eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

214
active users

#cryptanalysis

0 posts0 participants0 posts today
The New Oil<p>The <a href="https://mastodon.thenewoil.org/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a>’s “Fifty Years of Mathematical <a href="https://mastodon.thenewoil.org/tags/Cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptanalysis</span></a> (1937–1987)”</p><p><a href="https://www.schneier.com/blog/archives/2025/05/the-nsas-fifty-years-of-mathematical-cryptanalysis-1937-1987.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/05/the-nsas-fifty-years-of-mathematical-cryptanalysis-1937-1987.html</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Schneier on Security RSS<p>The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)”</p><p>“Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, was just declassified—with a lot of redactions—by the NSA.<br>I... <a href="https://www.schneier.com/blog/archives/2025/05/the-nsas-fifty-years-of-mathematical-cryptanalysis-1937-1987.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/05/the-nsas-fifty-years-of-mathematical-cryptanalysis-1937-1987.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/mathematics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematics</span></a> <a href="https://burn.capital/tags/reports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reports</span></a> <a href="https://burn.capital/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a></p>
Schneier on Security RSS<p>Improvements in Brute Force Attacks</p><p>New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”<br>... <a href="https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/improvements-in-brute-force-attacks.html</span></a></p><p> <a href="https://burn.capital/tags/academicpapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>academicpapers</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/keys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keys</span></a></p>
Schneier on Security RSS<p>Implementing Cryptography in AI Systems</p><p>Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”<br>Abstract: The wide adoption of deep neural networks (DNNs) raises the ques... <a href="https://www.schneier.com/blog/archives/2025/02/implementing-cryptography-in-ai-systems.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/02/implementing-cryptography-in-ai-systems.html</span></a></p><p> <a href="https://burn.capital/tags/academicpapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>academicpapers</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://burn.capital/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Schneier on Security RSS<p>New Advances in the Understanding of Prime Numbers</p><p>Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based publ... <a href="https://www.schneier.com/blog/archives/2024/12/new-advances-in-the-understanding-of-prime-numbers.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/12/new-advances-in-the-understanding-of-prime-numbers.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/mathematics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematics</span></a></p>
FreddyB Aviation Photography<p>what up NSA peeps. Don’t want to leave USN Group 6 out either <a href="https://sfba.social/tags/FtMeede" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FtMeede</span></a> <a href="https://sfba.social/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://sfba.social/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> <a href="https://sfba.social/tags/codes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codes</span></a> <a href="https://sfba.social/tags/nosuchagency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nosuchagency</span></a></p>
Schneier on Security RSS<p>Matthew Green on Telegram’s Encryption</p><p>Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not.... <a href="https://www.schneier.com/blog/archives/2024/08/matthew-green-on-telegrams-encryption.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/08/matthew-green-on-telegrams-encryption.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://burn.capital/tags/Telegram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telegram</span></a></p>
Schneier on Security RSS<p>On the Voynich Manuscript</p><p>Really interesting &lt;a href="<a href="https://www.theatlantic.com/magazine/archive/2024/09/decoding-voynich-manuscript/679157/?gift=YFkW3a8mqv4T0YBMneIYIuIiYZJAqQJorEylZzhFIOw&amp;utm_source=copy-link&amp;utm_medium=social&amp;utm_campaign=share&amp;fbc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theatlantic.com/magazine/archi</span><span class="invisible">ve/2024/09/decoding-voynich-manuscript/679157/?gift=YFkW3a8mqv4T0YBMneIYIuIiYZJAqQJorEylZzhFIOw&amp;utm_source=copy-link&amp;utm_medium=social&amp;utm_campaign=share&amp;fbc</span></a>... <a href="https://www.schneier.com/blog/archives/2024/08/on-the-voynich-manuscript.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/08/on-the-voynich-manuscript.html</span></a></p><p> <a href="https://burn.capital/tags/historyofcryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>historyofcryptography</span></a> <a href="https://burn.capital/tags/academicpapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>academicpapers</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a></p>
