RPKI Insecurity 

Recently, a team of researchers from Germany released a paper outlining the vulnerabilities of Resource Public Key Infrastructure (RPKI), the primary framework used to provide security for the Border Gateway Protocol (BGP) [2]. BGP is used for routing, and it is an alternative to Open Shortest Path First (OSPF). OSPF is generally used for routing …

E-Voting Teaching Aide

Hello fellow Applied Cryptography students!  Cynthia, David, Maheen, Oscar, and I would like to introduce our teaching aide on e-voting to you! This interesting and cutting-edge application of cryptography will help you understand how the concepts we learned in class can solve fascinating problems in the real world. You will also get a glimpse of …

An Attack on Two-Factor Authentication

Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …