Keegan Ryan

72 posts

Keegan Ryan banner
Keegan Ryan

Keegan Ryan

@inf_0_

I like breaking things. 🔑🔫 Into cryptography, embedded systems, and side channel attacks.

Katılım Ağustos 2016
156 Takip Edilen1K Takipçiler
Keegan Ryan
Keegan Ryan@inf_0_·
How many SSH servers were vulnerable to the xz backdoor? According to our measurements, there were thousands. More here: @keeganryan/112249674862415112" target="_blank" rel="nofollow noopener">infosec.exchange/@keeganryan/11…
English
0
2
11
1.3K
Keegan Ryan retweetledi
$in
$in@Sin_infosec·
If you want to revisit the "recent" attacks on Mega E2E encryption (mega-awry.io) and play the role of a malicious Mega server, I wrote a set of challenges which was released yesterday on cryptohack.org, alongside some great new challenges!have fun 🙂
English
0
25
68
5.2K
Keegan Ryan retweetledi
Ariana Mirian (@amirian@infosec.exchange)
I was relying on this app to publicize that I am defending in April! And looking for 2023 jobs! Guess I'll used...LinkedIn...now? TL;DR If you want to understand/improve security processes using data and research science methods, shoot me a note. I'll post more later if I can
English
4
35
84
0
Keegan Ryan retweetledi
MEGA
MEGA@MEGAprivacy·
If you have not updated your MEGA app or browser extension since 22 June, please do so now: New UCSD research [eprint.iacr.org/2022/914] lowers the minimum number of logins required to exploit older versions from 512 to just six. Additional information at blog.mega.io/mega-security-…
Matthew Green@matthew_d_green

“Cryptanalyzing MEGA in six queries”! This takes the recent attack on Mega, which required hundreds of login attempts, and reduces it to just six. eprint.iacr.org/2022/914

English
2
28
64
0
Keegan Ryan
Keegan Ryan@inf_0_·
@thome_emmanuel @hanno The same message is still present in that modulus, but the bit pattern is at a different offset, so it doesn't appear in the Base64 encoding. Since the correct-offset certificate was generated two minutes later, perhaps this is an artifact of testing the vanity key generator.
English
0
0
0
0
Keegan Ryan retweetledi
hanno
hanno@hanno·
Cryptography-Twitter, here's a riddle (I don't know the answer): What happened to this modulus and can you factor it? crt.sh/?id=822860928
English
1
14
27
0
Keegan Ryan
Keegan Ryan@inf_0_·
@hanno So why was this certificate created in the first place? I don't know. But the inclusion of the hidden message and the choice to make p small enough to be factored with ECM makes me think that whoever created this RSA key ultimately intended for it to be found.
English
2
1
8
0
Keegan Ryan
Keegan Ryan@inf_0_·
@hanno Emmanuel threw 640 cores at the problem, and within 10 minutes he had found the small factor. 38 decimal digits long, and short enough to fit into a single tweet: 35318511852727664658439679548374625169
English
1
1
8
0