-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.xml
149 lines (147 loc) · 34.1 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cryspen</title><link>https://cryspen.com/</link><description>Recent content on Cryspen</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 14 Oct 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://cryspen.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Cryspen @ VSTTE 2024</title><link>https://cryspen.com/post/vstte2024/</link><pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/vstte2024/</guid><description><p><a href="https://www.soundandcomplete.org/vstte2024.html">Verified Software: Theories, Tools, and Experiments</a>
is a conference that aims to advance the state of the art in software verification.</p></description></item><item><title>Cryspen @ Crypto 2024</title><link>https://cryspen.com/post/crypto2024/</link><pubDate>Tue, 20 Aug 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/crypto2024/</guid><description><p><a href="https://crypto.iacr.org/">Crypto</a> is the top international conference on cryptography
and is held every year (since 1981) in Santa Barbara, California. This year,
Crypto invited Karthikeyan Bhargavan, our Chief Research Scientist, to give
a talk on the use of formal methods in cryptography.</p></description></item><item><title>Formally Verified Post-Quantum Cryptography</title><link>https://cryspen.com/post/fospqc/</link><pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/fospqc/</guid><description><p>The US National Institute of Standards and Technology (NIST) <a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">just released</a> the first three standards for Post-Quantum KEMs (<a href="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf">ML-KEM</a>) and Signatures (<a href="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf">ML-DSA</a>, <a href="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf">SLH-DSA</a>). This first official publication of Post-Quantum Cryptography (PQC) standards represents a significant step forward in securing the Internet, and organizations across the globe, against the future threat of quantum computers.</p></description></item><item><title>Announcing the hax Playground</title><link>https://cryspen.com/post/announcement-playground/</link><pubDate>Wed, 14 Aug 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/announcement-playground/</guid><description><p>We&rsquo;re proud to announce the <a href="https://hax-playground.cryspen.com/">hax
playground</a>! Inspired by the
<a href="https://play.rust-lang.org/">Rust Playground</a>, the hax playground
allows you to play with hax directly in your web browser!</p></description></item><item><title>Cryspen Welcomes Maxime</title><link>https://cryspen.com/post/welcome_maxime/</link><pubDate>Tue, 06 Aug 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/welcome_maxime/</guid><description><p>We&rsquo;re thrilled to announce that Maxime Buyse has joined the Cryspen team as a Formal Verification Engineer! 🎉</p>
<p>Maxime is a whiz when it comes to formal methods, software verification, compilers, and functional programming.
His expertise will be instrumental in supercharging our tools like <a href="https://cryspen.com/hax">hax</a> and making them even easier to use.</p></description></item><item><title>High Assurance IoT PQC</title><link>https://cryspen.com/post/pqc-iot-announce/</link><pubDate>Mon, 05 Aug 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/pqc-iot-announce/</guid><description><p>Together with our sister-company <a href="https://cryptoeng.de">CryptoEng</a>, we extend our <a href="https://github.com/cryspen/libcrux">libcrux</a> cryptographic
library with support for resource constrained IoT devices.
Read <a href="https://cryptoeng.de/blog/posts/iot-pqc-announce/">their announcement here</a>.
The libcrux-iot library contains high performance, high assurance implementations of post-quantum, as well as classical, cryptographic primitives.</p></description></item><item><title>Cryspen @ FMCP 2024</title><link>https://cryspen.com/post/fmcp/</link><pubDate>Sun, 28 Jul 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/fmcp/</guid><description><p>The <a href="https://www.nist.gov">US National Institute of Standards and
Technology</a> (NIST) publishes a number of
important cryptographic standards (including upcoming ones for
post-quantum cryptography), and runs the <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program">cryptographic algorithm and
module validation
programs</a>
that validate and issue certificates to cryptographic libraries.</p></description></item><item><title>Unlocking New Possibilities</title><link>https://cryspen.com/post/hax-sandbox/</link><pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/hax-sandbox/</guid><description><p>We have been developing the <a href="https://cryspen.com/hax">hax toolchain</a> over the last two years, in collaboration with research teams at <a href="https://team.inria.fr/prosecco/">Inria</a> and the <a href="https://users-cs.au.dk/spitters/">University of Aarhus</a>.
