Internship Position on the Lattice Estimator martinralbrecht.wordpress.com/2025/08/27/i...
27.08.2025 13:50 — 👍 2 🔁 2 💬 0 📌 0@malb.bsky.social
Cryptography Professor at King's College London and Principal Research Scientist at SandboxAQ. Erdős–Bacon Number: 6. He/him or they/them. https://malb.io
Internship Position on the Lattice Estimator martinralbrecht.wordpress.com/2025/08/27/i...
27.08.2025 13:50 — 👍 2 🔁 2 💬 0 📌 0New ethnographic work with @rikkebjerg.bsky.social and @malb.bsky.social on information security in the UK climate movement -- accepted and presented recently at USENIX Security ’25 in Seattle 🌱 www.usenix.org/conference/u...
26.08.2025 14:23 — 👍 1 🔁 1 💬 0 📌 0We are recruiting for at Postdoc Position in Lattice-Based Cryptography at King's College London martinralbrecht.wordpress.com/2025/08/24/p...
25.08.2025 09:54 — 👍 8 🔁 5 💬 0 📌 0Screenshot of https://uk-crypto-day.github.io/2025/09/11/uk-crypto-day/ with text: Rikke Bjerg Jensen & Martin Albrecht: At-Compromise Security: The Case for Alert Blindness We start from the observation (Blanchette’12) that cryptography broadly intuits security goals – as modelled in games or ideal functionalities – while claiming realism. This stands in contrast to cryptography’s attentive approach towards examining assumptions and constructions through cryptanalysis and reductions. To close this gap, we introduce a technique for determining security goals. Given that games and ideal functionalities model specific social relations between various honest and adversarial parties, our approach is grounded in a careful social science methodology for studying social relations in their contexts: ethnography. As a first application of this technique, we study security at-compromise (neither pre- nor post-) and introduce the security goal of alert blindness. Specifically, as observed in our 2024/2025 ethnographic fieldwork with protesters in Kenya, alert blindness captures a security goal of abducted persons who were taken by Kenyan security forces for their presumed activism. It may have applications elsewhere. Joint work with Simone Colombo and Benjamin Dowling. See also: Social Foundations of Cryptography Bios. Rikke Bjerg Jensen is a Professor in the Information Security Group at Royal Holloway, University of London. Her work is ethnographic and grounded in explorations of information security practices and needs among groups of people living and working at the margins of societies. Martin Albrecht is a Professor of Cryptography at King’s College London. He works broadly across the field of cryptography but focuses on the analysis of deployed or soon-to-be deployed cryptographic solutions and on analysing the security of lattice-based cryptography against classical and quantum computers.
11 Sep UK Crypto Day in Manchester: uk-crypto-day.github.io/2025/09/11/u...
Together with @rikkebjerg.bsky.social I'll be talking about our upcoming work with @bedow.bsky.social and Simone Colombo: At-Compromise Security: The Case for Alert Blindness
Slides of my talk titled "Lattices give us KEMs and FHE, but where are the efficient lattice PETs? -- By Example of (Verifiable) Oblivious PRFs" given at spiqe-workshop.github.io are here: github.com/malb/talks/b...
Thanks @kennyog.bsky.social and @jurajsomorovsky.bsky.social for inviting me.
Abstract. The Unbalanced Oil and Vinegar construction (UOV) has been the backbone of multivariate cryptography since the fall of HFE-based schemes. In fact, 7 UOV-based schemes have been submitted to the NIST additional call for signatures, and 4 of these made it to the second round. For efficiency considerations, most of these schemes are defined over a field of characteristic 2. This has as a side effect that the polar forms of the UOV public maps are not only symmetric, but also alternating. In this work, we propose a new key-recovery attack on UOV in characteristic 2 that makes use of this property. We consider the polar forms of the UOV public maps as elements of the exterior algebra. We show that these are contained in a certain subspace of the second exterior power that is dependent on the oil space. This allows us to define relations between the polar forms and the image of the dual of the oil space under the Plücker embedding. With this, we can recover the secret oil space using sparse linear algebra. This new attack has an improved complexity over previous methods and reduces the security by 4, 11, and 20 bits for uov-Ip, uov-III, and uov-V, respectively. Furthermore, the attack is applicable to MAYO₂ and improves on the best attack by 28 bits.
