The Fragility of Raw RSA: From Mathematical Elegance to Existential Forgery
Why textbook RSA preserves multiplicative structure and enables existential forgery, and how hash-then-sign and padding schemes like RSA-PSS close the gap.
Long-form writing on cryptography, formal verification, and machine learning, plus a running archive of coursework and side projects.
Why textbook RSA preserves multiplicative structure and enables existential forgery, and how hash-then-sign and padding schemes like RSA-PSS close the gap.
How Lagrange and Cauchy shape real-world DH and ECC groups, why nearly-prime cofactor curves trade purity for performance, and what Secure Scuttlebutt teaches about validation.
From Weierstrass curves and double-and-add to cofactor attacks and Dual_EC_DRBG—how subgroup geometry and implementation choices determine ECC trust boundaries.
A structured look at HNP-based key recovery, BIGNUM representation leaks, lazy resizing CVEs, and protocol-level subgroup failures in modern signature stacks.
Bridging prime-order proofs with cofactor reality: small-subgroup attacks, BIGNUM leaks, twist security, and a practical mitigation checklist for protocol engineers.
Why finite-field DLP hits a scalability wall, how ECC and Pollard rho change the cost curve, and a worked finite-field point arithmetic example on F23.
From Tamarin’s prime-order ideal to Scuttlebutt, Bluetooth P-256 invalid-point attacks, and OpenSSL lazy resize—how symbolic proofs miss implementation and protocol reality.
Discover the only mathematically unbreakable encryption method—and why its perfection makes it practically useless.
Advanced study of cryptographic systems, security protocols, and modern encryption techniques including symmetric/asymmetric encryption, hash functions, digital signatures, and public key cryptography.
Methods and techniques for verifying and validating software systems, including testing strategies, formal methods, model checking, specification analysis, and continuous verification.
General posts, updates, and content not specific to a particular course.
A comprehensive collection of Kaggle competition solutions featuring reusable Python notebooks, feature engineering patterns, cross-valid...
A working notebook — half draft, half archive. The site indexes coursework, project write-ups, and longer pieces on cryptography and verification. Source on GitHub.