# tl;dr of the sweet32 attack (On the Practical (In-)Security of 64-bit Block Ciphers) posted September 2016

I wrote about that 3-weeks-ago attack on the NCC Group's blog, but I had a bit more to say about it, so I made a tl;dr video =) enjoy!

Hey! I'm **David**, cofounder of zkSecurity and the author of the Real-World Cryptography book. I was previously a crypto architect at O(1) Labs (working on the Mina cryptocurrency), before that I was the security lead for Diem (formerly Libra) at Novi (Facebook), and a security consultant for the Cryptography Services of NCC Group. This is my blog about **cryptography** and **security** and other related topics that I find interesting.

I wrote about that 3-weeks-ago attack on the NCC Group's blog, but I had a bit more to say about it, so I made a tl;dr video =) enjoy!

Well done! You've reached the end of my post. Now you can leave a comment or read something else.

Here are some random **popular** articles:

Here are some random **recent** articles:

- - The intuition behind the sum-check protocol in 5 minutes
- - How STARKs work if you don't care about FRI
- - Some unrelated rambling about counter strike
- - zksecurity.xyz
- - A note on the elliptic curve pairing checks in zero-knowledge proofs
- - Learning OCaml for non-functional language people like me
- - Cairo's public memory

My book **Real-World Cryptography** is finished and shipping! You can purchase it here.

If you don't know **where to start**, you might want to check these popular articles:

Here are the latest **links** posted:

- 06 Apr National Security Agency (Nsa) Tales Of The Krypt (Kryptos Society Newsletters) 1994-2003
- 07 Sep Inner Product Argument (Ipa) And A Polynomial Commitment Scheme
- 05 Sep Getting Apples, Bananas Or Cherries From Hash Functions
- 08 Aug Few Questions Answered About Plonk
- 31 May Sha-3 Buffer Overflow (Part 2)

You can also **suggest a link**.

## Comments

## leave a comment...