EAP is a complete shit show. A cursory search shows at least EAP-PSK, EAP-GPSK, EAP-AKA and EAP-AKA' doing essentially the same thing, none of them particularly well. And I suspect you can do substantially the same thing with EAP-TLS and a PSK cipher suite. #EAP #crypto #authentication #KeyAgreement

Matthew Green's got a great blog post up talking about how Schnorr signature schemes and identification schemes (aka key agreement) work: https://blog.cryptographyengineering.com/2023/10/06/to-schnorr-and-beyond-part-1/

Part 2 is going to talk about Dilithium, one of my favourites from NIST's post-quantum cryptography competition.

#cryptography #keyagreement #keyexchange #identification #signatures

To Schnorr and beyond (Part 1)

Warning: extremely wonky cryptography post. Also, possibly stupid and bound for nowhere. One of the hardest problems in applied cryptography (and perhaps all of computer science!) is explaining why…

A Few Thoughts on Cryptographic Engineering