To showcase its capabilities we have successfully applied it to <a href="https://cryspen.com/post/ml-kem-verification/">ML-KEM</a> and <a href="https://cryspen.com/post/hax-pv/">Bertie</a>.
Others are using it to create new <a href="https://eprint.iacr.org/2023/185">ground-breaking research results</a>.</p></description></item><item><title>Post-Quantum TLS in Bertie</title><link>https://cryspen.com/post/pq-bertie/</link><pubDate>Wed, 03 Jul 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/pq-bertie/</guid><description><p>The prospect of quantum computers breaking most public key encryption in use today has created the need for new schemes that can resist classical and potential quantum attackers alike. Some of these schemes, such as ML-KEM and ML-DSA, are currently in the <a href="https://csrc.nist.gov/Projects/post-quantum-cryptography">final stages of standardizations by NIST</a>. Before fully transitioning to post-quantum secure cryptography, an important first step many organizations are taking is protecting against <a href="https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later">Harvest Now Decrypt Later (HNDL) attacks</a>, where data is collected and stored today, and later decrypted once cryptanalysis improves.
Signal recently introduced <a href="https://cryspen.com/post/pqxdh/">PQXDH</a>, which protects against these attacks.
<a href="https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html">Google&rsquo;s Chrome browser is using</a> the <a href="https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html"><code>X25519Kyber768Draft00</code></a> hybrid KEM cipher suite in TLS, which combines a post-quantum secure KEM with the classical key exchange. Cloudflare, which is serving a big chunk of the internet, <a href="https://blog.cloudflare.com/post-quantum-for-all">supports it as well</a>.</p></description></item><item><title>Cryptographic protocol verification with hax</title><link>https://cryspen.com/post/hax-pv/</link><pubDate>Wed, 05 Jun 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/hax-pv/</guid><description><p>This blog post details an example of how to use our <a href="https://cryspen.com/hax">hax toolchain </a> for verifying the security of cryptographic protocol implementations written in Rust.</p></description></item><item><title>Conference Talks</title><link>https://cryspen.com/post/rwc2024/</link><pubDate>Tue, 23 Apr 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/rwc2024/</guid><description><p>Cryspen attended a number of conference in April and March. Here is a list of all slides and videos.</p>
<p><em>We will update links when more resources become available.</em></p></description></item><item><title>Post-Quantum OpenMLS</title><link>https://cryspen.com/post/pq-openmls/</link><pubDate>Thu, 11 Apr 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/pq-openmls/</guid><description><p>OpenMLS now offers security against harvest-now-decrypt-later (HNDL) quantum adversaries.</p>
<p>In <a href="https://github.com/openmls/openmls/pull/1546">#1546</a> we merged support for the <a href="https://www.ietf.org/archive/id/draft-connolly-cfrg-xwing-kem-02.html">X-Wing KEM draft</a>, which is an early draft for securely combining elliptic-curve-based Diffie-Hellman with ML-KEM. In particular, OpenMLS now supports the ciphersuite MLS_256_XWING_CHACHA20POLY1305_SHA256_Ed25519 with ciphersuite 0x004D. There is no IANA code-point for this ciphersuite yet, such that interoperability may not be guaranteed. We work with other implementers towards interoperability of this ciphersuite.</p></description></item><item><title>Post-Quantum Group Messaging</title><link>https://cryspen.com/post/pq-mls/</link><pubDate>Wed, 10 Apr 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/pq-mls/</guid><description><p>With multiple post-quantum cryptographic algorithms (<a href="https://csrc.nist.gov/pubs/fips/203/ipd">ML-KEM</a>, <a href="https://csrc.nist.gov/pubs/fips/204/ipd">ML-DSA</a>) nearing standardization, enterprises, research groups, and standards bodies have started investigating what post-quantum secure protocols should look like and what properties they should satisfy.</p></description></item><item><title>Verifying Libcrux's ML-KEM</title><link>https://cryspen.com/post/ml-kem-verification/</link><pubDate>Tue, 30 Jan 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/ml-kem-verification/</guid><description><p>In a <a href="../ml-kem-implementation/">recent blog post</a>, we described Cryspen&rsquo;s new Rust
implementation of ML-KEM in Rust, and talked about how our
high-assurance development methodology helped us find a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">new timing
bug</a>
