,
Jean-Philippe Aumasson

Jean-Philippe Aumasson’s Followers (19)

member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo

Jean-Philippe hasn't connected with their friends on Goodreads, yet.


Jean-Philippe Aumasson

Goodreads Author


Born
in Paris, France
Website

Twitter

Genre

Influences

Member Since
April 2024


Jean-Philippe (JP) Aumasson is cofounder and chief security officer of Taurus, a global provider of crypto asset management technology for financial institutions. He's also a cryptographer, author of the reference book Serious Cryptography, and co-designer of the algorithms BLAKE2, BLAKE3, SipHash, and MLH-DSA. He holds a PhD from EPFL, Switzerland, and gave research and outreach talks at major events such as Black Hat USA, and DEF CON. JP's work has been featured in Wire, Techcrunch, Ars Technica, Threatpost, and other major online magazines.

JP was described as a "luminary" and "well-regarded expert in crypt analysis"​ (sic) by journalists, and as "a classic cryptographer and quite an understandable of the sort".

https://aumasson.jp
https:/
...more

Average rating: 4.27 · 439 ratings · 54 reviews · 9 distinct worksSimilar authors
Serious Cryptography: A Pra...

4.29 avg rating — 381 ratings7 editions
Rate this book
Clear rating
Serious Cryptography, 2nd E...

4.26 avg rating — 27 ratings2 editions
Rate this book
Clear rating
Crypto Dictionary: 500 Tast...

4.04 avg rating — 26 ratings
Rate this book
Clear rating
The Hash Function BLAKE

by
4.50 avg rating — 2 ratings — published 2015 — 3 editions
Rate this book
Clear rating
La Cryptographie déchiffrée...

4.50 avg rating — 2 ratings
Rate this book
Clear rating
Glitches

it was ok 2.00 avg rating — 1 rating
Rate this book
Clear rating
La Cryptographie déchiffrée...

0.00 avg rating — 0 ratings
Rate this book
Clear rating
安全な暗号をどう実装するか 暗号技術の新設計思想

by
0.00 avg rating — 0 ratings
Rate this book
Clear rating
安全な暗号をどう実装するか 暗号技術の新設計思想

0.00 avg rating — 0 ratings
Rate this book
Clear rating
More books by Jean-Philippe Aumasson…

Jean-Philippe’s Recent Updates

Jean-Philippe Aumasson rated a book it was amazing
Serious Cryptography by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
La Cryptographie déchiffrée by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
暗号技術 実践活用ガイド by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
Crypto Dictionary by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
The Hash Function BLAKE by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
Serious Cryptography, 2nd Edition by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
Serious Cryptography, 2nd Edition by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
La Cryptographie déchiffrée by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
暗号技術 実践活用ガイド by Jean-Philippe Aumasson
Rate this book
Clear rating
Jean-Philippe Aumasson rated a book it was amazing
The Hash Function BLAKE by Jean-Philippe Aumasson
Rate this book
Clear rating
More of Jean-Philippe's books…
Quotes by Jean-Philippe Aumasson  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“The most common failure seen with stream ciphers is an amateur mistake: it occurs when a nonce is reused more than once with the same key. This produces identical keystreams, allowing you to break the encryption by XORing two ciphertexts together. The keystream then vanishes, and you’re left with the XOR of the two plaintexts.

For example, older versions of Microsoft Word and Excel used a unique nonce for each document, but the nonce wasn’t changed once the document was modified. As a result, the clear and encrypted text of an older version of a document could be used to decrypt later encrypted versions.”
Jean-Philippe Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption

“Each operation contributes to AES’s security in a specific way:
* Without KeyExpansion, all rounds would use the same key, K, and AES would be vulnerable to slide attacks.
* Without AddRoundKey, encryption wouldn’t depend on the key; hence, anyone could decrypt any ciphertext without the key.
* SubBytes brings nonlinear operations, which add cryptographic strength. Without it, AES would just be a large system of linear equations that is solvable using high-school algebra.
* Without ShiftRows, changes in a given column would never affect the other columns, meaning you could break AES by building four 232 element codebooks for each column. (Remember that in a secure block cipher, flipping a bit in the input should affect all the output bits.)
* Without MixColumns, changes in a byte would not affect any other bytes of the state. A chosen-plaintext attacker could then decrypt any ciphertext after storing 16 lookup tables of 256 bytes each that hold the encrypted values of each possible value of a byte.”
Jean-Philippe Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption

“Although quantum computers can in principle be built, we don’t know how hard it will be or when that might happen, if at all. And so far, it looks really hard. As of early 2017, the record holder is a machine that is able to keep 14 (fourteen!) qubits stable for only a few milliseconds, whereas we’d need to keep millions of qubits stable for weeks in order to break any crypto.”
Jean-Philippe Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption

Topics Mentioning This Author

No comments have been added yet.