Skip to main content

Attacks on Cryptographic Protocols

Attacks on Cryptographic Protocols

Researchers in the ISG have performed and continue to perform security analyses of widely deployed cryptographic protocols, and have found cryptographic weaknesses in several of them.  Examples include SSH, some TLS implementations and a mesh networking chat app advertised for use in higher-risk settings such as settings of civil unrest.

Explore Royal Holloway