in various other Kyber implementations.</p></description></item><item><title>Verified ML-KEM (Kyber) in Rust</title><link>https://cryspen.com/post/ml-kem-implementation/</link><pubDate>Tue, 16 Jan 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/ml-kem-implementation/</guid><description><p>ML-KEM, previously known as <a href="https://pq-crystals.org/kyber/">Kyber</a>, is the first post-quantum secure key-encapsulation mechanism (KEM) to get standardised by NIST in <a href="https://csrc.nist.gov/pubs/fips/203/ipd">FIPS 203</a>.</p>
<p>Cryspen has built <a href="https://github.com/cryspen/libcrux/tree/main/libcrux-kem">a new high assurance Rust implementation of ML-KEM</a>, using our verification framework <a href="https://cryspen.com/hax">hax</a> and <a href="https://fstar-lang.org">F*</a>. Our implementation is among the fastest portable implementations that we know of (see <a href="#performance-comparison">Performance comparison</a>), and helped uncover a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">timing bug</a> (also called <a href="https://kyberslash.cr.yp.to/">KyberSlash</a>) in various Kyber implementations that would allow an attacker to <a href="https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ldX0ThYJuBo/m/uIOqRF5BAwAJ">recover the private key</a>.</p></description></item><item><title>Welcome Jan & Lucas</title><link>https://cryspen.com/post/welcome_jan_lucas/</link><pubDate>Mon, 08 Jan 2024 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/welcome_jan_lucas/</guid><description><p>📢 Exciting News! Cryspen is thrilled to announce the addition of two exceptional minds to our team: <a href="https://lucas.franceschino.fr/">Dr. Lucas Franceschino</a> and <a href="https://github.com/keks">Jan Winkelmann</a>.</p></description></item><item><title>An Analysis of Signal's PQXDH</title><link>https://cryspen.com/post/pqxdh/</link><pubDate>Fri, 20 Oct 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/pqxdh/</guid><description><!-- _Karthikeyan Bhargavan ([Cryspen]), Charlie Jacomme ([Inria Paris](https://www.inria.fr/en/inria-paris-centre)), Franziskus Kiefer ([Cryspen]) and Rolfe Schmidt ([Signal](https://signal.org/))_ -->
<p>Signal recently <a href="https://signal.org/docs/specifications/pqxdh/">published</a> a new, post-quantum secure, version of their <a href="https://signal.org/docs/specifications/x3dh/">X3DH</a> protocol called <a href="https://signal.org/docs/specifications/pqxdh/">PQXDH</a>. As with any new cryptographic protocol, it is important to precisely analyse its security properties, especially for something as important as Signal.</p></description></item><item><title>Announcing Campus Cyber Circus Project</title><link>https://cryspen.com/post/cyber-campus-hax/</link><pubDate>Wed, 20 Sep 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/cyber-campus-hax/</guid><description><p>🎉 We&rsquo;re excited to announce that Cryspen <a href="https://ptcc.fr/projets/circus-2/">partnered</a> with <a href="https://www.inria.fr/fr">Inria</a> on a transfer project to build a new integrated development and verification environment (IDVE). The project is part of the transfer program at <a href="https://campuscyber.fr/">Campus Cyber</a>, which brings together France&rsquo;s top cybersecurity experts.</p></description></item><item><title>Specifying Oblivious Pseudonymization</title><link>https://cryspen.com/post/scrambledb/</link><pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/scrambledb/</guid><description><p>In this blog post we announce an executable specification in the
<code>hacspec</code> specification language for the <code>ScrambleDB</code> pseudonymization
system, developed by Cryspen as part of the <a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/projekte/atlas">BMBF ATLAS project</a>.</p></description></item><item><title>Internet Defense Prize 2023</title><link>https://cryspen.com/post/internet-defense-prize-2023/</link><pubDate>Mon, 14 Aug 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/internet-defense-prize-2023/</guid><description><p>At the <a href="https://www.usenix.org/conference/usenixsecurity23">32nd Usenix Security Symposium</a> in Anaheim CA, a paper on the <a href="https://cryspen.com/post/mls-introduction/">Messaging Layer Security Protocol</a>, co-authored by our founders Jonathan Protzenko and Karthikeyan Bhargavan, was awarded both the Distinguished Paper Award and the prestigious <a href="https://www.usenix.org/blog/usenix-announces-winners-2023-internet-defense-prize">Internet Defense Prize</a>.</p></description></item><item><title>Prairie and Atlas</title><link>https://cryspen.com/post/prarie-and-atlas/</link><pubDate>Wed, 09 Aug 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/prarie-and-atlas/</guid><description><p>With the widespread adoption and deployment of machine learning across enterprises,
ever-increasing amounts of data are being collected, stored, communicated,
combined, and computed over by sophisticated algorithms.
