq
JP Aumasson
6 years
Proud to announce @teserakt_io 's first product: MQTT end-to-end encryption & key management @ Our tagline is "serious cryptography, secure software, no BS" – and no blockchain :-)
10
73
175
@veorq
JP Aumasson
5 years
If you found Serious Crypto too technical (and even if you didn't), Crypto 101 is a great reference too, with lot of material not covered in my book and often more accessible explanations
1
77
175
@veorq
JP Aumasson
4 years
NEW BOOK delivered to @nostarch 🔥📚🔥 touches many more topics than Serious Crypto but not a sequel to Serious Crypto better for total beginners better for experts and PhDs thanks to COVID19, @cryptopathe , @vixentael , @luca_defeo , @claucece , and others who helped pic = hint
Tweet media one
10
46
172
@veorq
JP Aumasson
7 years
dear blockchain/$crypto companies: I don't want to join all your Slacks and I won't report bugs on your bitcointalk thread, please use this new thing called EMAIL, and even better, have a security contact and publish a PGP key
3
40
166
@veorq
JP Aumasson
3 years
Tweet media one
10
37
167
@veorq
JP Aumasson
6 years
Serious Crypto is one of the recommended textbooks in MIT's Computer and Network Security class (by Ron Rivest et al.)
9
23
168
@veorq
JP Aumasson
4 years
Brexit-level crypto, from the Brexit deal document (p921 in ): SHA-1 1024-bit RSA Netscame Communicator 4.x
Tweet media one
13
54
166
@veorq
JP Aumasson
4 years
Crypto history: this is the first specification of ChaCha20 by @hashbreaker on the eSTREAM forum; no LaTeX, no peer review, just a good idea, and now the most used stream cipher in the universe (TLS, SSH, WireGuard, etc.)
Tweet media one
6
56
164
@veorq
JP Aumasson
2 years
guess we'll stick to the English term
Tweet media one
22
24
163
@veorq
JP Aumasson
4 years
Tweet media one
13
57
161
@veorq
JP Aumasson
7 years
hey NIST, before deploying post-quantum crypto, please fix your HTTPS ;-)
Tweet media one
2
56
154
@veorq
JP Aumasson
2 years
TIL OpenSSL can generate RSA keys with more than 2 primes, and of course like all weird OpenSSL features it's a bit broken
Tweet media one
7
28
152
@veorq
JP Aumasson
5 years
"what we found is that phi is where light emerges from darkness"
6
5
148
@veorq
JP Aumasson
4 years
if you want to understand how Shor's quantum algorithm can break RSA by factoring its modulus after finding a function's period using a quantum Fourier transform, then this may be the best explanation you'll find
Tweet media one
4
42
155
@veorq
JP Aumasson
5 years
I started by telling the guy that DH and AES aren't based on factorization, then Thomas Pornin reminded him of the prior art (Eratosthene sieve), then Dan brilliantly finished him 🔥💪
@dguido
Dan Guido
5 years
I yelled at the Time AI guy. It’s ok to get angry at someone trying to harm people. I was shocked that more people haven’t done the same.
45
94
497
7
26
151
@veorq
JP Aumasson
7 years
just got a DHL delivery from @nostarch
Tweet media one
9
10
148
@veorq
JP Aumasson
5 years
Pretty sure he found applications to astrology and to prove that the Earth is flat
Tweet media one
21
9
146
@veorq
JP Aumasson
6 years
in Vegas for @defcon and want a signed copy of my book? easy! 1. buy a copy of Serious Cryptography at @nostarch 's booth 2. fly to Switzerland and meet me there (skipping the LV infosec circus this year!)
