<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 12:17:38 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Cryptanalysis”</title>
    <link>https://cryptography.fireside.fm/tags/cryptanalysis</link>
    <pubDate>Tue, 20 Jul 2021 16:00:00 +0200</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!</title>
  <link>https://cryptography.fireside.fm/20</link>
  <guid isPermaLink="false">b60866a9-b2e2-4f18-afa5-9e85ed75887d</guid>
  <pubDate>Tue, 20 Jul 2021 16:00:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/b60866a9-b2e2-4f18-afa5-9e85ed75887d.mp3" length="61829664" type="audio/mpeg"/>
  <itunes:episode>20</itunes:episode>
  <itunes:title>Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Were GPRS's encryption ciphers deliberately backdoored? Nadim discusses this question with cryptanalysts Gaëtan Leurent and Håvard Raddum.</itunes:subtitle>
  <itunes:duration>42:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 (https://eprint.iacr.org/2021/819)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Gaëtan Leurent and Håvard Raddum.
</description>
  <itunes:keywords>gprs,cryptanalysis</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.</p>

<ul>
<li><a href="https://eprint.iacr.org/2021/819" rel="nofollow">Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Gaëtan Leurent and Håvard Raddum.</p><p>Links:</p><ul><li><a title="Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2" rel="nofollow" href="https://eprint.iacr.org/2021/819">Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design.</p>

<ul>
<li><a href="https://eprint.iacr.org/2021/819" rel="nofollow">Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Gaëtan Leurent and Håvard Raddum.</p><p>Links:</p><ul><li><a title="Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2" rel="nofollow" href="https://eprint.iacr.org/2021/819">Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 2: Breaking Lightweight Symmetric Cryptography!</title>
  <link>https://cryptography.fireside.fm/2</link>
  <guid isPermaLink="false">c92ef410-d45c-4ab4-977e-c4bacff9ed30</guid>
  <pubDate>Tue, 06 Oct 2020 16:00:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/c92ef410-d45c-4ab4-977e-c4bacff9ed30.mp3" length="76465687" type="audio/mpeg"/>
  <itunes:episode>2</itunes:episode>
  <itunes:title>Episode 2: Breaking Lightweight Symmetric Cryptography!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Léo Perrin talks about how his team at INRIA was able to find serious breaks in the Gimli family of lightweight symmetric primitives, and why NIST's lightweight cryptography competition even matters in the first place, especially with block ciphers like AES dominating the industry.</itunes:subtitle>
  <itunes:duration>34:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.
Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.
In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.
But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?
Links and papers discussed in the show:
* New results on Gimli: full-permutation distinguishers and improved collisions (https://eprint.iacr.org/2020/744)
* Lower Bounds on the Degree of Block Ciphers (https://eprint.iacr.org/2020/1051)
* Saturnin lightweight cryptography (https://project.inria.fr/saturnin/)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Léo Perrin.
</description>
  <itunes:keywords>cryptanalysis,gimli</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.</p>

<p>Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.</p>

<p>In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.</p>

<p>But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2020/744" rel="nofollow">New results on Gimli: full-permutation distinguishers and improved collisions</a></li>
<li><a href="https://eprint.iacr.org/2020/1051" rel="nofollow">Lower Bounds on the Degree of Block Ciphers</a></li>
<li><a href="https://project.inria.fr/saturnin/" rel="nofollow">Saturnin lightweight cryptography</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Léo Perrin.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash functions and authenticated encryption ciphers, that work in use cases where even AES is not an adequately speedy standard.</p>

<p>Among the submissions to NIST’s lightweight cryptography competition has been Gimli, a family of cryptographic primitives comprised of a hash function and of an authenticated encryption with associated data (AEAD) cipher. Named after the Lord of the Rings Dwarf warrior and authored by a long list of accomplished cryptographers, Gimli looked like a promising submission -- until a team of cryptanalysts at INRIA produced a surprising set of results outlining some potentially serious weaknesses in Gimli’s current design.</p>

<p>In their paper, which recently was declared as the winner of the IACR Asiacrypt 2020 Best Paper Award, Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher and Ferdinand Sibleyras from the INRIA research institute here in France presented some very strong results against Gimli’s security.</p>

<p>But why does Gimli even matter? Why aren’t AES, ChaCha20-Poly1305, and BLAKE2 enough, even for the most performance-constrained scenarios? And how did this team of researchers succeed in obtaining such serious results on a family of cryptographic primitives that was certainly designed with care and expertise?</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2020/744" rel="nofollow">New results on Gimli: full-permutation distinguishers and improved collisions</a></li>
<li><a href="https://eprint.iacr.org/2020/1051" rel="nofollow">Lower Bounds on the Degree of Block Ciphers</a></li>
<li><a href="https://project.inria.fr/saturnin/" rel="nofollow">Saturnin lightweight cryptography</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Léo Perrin.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