In parallel, new governmental regulations and rising concerns about privacy are
giving impetus to new research on how to protect the confidentiality, integrity
and privacy of all this data.</p></description></item><item><title>Three (thousand) may keep a secret</title><link>https://cryspen.com/post/mls-introduction/</link><pubDate>Mon, 31 Jul 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/mls-introduction/</guid><description><blockquote>
<p><em>“Three may keep a secret, if two of them are dead.”</em> - Benjamin Franklin (1735)</p>
</blockquote>
<p>However skeptical we may be of our human ability to keep secrets, we still routinely participate in group conversations that we would like to keep away from prying eyes. We exchange confidential work emails through corporate mail servers, discuss project internals on private Slacks, and exchange deeply personal information with family and friends on WhatsApp groups. The loss of this private data to malicious outsiders can result in public embarrassment, financial loss, and for vulnerable persons like journalists or activists, even threats to life and liberty.</p></description></item><item><title>MLS - RFC 9420</title><link>https://cryspen.com/post/mls-rfc-announcement/</link><pubDate>Tue, 18 Jul 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/mls-rfc-announcement/</guid><description><p><strong>✨ We are thrilled to announce the release of the MLS specification as <a href="https://datatracker.ietf.org/doc/html/rfc9420">RFC 9420</a>.</strong></p>
<p><a href="https://datatracker.ietf.org/doc/html/rfc9420">RFC 9420</a> is a comprehensive description of the first standardised, efficient, asynchronous, key establishment protocol with forward secrecy and post-compromise security for groups in size ranging from two to thousands. While Cryspen didn&rsquo;t exist back when the MLS working group was established, our co-founder Karthik played a pivotal role in designing MLS from the beginning by contributing to the original design of <a href="https://inria.hal.science/hal-02425247/file/treekem+(1).pdf">TreeKEM</a>, the basis of MLS today.</p></description></item><item><title>Welcome Jonas</title><link>https://cryspen.com/post/welcome_jonas/</link><pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/welcome_jonas/</guid><description><p>📢 Exciting News! 🚀 We are thrilled to welcome Dr. Jonas Schneider-Bensch, to the Cryspen family as our newest R&amp;D Cryptography Engineer!</p></description></item><item><title>Cryspen @ RWC 2023</title><link>https://cryspen.com/post/rwc-2023/</link><pubDate>Mon, 12 Jun 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/rwc-2023/</guid><description><p>At Real World Crypto 2023 in Tokyo, we gave a talk on the hacspec language, the hax tool, and the libcrux crypto library.</p></description></item><item><title>About Cryspen</title><link>https://cryspen.com/about/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/about/</guid><description><p>Cryspen was founded in December 2021 by Franziskus Kiefer, Karthikeyan
Bhargavan, and Jonathan Protzenko, with the goal of adapting and extending
cutting-edge formal verification tools developed at research labs like
<a href="https://www.inria.fr/">Inria</a> and applying them to commercial software development. All
three co-founders have a demonstrated track record of solving
challenging problems in high-assurance high-performance cryptographic
software development, both in research and industry.</p></description></item><item><title>Advanced Cryptographic Implementations</title><link>https://cryspen.com/advanced-crypto/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/advanced-crypto/</guid><description><p>TBD</p></description></item><item><title>Diversity, Equity, and Inclusion</title><link>https://cryspen.com/company/dei/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/company/dei/</guid><description><p>Cryspen is committed to creating a diverse, equitable, and inclusive workplace
where all employees feel valued, respected, and empowered.
