Home
Quantumly Confused
Cancel

Building My Own Cryptographic Badge Add-on - NSEC 2024

Building My Own Cryptographic Badge Add-on - NSEC 2024

This blog post goes through the custom build of the NSEC 2024 badge Phospholipid addon. As part of the CTF, for successfully dumping the addon's flash, a set of raw components was provided to build our own version. This will cover the journey to get the cryptographic coprocessor working with the original NSEC badge.

NSEC 2024 - Badge Addon - Phospholipid

NSEC 2024 - Badge Addon - Phospholipid

This blog post provides a detailed walkthrough of the NSEC 2024 hardware badge addon (Phospholipid) track, diving into the intricacies of the W25Q64JV chip and memory protection, and working with the ATECC608B cryptographic chip to solve a Elliptic Curve Diffie-Hellman (ECDH) challenge.

Building a Production-Grade Minecraft Cloud Infrastructure

Building a Production-Grade Minecraft Cloud Infrastructure

Journey of building a production-grade Minecraft server in the cloud, including management, monitoring, and observability - all for free!

Post-Quantum Cryptography - Practical Kyber Experimentation

Post-Quantum Cryptography - Practical Kyber Experimentation

Continuing down the rabbit hole of PQC investigating the Kyber implementation more directly, then using experimental branches of common tooling to explore practical implementation of post-quantum cryptography.

Post-Quantum Cryptography - Standardization and Summarization

Post-Quantum Cryptography - Standardization and Summarization

A post going over the current post-quantum cryptography landscape, including the current NIST standardization efforts and the underlying mathematical approaches to selected algorithms. This second post in the PQC series sets the groundwork for the practical exploration using experimental branches in the upcoming third post.

Post-Quantum Cryptography - Shor's Algorithm in Action

Post-Quantum Cryptography - Shor's Algorithm in Action

A post going over the theoretical implementation of Shor's algorithm as well as covering a previous Qiskit challenge that involved practically implementing Shor's to factor the number 35. This will lay the groundwork to further posts exploring the need for post-quantum cryptography and implementations so far.