Invalid curve attacks, explained
Look ma, I found a fellow donut lover! If you don't understand what we were talking about, don't worry, very few do. The only thing you should remember is the Internet runs on donuts. Google, Facebook, WhatsApp, Instagram, Amazon, or even Bitcoin all run on donuts. If you're a student like J., you want to study donuts. If you aren't, you also want to study donuts 'cause they're eating the world! -- On Wed, Sep 26, 2018 at 6:34 PM <removed> wrote: Subject: Re: https://twitter.com/XorNinja/status/1021786823524110336 Sir, undergraduate computer science student and cryptography dilettante here. I seek your unsolicited direction--my apologies--I don't have a twitter account. I am referencing https://twitter.com/XorNinja/status/1021786823524110336 . I have implemented cryptopals 57/58 and have begun to understand small subgroup attacks on DH and invalid curve attacks on ECDH. Now, I am studying kb.cert.org/vuls/id/304725 / CVE-2018-5383.