Image showing part 2 of abstract.
Wedges, oil, and vinegar – An analysis of UOV in characteristic 2 (Lars Ran) ia.cr/2025/1143
19.06.2025 00:26 — 👍 6 🔁 4 💬 0 📌 1A chart for quantum computers, of number of qubits versus error rate, on a logarithmic scale. Broadly it shows a large gap between current quantum computers in the bottom left, and a curve in the top right of the resources they need to break RSA.
An out-of-schedule update to my quantum landscape chart: sam-jaques.appspot.com/quantum_land..., prompted by
@craiggidney.bsky.social 's new paper: arxiv.org/abs/2505.15917.
A startling jump (20x) in how easy quantum factoring can be!
Also: much improved web design!
New blog post on our (with @rikkebjerg.bsky.social and @mikaelabrough.bsky.social) USENIX'25 paper "On the Virtues of Information Security in the UK Climate Movement" where I end up reflecting on writing this, for me, unusual work.
martinralbrecht.wordpress.com/2025/06/14/o...
Eamonn and I received a Zama Cryptanalysis Grant to help with the lattice estimator github.com/malb/lattice.... We hope to hire interns to work on the estimator over two periods over the next 18 months.
Zama are still taking applications for this grant, see here: www.zama.ai/post/announc...
10 June: Jean-François Blanchette Talk and Discussion on "Burdens of Proof" in London
martinralbrecht.wordpress.com/2025/04/15/1...
Isn't the answer mostly Heartbleed?
15.05.2025 10:09 — 👍 0 🔁 0 💬 1 📌 0Ooh -- also: The "More is Less" paper (eprint.iacr.org/2017/713 ) pointed out this group membership issue with WhatsApp in 2017 -- almost 8 years ago!
08.05.2025 22:05 — 👍 10 🔁 2 💬 0 📌 0Dan wrote a nice thread about our work on WhatsApp presented at Eurocrypt earlier today and discussed in @dangoodin.bsky.social's article linked below.
08.05.2025 22:07 — 👍 1 🔁 0 💬 0 📌 0... who have to constantly monitor the UI for changes to the member list. And it is a burden that is unnecessary: Signal deploys cryptographic control of group membership at scale, for example. Thanks @dangoodin.bsky.social for your coverage of our work in this piece: arstechnica.com/security/202...
08.05.2025 21:59 — 👍 8 🔁 3 💬 1 📌 0How does WhatsApp implement encrypted group chats? And are they secure? @malb.bsky.social, @bedow.bsky.social and myself were keen to figure this out. After two years of reverse-engineering, analysis and a few too many proofs, I presented our work at Eurocrypt earlier today. So, what did we learn?
08.05.2025 21:59 — 👍 30 🔁 15 💬 1 📌 1This is cool heimberger.xyz/oprfs.html
08.05.2025 07:52 — 👍 14 🔁 6 💬 0 📌 0Just about ready to set off to Madrid for #eurocrypt 2025, where I’ll have the great honour of giving the 2025 IACR Distinguished Lecture on Tuesday afternoon. #iacr #cryptography
04.05.2025 11:36 — 👍 30 🔁 3 💬 2 📌 1Abstract. WhatsApp provides end-to-end encrypted messaging to over two billion users. However, due to a lack of public documentation and source code, the specific security guarantees it provides are unclear. Seeking to rectify this situation, we combine the limited public documentation with information we gather through reverse-engineering its implementation to provide a formal description of the subset of WhatsApp that provides multi-device group messaging. We utilise this description to state and prove the security guarantees that this subset of WhatsApp provides. Our analysis is performed within a variant of the Device-Oriented Group Messaging model, which we extend to support device revocation. We discuss how to interpret these results, including the security WhatsApp provides as well as its limitations.
Formal Analysis of Multi-Device Group Messaging in WhatsApp (Martin R. Albrecht, Benjamin Dowling, Daniel Jones) ia.cr/2025/794
05.05.2025 02:04 — 👍 8 🔁 2 💬 0 📌 0Okay, this is fun github.com/Jacksaur/Gor... I like the DOOM one.
