Edlyn Teske

Edlyn has a distinguished career as a Professor of Mathematics at the Department of Combinatorics and Optimization and the Centre for Applied Cryptographic Research, University of Waterloo (Canada). While in the San Francisco Bay Area, she worked as Senior Solutions Architect at Cryptomathic Inc., and also was teaching at the German International School of Silicon Valley's Saturday School. Edlyn currently lives in Leipzig, Germany, working as Senior Crypto Expert at Cryptomathic GmbH. She is also busy mother of four children ages 9 to 19.
Explaining the Java ECDSA Critical Vulnerability

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read more
NIST PQC Finalists Update: It’s Over For The Rainbow

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes has received its final nail in the coffin: Ward Beullens, a PostDoc at IBM Research, published a practical key recovery attack against the Rainbow signature scheme.

Read more
RSA is not destroyed, but do remain vigilant and be crypto-agile!

RSA is not destroyed, but do remain vigilant and be crypto-agile!

During the last couple of weeks, a little shake went through parts of the security community. This was caused by a preprint by Professor Dr. Claus Peter Schnorr titled “Fast Factoring Integers by SVP Algorithms”, published on the IACR’s E-print Server.

Read more
The SolarWinds attack and best practices for code-signing

The SolarWinds attack and best practices for code-signing

Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details), Microsoft, Symantec, SolarWinds, and many others, to understand the attack’s workings both within SolarWinds and in the targeted networks. Here we focus on the code signing procedures, which seemingly failed at SolarWinds but likely could have mitigated the risk of the attack if they had been implemented and enforced to a higher standard.

Read more
Building Security Systems for the Internet of Things and Crypto Agility

Building Security Systems for the Internet of Things and Crypto Agility

There is no silver bullet when it comes to securing “the” Internet of Things, instead, a careful analysis of the individual application is needed. In this article we explore a methodical, yet pragmatic approach to securing IOT devices.

Read more
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

The business world today is built on the pervasive use of cryptography, to authenticate people and processes, to secure communications, and to protect sensitive data.

Read more
High-Security Cryptographic Key Management for the Hybrid-Cloud User

High-Security Cryptographic Key Management for the Hybrid-Cloud User

When migrating their business-critical applications and cryptography to the cloud, banks and financial institutions face a number of concerns. The push to adopt cloud computing for the sake of efficiency and innovation must be balanced with the responsibility to protect sensitive data and processes.

Read more
The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is a Shambles”.  

Read more