The Strange Tale of Dual_EC_DRBG

Julian Assange being arrested recently brought back memories of how he leaked Edward Snowden’s memos around the possible existence of an NSA-sourced cryptographic backdoor — the Dual EC standard (Dual_EC_DRBG). So let’s dive into the method and the trap door, and see the “magic” behind it.

With Elliptic Curve methods, we take an elliptic curve (y²=x³+ax+b), and then use a base point (G). Next we generate a…

--

--

--

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Sunday Read: Whistleblowers Can Help Stop Russian Invasion of Ukraine.

Attrace IDO on MISO & SushiSwap

Your password is never good enough

Neon Proxy: Facilitating Seamless Transactions on Neon EVM

What is payment tokenization?

In Post-Quantum Crypto, What Is ℤ[X]/(Xn+1)?

{UPDATE} Which Pics Quiz 4 Pics 1 Word Hack Free Resources Generator

{UPDATE} 英文字母 Abc 容易畫著色書教育遊戲的孩子們 Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

The Strange Tail of Nelson Mandela, The NSA and A Backdoor Cipher

Towards Web3: Ed25519, Ed448 and Ed2551-Dilithium

How To Crack The Near Impossible When There’s a Weakness … Meet Fermat’s Attack on RSA