This policy outlines our commitment to fostering a positive and productive work
environment that celebrates differences and promotes equal opportunities for all.</p></description></item><item><title>HACL</title><link>https://cryspen.com/hacl/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/hacl/</guid><description><p>HACL is a set of formally verified cryptographic libraries in C, JavaScript, OCaml, and Rust.
The libraries are based on the <a href="https://github.com/hacl-star/hacl-star">HACL*</a> <a href="https://project-everest.github.io/">research project</a>, originally developed by Inria
and Microsoft Research.</p></description></item><item><title>hacspec</title><link>https://cryspen.com/hacspec/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/hacspec/</guid><description><p><a href="https://hacspec.org">hacspec</a> is a language and framework for writing succinct, executable, formally
verifiable specifications for cryptographic components.</p>
<p>Syntactically, hacspec is a purely functional subset of Rust that aims to be
readable by developers, cryptographers, and verification experts.
An application developer can use hacspec to specify and prototype cryptographic
components in Rust, and then replace this specification with a verified
implementation before deployment.</p></description></item><item><title>High Assurance Software Toolchain</title><link>https://cryspen.com/circus/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/circus/</guid><description><p>Cryspen collaborates with the Prosecco team at Inria to develop a usable, robust,
development environment and verification toolchain for security critical software.</p></description></item><item><title>High Assurance Software Toolchain</title><link>https://cryspen.com/hax/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/hax/</guid><description><p>With hax, you can achieve a new level of confidence in the safety, security, and reliability of your software.</p>
<svg xmlns="http://www.w3.org/2000/svg" style="display: none">
<symbol id="check-circle-fill" fill="currentColor" viewBox="0 0 16 16">
<path
d="M16 8A8 8 0 1 1 0 8a8 8 0 0 1 16 0zm-3.97-3.03a.75.75 0 0 0-1.08.022L7.477 9.417 5.384 7.323a.75.75 0 0 0-1.06 1.06L6.97 11.03a.75.75 0 0 0 1.079-.02l3.992-4.99a.75.75 0 0 0-.01-1.05z"
/>
</symbol>
<symbol id="info-fill" fill="currentColor" viewBox="0 0 16 16">
<path
d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm.93-9.412-1 4.705c-.07.34.029.533.304.533.194 0 .487-.07.686-.246l-.088.416c-.287.346-.92.598-1.465.598-.703 0-1.002-.422-.808-1.319l.738-3.468c.064-.293.006-.399-.287-.47l-.451-.081.082-.381 2.29-.287zM8 5.5a1 1 0 1 1 0-2 1 1 0 0 1 0 2z"
/>
</symbol>
<symbol
id="exclamation-triangle-fill"
fill="currentColor"
viewBox="0 0 16 16"
>
<path
d="M8.982 1.566a1.13 1.13 0 0 0-1.96 0L.165 13.233c-.457.778.091 1.767.98 1.767h13.713c.889 0 1.438-.99.98-1.767L8.982 1.566zM8 5c.535 0 .954.462.9.995l-.35 3.507a.552.552 0 0 1-1.1 0L7.1 5.995A.905.905 0 0 1 8 5zm.002 6a1 1 0 1 1 0 2 1 1 0 0 1 0-2z"
/>
</symbol>
</svg>
<div
class="alert d-flex align-items-center justify-content-centeer text-center"
role="alert"
>
<svg
class="bi flex-shrink-0 me-2"
width="24"
height="24"
role="img"
aria-label="Info:"
>
<use xlink:href="#info-fill" />
</svg>
<div class="text-center"><a href="https://hax-playground.cryspen.com/">Try it online</a></div>
</div>
<p><strong>Key benefits of Hax:</strong></p></description></item><item><title>How we Work</title><link>https://cryspen.com/work/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/work/</guid><description><p>Cryspen is a boutique development and consulting studio focused on bringing state-of-the-art privacy and cryptography solutions to customers, using cutting-edge formal methods. We closely collaborate with research groups at Inria and elsewhere to help them improve their research software analysis tools and apply them to industrial design and software development.</p></description></item><item><title>HPKE</title><link>https://cryspen.com/hpke/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/hpke/</guid><description><p>HPKE is scheme provides a variant of public-key encryption of arbitrary-sized
plaintexts for a recipient public key.
