[Cryptography] Curated Cryptology Compendium

Tony Patti crypto at glassblower.info
Sat Jan 31 10:37:09 EST 2026


Thank you both Steven and Jason, I have added all five of your references about NIST’s Dual EC pseudorandom number generator at:

https://cryptosystemsjournal.com/curated-cryptology-compendium.html#dual-ec-drbg

 

Also thanks to Ralf Senderek for recommended adding: “Security Engineering”, a Turing Award Lecture, and a Dan Boneh paper.

 

Our compendium has now grown to 410 downloadable PDF’s (29,123 pages) & more.

https://cryptosystemsjournal.com/curated-cryptology-compendium.html

 

For those who have not yet visited, the Table of Contents contains these sections:

 


Highly Recommended

Foundational Papers

Mathematical Cryptography

Cryptanalysis & Attack Methodologies

Dual EC pseudorandom number generator

Randomness, Entropy, and Statistical Testing

Zero-Knowledge Proofs & Interactive Systems

Side-Channel Analysis & Hardware Attacks

Secret Sharing: The Threshold of Trust

Steganography & Covert Communications

Network Anonymity & Traffic Analysis

First Crypto War (1977-1999)

Bletchley Park WWII Reports 

NSA Modern Publications

NSA Declassified Manuals & Books

NSA Vietnam

NSA-Snowden

NSA Special Research Histories (SRH)

NSA Internal Periodicals & Technical Journals

NSA CryptoComics

NSA/CCH Calendars

NIST Technical Standards

Cryptographic Mailing Lists & Communities

Expert Cryptographer's Blogs

Quantum & Post-Quantum

Encryption Products

Foundational Cryptographic Patents

Books (on Amazon)

 

To reiterate: I welcome suggested additions, to make this the best possible resource for the community.

 

Tony Patti

 

From: cryptography <cryptography-bounces+crypto=glassblower.info at metzdowd.com> On Behalf Of Steven M. Bellovin
Sent: Saturday, January 31, 2026 8:34 AM
To: Jason Cooper <cryptography at lakedaemon.net>
Cc: Tony Patti <crypto at glassblower.info>; cryptography at metzdowd.com
Subject: Re: [Cryptography] Curated Cryptology Compendium

 

I'd include this Usenix Security paper:  <https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway> https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway "On the Practical Exploitability of Dual EC in TLS Implementations" and  <https://dl.acm.org/citation.cfm?id=2978395> https://dl.acm.org/citation.cfm?id=2978395: A systematic analysis of the Juniper Dual EC incident from ACM SIGSAC.

On 30 Jan 2026, at 9:55, Jason Cooper via cryptography wrote:

Hi Tony! On Wed, Jan 28, 2026 at 04: 45: 27PM -0500, Tony Patti wrote: > I have created a "Curated Cryptology Compendium" at > https: //urldefense. com/v3/__https: //cryptosystemsjournal. com/curated-cryptology-compendium. html__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTMstkyEY$

ZjQcmQRYFpfptBannerStart




This Message Is From an External Sender 


This message came from outside your organization. 

ZjQcmQRYFpfptBannerEnd

Hi Tony!
 
On Wed, Jan 28, 2026 at 04:45:27PM -0500, Tony Patti wrote:
> I have created a "Curated Cryptology Compendium" at
> https://urldefense.com/v3/__https://cryptosystemsjournal.com/curated-cryptology-compendium.html__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTMstkyEY$ <https://urldefense.com/v3/__https:/cryptosystemsjournal.com/curated-cryptology-compendium.html__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTMstkyEY$>  
 
...
 
> I intend this to be a living project, and I'd appreciate feedback -- if you
> have additions or corrections, let's make this the best resource possible
> for the community!
 
Just spotted something missing, Dual-EC DRBG compromise.  I'm not sure what
should be considered a canonical writeup of the incident, but here's a few to
get started:
 
Harvard Law Journal, "Dueling over Dual-EC DRBG: The Consequences of Corrupting
a Cryptographic Standardization Process"
https://urldefense.com/v3/__https://journals.law.harvard.edu/nsj/wp-content/uploads/sites/82/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTcQTfTHo$ <https://urldefense.com/v3/__https:/journals.law.harvard.edu/nsj/wp-content/uploads/sites/82/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTcQTfTHo$> 
 
IACR, "Dual EC: A Standardized Backdoor"
https://urldefense.com/v3/__https://eprint.iacr.org/2015/767.pdf__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTenMnpzo$ <https://urldefense.com/v3/__https:/eprint.iacr.org/2015/767.pdf__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTenMnpzo$> 
 
There's a slew of them, and imo, would be a great addition to the Compendium.
 
And more specifically, The Juniper compromise really shined a light on the
Dual-EC DRBG weakness:
https://urldefense.com/v3/__https://finance.yahoo.com/news/juniper-breach-mystery-starts-clear-130016591.html__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTFzxIc4E$ <https://urldefense.com/v3/__https:/finance.yahoo.com/news/juniper-breach-mystery-starts-clear-130016591.html__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTFzxIc4E$> 
 
In short, Juniper used Dual-EC DRBG in their VPN gateway.  Someone broke in and
changed the Q value so the attackers could leverage the backdoor.
 
>From the article:
 
> In its 2012 probe, Juniper learned that the hackers had stolen a file
> containing NetScreen’s ScreenOS source code from an engineer’s computer. The
> company didn’t realize that the hackers returned a short time later, accessed
> a server where new versions of ScreenOS were prepared before being made
> available to customers and altered the code, according to the two people
> involved in the 2015 investigation and the document. The hackers' tweak
> involved changing the Q value that the NSA algorithm used — the very same
> vulnerability that Microsoft researchers had identified years earlier. The
> hack allowed them to potentially bypass customers' encryption and eavesdrop
> on their communications.
 
thx,
 
Jason.
_______________________________________________
The cryptography mailing list
cryptography at metzdowd.com <mailto:cryptography at metzdowd.com> 
https://urldefense.com/v3/__https://www.metzdowd.com/mailman/listinfo/cryptography__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTExR2Z_E$ <https://urldefense.com/v3/__https:/www.metzdowd.com/mailman/listinfo/cryptography__;!!BDUfV1Et5lrpZQ!Rz0I4-ZQnm0LsoayhaMlborV0oCKqj3rkvgezed7qHsiYZKCesTmvAUuuVr7dN0CZKjP4pMc3P0073auFgbTExR2Z_E$> 

 

--Steve Bellovin,  <https://www.cs.columbia.edu/~smb> https://www.cs.columbia.edu/~smb

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20260131/19fcd8b0/attachment.htm>


More information about the cryptography mailing list