Schneier on Security RSS<p>Demo of AES GCM Misuse Problems</p><p>This is really neat demo of the security problems arising from reusing nonces with a symmetric cipher in GCM mode.... <a href="https://www.schneier.com/blog/archives/2024/06/demo-of-aes-gcm-misuse-problems.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/06/demo-of-aes-gcm-misuse-problems.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/algorithms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>algorithms</span></a> <a href="https://burn.capital/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://burn.capital/tags/AES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AES</span></a></p>
Schneier on Security RSS<p>Rare Interviews with Enigma Cryptanalyst Marian Rejewski</p><p>The Polish Embassy has posted a series of short interview segments with Marian Rejewski, the first person to crack the Enigma.<br>Details from his &lt;a href="<a href="https://www.flyingpenguin.com/?p=4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">flyingpenguin.com/?p=4</span><span class="invisible"></span></a>... <a href="https://www.schneier.com/blog/archives/2024/05/rare-interviews-with-enigma-cryptanalyst-marian-rejewski.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/05/rare-interviews-with-enigma-cryptanalyst-marian-rejewski.html</span></a></p><p> <a href="https://burn.capital/tags/historyofcryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>historyofcryptography</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a> <a href="https://burn.capital/tags/war" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>war</span></a></p>
Schneier on Security RSS<p>Ross Anderson</p><p>Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge.<br>I can’t remembe... <a href="https://www.schneier.com/blog/archives/2024/03/ross-anderson.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/03/ross-anderson.html</span></a></p><p> <a href="https://burn.capital/tags/economicsofsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>economicsofsecurity</span></a> <a href="https://burn.capital/tags/securityconferences" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityconferences</span></a> <a href="https://burn.capital/tags/securityengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityengineering</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> <a href="https://burn.capital/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://burn.capital/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Ben Royce 🇺🇦<p>Seventy seven <a href="https://mastodon.social/tags/women" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>women</span></a> <a href="https://mastodon.social/tags/BletchleyPark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BletchleyPark</span></a> codebreakers from <a href="https://mastodon.social/tags/WWII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WWII</span></a> revealed for the first time.</p><p>Many of them took the secret to their graves.</p><p>"Whenever one of the graduates, Jane Monroe – a <a href="https://mastodon.social/tags/mathematician" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematician</span></a> who worked in <a href="https://mastodon.social/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptanalysis</span></a> in Hut 6 at Bletchley Park, deciphering the coded messages sent on German Enigma machines around the clock – was asked what she did during the war, she would always say: “Oh, I made the tea.”"</p><p><a href="https://www.theguardian.com/world/2024/mar/17/cambridge-newnham-college-alumnae-bletchley-park-codebreakers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theguardian.com/world/2024/mar</span><span class="invisible">/17/cambridge-newnham-college-alumnae-bletchley-park-codebreakers</span></a></p><p><a href="https://mastodon.social/tags/womenintech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>womenintech</span></a> <a href="https://mastodon.social/tags/womenshistorymonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>womenshistorymonth</span></a></p>
MOULE :RainbowLogo:<p>A fascinating read from WIRED in 1996 about cypherpunk culture and how people around the world found the keys to decrypt seemingly impossible ciphertexts, easily decrypt the 40-bit keys in consumer-grade software, and found that NetScape used factors like date, time, and process ID as seeds to generate pseudorandom numbers to encrypt data:</p><p><a href="https://www.wired.com/1996/03/crackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">wired.com/1996/03/crackers/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.moule.world/tags/CypherPunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CypherPunk</span></a> <a href="https://mastodon.moule.world/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.moule.world/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.moule.world/tags/NetScape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScape</span></a> <a href="https://mastodon.moule.world/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.moule.world/tags/Decryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Decryption</span></a> <a href="https://mastodon.moule.world/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.moule.world/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.moule.world/tags/CryptAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CryptAnalysis</span></a> <a href="https://mastodon.moule.world/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>