It includes three authenticated variants, including one which authenticates
possession of a pre-shared key, and two optional ones which authenticate
possession of a KEM private key.
HPKE works for any combination of an asymmetric key encapsulation mechanism (KEM), key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function.
Some authenticated variants may not be supported by all KEMs.
We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman key agreement, HKDF, and SHA2.</p></description></item><item><title>Impressum</title><link>https://cryspen.com/imprint/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/imprint/</guid><description><p>Company Name: Cryspen Sarl</p>
<p>Registered Office: 149 Avenue du Maine, 75014 Paris, France</p>
<p>Email: <a href="info@cryspen.com">info@cryspen.com</a></p>
<p>Managing Director: Franziskus Kiefer</p>
<p>Registration Number: <a href="https://annuaire-entreprises.data.gouv.fr/entreprise/cryspen-908684848">908 684 848 R.C.S. Paris</a></p></description></item><item><title>Jobs</title><link>https://cryspen.com/jobs/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/jobs/</guid><description><div id="join-widget">
<script
defer
type="text/javascript"
data-mount-in="#join-widget"
src="https://join.com/api/widget/bundle/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.x-Zdbbs8_ht6hYNS3DQs6UcLlN2mVps_eFaPGJU4vwU"
></script>
</div></description></item><item><title>libcrux</title><link>https://cryspen.com/libcrux/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/libcrux/</guid><description><p>Libcrux is a formally verified cryptographic library that brings together verified
artifacts from different sources. It uses <a href="https://cryspen.com/hacspec/">hacspec</a>
as a common language for the specifications underlying the correctness and security
proofs. Libcrux is written in Rust, a modern programming language that is known
for its safety and performance. Underneath, it uses verified Rust, C, and Assembly code.</p></description></item><item><title>OpenMLS</title><link>https://cryspen.com/openmls/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/openmls/</guid><description><p>Messaging Layer Security (MLS) is a security layer for end-to-end encrypting
communication in large dynamic groups.
It has been specified by the <a href="https://datatracker.ietf.org/wg/mls/about/">IETF MLS working group</a> and designed to be efficient,
practical and secure.</p></description></item><item><title>Post Quantum Transition</title><link>https://cryspen.com/pq/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/pq/</guid><description><p>As the threat of quantum computing grows, businesses and organizations need to start planning for the post quantum transition. This means migrating their processes and applications to use post quantum cryptography, which is resistant to attacks by quantum computers.</p></description></item><item><title>Secure Group Communication</title><link>https://cryspen.com/mls/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/mls/</guid><description><p>With new regulations like the Digital Market Act, companies now have to embrace interoperability, especially when it comes to communications and messaging. The new standard that the industry is converging on is the IETF MLS protocol. We are experts in MLS and have contributed a formal security analysis, reference implementation, and improvements to the standard. We help maintain <a href="https://cryspen.com/openmls">OpenMLS</a>, a flagship Rust implementation of MLS.</p></description></item><item><title>Verify your Security</title><link>https://cryspen.com/prove/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>https://cryspen.com/prove/</guid><description><p>Security protocols and constructions are pervasive. Some are well-known, like TLS; but your organization may be using custom security mechanisms for identity management, key propagation, secure storage… Having complete confidence in such a design requires an in-depth security analysis that covers side-channels, cryptographic design, and software design. Only specialists can perform an analysis that covers all of these.</p></description></item><item><title>HACL Packages v0.6</title><link>https://cryspen.com/post/hacl-0_6/</link><pubDate>Mon, 07 Nov 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/hacl-0_6/</guid><description><blockquote>
<p>Today, we announce the first release of the HACL Packages libraries. 🎉</p>
</blockquote>
<p>This release of HACL packages includes the first release of the <a href="https://github.com/cryspen/hacl-packages/releases/tag/c-v0.6.0">HACL C library</a>
and a new release of the <a href="https://opam.ocaml.org/packages/hacl-star/">hacl-star OCaml</a> bindings.</p></description></item><item><title>OpenMLS</title><link>https://cryspen.com/post/hello-openmls/</link><pubDate>Wed, 19 Oct 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/hello-openmls/</guid><description><p>We have joined forces with our friends from <a href="https://phnx.im/">Phoenix R&amp;D</a> to improve OpenMLS.</p>
<p>The <a href="https://messaginglayersecurity.rocks/mls-protocol/draft-ietf-mls-protocol.html">MLS protocol</a> draft is in the IETF working group&rsquo;s <a href="https://mailarchive.ietf.org/arch/msg/mls/bOhxmpo70T-ikDd40OqQfst64gE/">last call</a> and is thus
on track to become an RFC soon.
