Related: I recently gave a talk about crypto backdooring, at NoSuchCon last week, slides are available at https://131002.net/data/talks/backdooring_nsc14.pdf
On Wed, Nov 26, 2014 at 6:04 PM, ianG <i...@iang.org> wrote: > http://underhandedcrypto.com/rules/ > > The Underhanded Crypto contest was inspired by the famous Underhanded C > Contest, which is a contest for producing C programs that look correct, yet > are flawed in some subtle way that makes them behave inappropriately. This > is a great model for demonstrating how hard code review is, and how easy it > is to slip in a backdoor even when smart people are paying attention. > > We’d like to do the same for cryptography. We want to see if you can design > a cryptosystem that looks secure to experts, yet is backdoored or vulnerable > in a subtle barely-noticable way. Can you design an encrypted chat protocol > that looks secure to everyone who reviews it, but in reality lets anyone who > knows some fixed key decrypt the messages? > > We’re also interested in clever ways to weaken existing crypto programs. Can > you make a change to the OpenSSL library that looks like you’re improving > the random number generator, but actually breaks it and makes it produce > predictable output? > > If either of those things sound interesting, then this is the contest for > you. > _______________________________________________ > cryptography mailing list > cryptography@randombit.net > http://lists.randombit.net/mailman/listinfo/cryptography _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography