Earlier today some folks published a paper that claims the SIMON cipher from the NSA has been broken, at least for the 32/64 variant. I've spent the last hour reading the paper, https://eprint.iacr.org/2019/474.pdf , there's some really strange things in there ...
-
-
Is this next bit basically saying that if the key size and the block size are the same, then some keys must produce identical cipher texts? Under what conditions? Obviously this is not true of a crappy block cipher that just uses the key directly as the cipher block!pic.twitter.com/omzm3BvcBJ
Show this thread -
-
O.k. so https://www.gutenberg.org/cache/epub/10/pg10.txt … is 4,452,069 bytes long, that's 556,509 64-bit blocks. Should there really be some kind of analysis of Birthday bounds?pic.twitter.com/5y4ClVDcU3
Show this thread -
There's a few other typos, it says 54-bits in one place, for example. My point with these weirdnesses isn't that they are flat-out wrong, it's that they are imprecise and missing links, and if you just broke an encryption algorithm, it's not helpful to convince the reader!
Show this thread -
Btw "Alba" is just the Scottish Gaelic word for "Scotland" ... so Alba3 means "Scotland 3". The authors claim to be in Edinburgh, but they use "ize" suffixes throughout, like "optimize".
Show this thread
End of conversation
New conversation -
-
-
I think this is just a typo. Each individual ball is uniformly distributed, but X_i (as defined) is then binomially distributed.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.