We want to make sure that OpenMLS is ready for wider adoption by the time the
RFC is ready.
To achieve this we start by catching up with all the changes to the protocol
(up to the current draft-16), improving test coverage of the code, and working
towards a more comprehensive test framework for interoperability.</p></description></item><item><title>HACL Packages</title><link>https://cryspen.com/post/introducing-hacl-packages/</link><pubDate>Tue, 07 Jun 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/introducing-hacl-packages/</guid><description><p>Earlier this year, <a href="https://tezos.foundation/">Tezos</a> and <a href="https://www.nomadic-labs.com/">Nomadic Labs</a> started to work with Cryspen to
improve <a href="https://hacl-star.github.io/">HACL*</a> and ensure that it is a viable long-term solution for Tezos'
cryptographic needs.
HACL is a set of high assurance cryptographic primitives used by Tezos for most
of its cryptography.</p></description></item><item><title>What is High Assurance Cryptography?</title><link>https://cryspen.com/post/high-assurance-cryptography-1/</link><pubDate>Mon, 02 May 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/high-assurance-cryptography-1/</guid><description><p><a href="https://www.cryspen.com">Cryspen</a> builds high assurance cryptography.
But what does this actually mean?</p>
<p>Before focusing on cryptography it is interesting to look at high assurance
software in general.
How is high assurance software different from other software?</p></description></item><item><title>An Executable HPKE Specification</title><link>https://cryspen.com/post/hpke_spec/</link><pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/hpke_spec/</guid><description><p><a href="https://datatracker.ietf.org/doc/draft-irtf-cfrg-hpke/">HPKE</a>, published as <a href="https://datatracker.ietf.org/doc/draft-irtf-cfrg-hpke/">RFC 9180</a>, describes a scheme for hybrid public key encryption.</p>
<blockquote>
<p>📚 Read our <a href="https://cryspen.com/post/tldr-hpke/">TL;DR on HPKE</a> if you need more background on HPKE.</p></description></item><item><title>TL;DR - Hybrid Public Key Encryption</title><link>https://cryspen.com/post/tldr-hpke/</link><pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/tldr-hpke/</guid><description><p><a href="https://datatracker.ietf.org/doc/draft-irtf-cfrg-hpke/">HPKE</a>, defined in <a href="https://www.rfc-editor.org/rfc/rfc9180.html">RFC 9180</a>, is a <a href="https://datatracker.ietf.org/rg/cfrg/about/">CFRG</a> standard that describes a scheme for hybrid public key encryption.
It is co-authored by my <a href="https://www.cryspen.com">Cryspen</a> co-founder <a href="https://bhargavan.info/index.html">Karthikeyan Bhargavan</a> and one of
his PhD students <a href="https://www.benjaminlipp.de">Benjamin Lipp</a> as part of his research at <a href="https://team.inria.fr/prosecco">Inria</a>.</p></description></item><item><title>Cryspen ERC PoC Grant</title><link>https://cryspen.com/post/erc-poc/</link><pubDate>Thu, 10 Feb 2022 00:00:00 +0000</pubDate><guid>https://cryspen.com/post/erc-poc/</guid><description><p>Cryspen co-founder <a href="https://bhargavan.info/">Karthik Bhargavan</a> got awarded an <a href="https://erc.europa.eu/funding/proof-concept">ERC Proof of Concept grant</a> for
commercialising the know-how and landmark research results from his Inria
research group <a href="https://team.inria.fr/prosecco/">PROSECCO</a> through Cryspen.</p></description></item></channel></rss>