04.05.2025 09:35 — 👍 3 🔁 0 💬 0 📌 0A paragraph from Boaz Barak's recent NY Times op-ed: 'You might think I can avoid politics in the classroom only because I am a computer scientist. This is not the case. Faculty members who are determined enough can inject politics into any topic, and after all, computer science has brought huge and significant changes to society. The interaction of computer science and policy sometimes arises in my classes, and I make sure to present multiple perspectives. When I teach cryptography, a topic at the heart of the tension between privacy and security, I share with my students writings by former National Security Agency officials as well as "The Crypto Anarchist Manifesto."'
We teach a broad range of political perspectives here at Harvard... ranging from those of *checks notes*... center-right military officials to... *squints* ultra-right market absolutists, and you should be more grateful for that.
03.05.2025 15:37 — 👍 8 🔁 3 💬 0 📌 0The idea that you can just “teach computer science” and be apolitical is a beautiful dream that expired in the 2000s, at the latest. Computer science has re-organized every facet of our society: it is inherently political. Instead of taking this idea seriously, we ran from it. Now we live in hell.
03.05.2025 15:27 — 👍 239 🔁 60 💬 5 📌 8Day two of the strike, and we've ben getting a lot of questions from students about the action. What's it for, why are we doing it now, and how can they help.
So let's run through some Strike Questions! 🧵
If someone is up for helping with some bitrot in FPLLL, FPyLLL and G6K, that'd be nice.
- github.com/fplll/fplll/...
- github.com/fplll/fplll/...
- github.com/fplll/fpylll...
NCSC-née-GCHQ have a whitepaper on FHE, PIR, MPC, ZK, PSI and ABE out: www.ncsc.gov.uk/whitepaper/a...
28.04.2025 13:46 — 👍 13 🔁 6 💬 0 📌 0There’s just so much shady shit in this story, but this really sticks out. Folks in NLRB’s IT unit were so freaked out by what they saw DOGE doing that they wanted to notify the Cybersecurity and Infrastructure Security Agency. Then this happened:
15.04.2025 13:04 — 👍 8029 🔁 3790 💬 161 📌 275Website excerpt: Here, the authors consider a whistleblower setting which then motivates the definition of ring signatures. Thus, a ring signature claims to be at least also a formalisation of the social setting in which a member of a group wishes to alert outsides to something without revealing themselves while still convincing the outsider that they have access to the information being leaked. Put differently, cryptography presumes and models social relations. As such, cryptography is also a social science. However, cryptography is unaware of itself as a social science and we cryptographers more or less speculatively make up the social settings we model in our paper’s introductions. I highly recommend Jean-François Blanchette’s “Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents” for a deeper dive into this observation. This begs the question if cryptography gets that part of its models right? In general, we work hard to have precise definitions and definitional work is a central activity of cryptography. Yet, the correctness of this part of the definitional work is usually simply presumed: “On these questions, the literature remains silent” as Blanchette put it.
Here's a previous take on said book from social-foundations-of-cryptography.gitlab.io/2024/06/12/p...
15.04.2025 19:14 — 👍 4 🔁 1 💬 0 📌 010 June: Jean-François Blanchette Talk and Discussion on "Burdens of Proof" in London
martinralbrecht.wordpress.com/2025/04/15/1...
Article extract: From what he could see, the data leaving, almost all text files, added up to around 10 gigabytes — or the equivalent of a full stack of encyclopedias if someone printed them, he explained. It's a sizable chunk of the total data in the NLRB system, though the agency itself hosts over 10 terabytes in historical data. It's unclear which files were copied and removed or whether they were consolidated and compressed, which could mean even more data was exfiltrated. It's also possible that DOGE ran queries looking for specific files in the NLRB's system and took only what it was looking for, according to the disclosure.
Article extract: It houses information about ongoing contested labor cases, lists of union activists, internal case notes, personal information from Social Security numbers to home addresses, proprietary corporate data and more information that never gets published openly.
This long read is quite something: www.npr.org/2025/04/15/n...
15.04.2025 19:01 — 👍 1 🔁 0 💬 0 📌 0Meanwhile, S&P is held in a month in San Francisco and there seems to be no plan to switch to hybrid. We've entered the reign of the arbitrary, *everybody* is affected.
14.04.2025 06:27 — 👍 36 🔁 13 💬 1 📌 1