3
10
147
@veorq
JP Aumasson
5 years
He just said that publishing on arxiv is being "peer-reviewed"
Tweet media one
6
3
140
@veorq
JP Aumasson
6 years
IOTA hired good symmetric cryptographers to design its new hash function "Troika", an AES-ish sponge. A cryptanalysis competition will award up to 200k€, see IOTA's announcement () , and contest rules
7
52
143
@veorq
JP Aumasson
3 years
"an attacker can create a malicious ELF file as a smart contract, which can trigger the integer overflow. After that, every validator would run the target ELF file and the rBPF would get panic with “add with overflow”"
2
47
145
@veorq
JP Aumasson
22 days
now too scared to open a random page and see a typo
Tweet media one
9
2
144
@veorq
JP Aumasson
8 years
total password fail by Air France (found by @SecuringApps ): between 4 and 6 chars, should *not* contain special chars /cc @thorsheim
Tweet media one
18
118
140
@veorq
JP Aumasson
3 years
think you need to be a math genius to be a decent cryptographer? these are comments from my high-school math and physics teachers, which can be translated as "you suck" I was even worse at university and doubled my 3rd bachelor year and these were far from elite places
Tweet media one
Tweet media two
11
15
141
@veorq
JP Aumasson
8 years
post where I explain how to find collisions for SHA-2 or SHA-3 using anthropic computing (also, post-quantum stuff)
5
88
135
@veorq
JP Aumasson
5 years
🎉
Tweet media one
3
39
133
@veorq
JP Aumasson
3 years
the vuln: srandom(seed + cur_time + (unsigned)getpid());
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent 🤨
3
160
459
4
44
136
@veorq
JP Aumasson
2 years
blog post
Tweet media one
1
40
137
@veorq
JP Aumasson
4 years
cryptographers: anything less than 128-bit security is broken! also cryptographers: run conference/preprint services using 6-digit passwords and unauthenticated database access
8
15
131
@veorq
JP Aumasson
7 years
lol
Tweet media one
4
80
128
@veorq
JP Aumasson
8 years
Or why overconfident idiots have more influence than you in your organization
Tweet media one
3
94
125
@veorq
JP Aumasson
10 years
alright: SHA-1 backdooring and exploitation, everything is already on http://t.co/0HFNooidN2 (full paper, slides, PoCs) feedback welcome!
5
179
127
@veorq
JP Aumasson
2 years
"Java’s implementation of ECDSA signature verification didn’t check if r or s were zero" they're not the only ECDSA code to have this bug
4
35
128
@veorq
JP Aumasson
7 years
meanwhile, not-a-blockchain IOTA with its ternary encoding and understudied symmetric-crypto-only construction enters the marketcap top-4... remind me to find some time to find flaws in there
Tweet media one
11
34
125
@veorq
JP Aumasson
2 years
- MPC in the head - block cipher encryption - sponge function - Merkle hash tree
Tweet media one
Tweet media two
Tweet media three
Tweet media four
38
29
121
@veorq
JP Aumasson
9 years
"How to crack Ubuntu disk encryption and passwords", on eCryptfs' SHA-512-based password hash http://t.co/IlTkSdDmsC
2
121
124
@veorq
JP Aumasson
7 years
crypto in 2018: * @hashbreaker and his gang break more post-quantum submissions * side-channels in p-q schemes implementations: new attacks and defenses * CAESAR eventually ends * there's a new crypto competition * major vulnerabilities found in major blockchain systems
2
46
121
@veorq
JP Aumasson
5 years
someone claims to have "cracked" RSA, should I tell him that Time AI already did?
Tweet media one
17
10
123
@veorq
JP Aumasson
4 years
Contact-tracking: predictions: * Tons of papers about privacy-preserving schemes, security notions, proofs, quantum versions, formal verification, etc., maybe a conference - PRIVTRACON * Only basic schemes will be deployed, with too few users and too late to make a difference
12
37
120
@veorq
JP Aumasson
5 years
Spoiler: Yes
Tweet media one
8
14
116
@veorq
JP Aumasson
2 years
> The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (..) making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective.
Tweet media one
4
41
120
@veorq
JP Aumasson
4 years
Tweet media one
1
38
121
@veorq
JP Aumasson
4 years
Common misunderstandings with crypto hardware security: * CC's EAL levels are about assurance quality, not security. * FIPS 140-2 L3 is not about resistance to physical attacks, but about their detection (which is better). * HSMs do not necessarily do crypto with hardware.
12
43
121
@veorq
JP Aumasson
8 years
one of the most powerful cryptographic static analysis tools, in just 110 bytes
5
45
115
@veorq
JP Aumasson
7 years
Great YubiKey walkthrough by my colleagues
2
60
119
@veorq
JP Aumasson
7 years
An ICO in a single tweet! JPcoin! lets revolutionize the Crypto Industry! * ICO: get 1 JPcoin for 1000 satoshis! just look up the asset ID on the Waves exchange * Supply: 1000000 units * Airdrop: tweet me your address to get 10 JPcoins! * White paper!
Tweet media one
Tweet media two
Tweet media three
63
34
116
@veorq
JP Aumasson
9 years
in my list of "papers that a cryptographer should reread every year": @hashbreaker 's "Understanding bruteforce" http://t.co/Mw3rIODQax
6
71
116
@veorq
JP Aumasson
8 years
GitHub issue of the day
Tweet media one
1
72
114
@veorq
JP Aumasson
8 years
wrote this today
7
83
109
@veorq
JP Aumasson
5 years
"this is how the universe organizes itself"
Tweet media one
20
13
108
@veorq
JP Aumasson
8 years
end-to-end encryption is flawed and insecure, use ONE-END ENCRYPTION instead
Tweet media one
23
76
112