<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>KEL.BZ</title>
    <link>https://kel.bz/</link>
    <description>Recent content on KEL.BZ</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <copyright>© 2026 Kelby Ludwig. All rights reserved.</copyright>
    <lastBuildDate>Mon, 05 Jan 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://kel.bz/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>On string comparison timing attacks in Go</title>
      <link>https://kel.bz/post/go-timing/</link>
      <pubDate>Mon, 05 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/go-timing/</guid>
      <description>It&amp;rsquo;s well known that string comparisons can leak timing information. Go is no different but exploitation is tricky.</description>
    </item>
    <item>
      <title>Control planes are a useful concept</title>
      <link>https://kel.bz/post/control-plane/</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/control-plane/</guid>
      <description>A useful software architecture concept is the distinction between the control plane and data plane. Even if you don&amp;rsquo;t use the jargon, this is a useful concept for safer deployments.</description>
    </item>
    <item>
      <title>Physical proximity and latency</title>
      <link>https://kel.bz/post/physical-latency/</link>
      <pubDate>Sun, 28 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/physical-latency/</guid>
      <description>An experiment showing the effects physical proximity has on network latency.</description>
    </item>
    <item>
      <title>Notes on Virtualization.Framework</title>
      <link>https://kel.bz/post/virtualization-framework-reversing/</link>
      <pubDate>Tue, 29 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/virtualization-framework-reversing/</guid>
      <description>Notes from reversing implmentation details of the macOS Virtualization.Framework</description>
    </item>
    <item>
      <title>P-256 in Sage</title>
      <link>https://kel.bz/post/sage-p256/</link>
      <pubDate>Fri, 10 Jan 2020 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/sage-p256/</guid>
      <description>Reference code for creating NIST P-256 curve objects in Sagemath.</description>
    </item>
    <item>
      <title>Authenticated Dictionaries with Skip Lists and Commutative Hashing</title>
      <link>https://kel.bz/post/authdict/</link>
      <pubDate>Sun, 05 Jan 2020 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/authdict/</guid>
      <description>Notes and implementation of the Goodrich and Tamassia paper on authenticated dictionaries with skip lists.</description>
    </item>
    <item>
      <title>The Hidden Number Problem</title>
      <link>https://kel.bz/post/hnp/</link>
      <pubDate>Sat, 10 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/hnp/</guid>
      <description>Notes on the Boneh and Venkatesan&amp;rsquo;s paper describing the Hidden Number Problem and code demonstrating some of the results.</description>
    </item>
    <item>
      <title>ECDSA is Weird</title>
      <link>https://kel.bz/post/ecdsa-is-weird/</link>
      <pubDate>Sun, 28 Jul 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/ecdsa-is-weird/</guid>
      <description>Unexpected properties of ECDSA signatures.</description>
    </item>
    <item>
      <title>Measures of Entropy</title>
      <link>https://kel.bz/post/entropy/</link>
      <pubDate>Sun, 02 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/entropy/</guid>
      <description>Different ways to describe the entropy of a random variable.</description>
    </item>
    <item>
      <title>RSA-based Key Encapsulation Mechanisms</title>
      <link>https://kel.bz/post/kem/</link>
      <pubDate>Mon, 27 May 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/kem/</guid>
      <description>How to use RSA to encrypt symmetric keys and how RSA-KEM relates to RSA-OAEP.</description>
    </item>
    <item>
      <title>Questions for System Design Reviews</title>
      <link>https://kel.bz/post/designreview/</link>
      <pubDate>Sun, 12 May 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/designreview/</guid>
      <description>Moving towards operationalizing system design reviews. What questions should a review team ask, or expect to be answered?</description>
    </item>
    <item>
      <title>What is the Value-add of ssh-agent?</title>
      <link>https://kel.bz/post/ssh-agent/</link>
      <pubDate>Mon, 14 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/ssh-agent/</guid>
      <description>The purpose of ssh-agent and observations how ssh-agent improves UX and security.</description>
    </item>
    <item>
      <title>Fiat-Shamir Heuristic</title>
      <link>https://kel.bz/post/fiat-shamir-heuristic/</link>
      <pubDate>Sat, 22 Sep 2018 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/fiat-shamir-heuristic/</guid>
      <description>Overview and implementation of the Fiat-Shamir heuristic used to build signature schemes from interactive zero-knowledge proofs.</description>
    </item>
    <item>
      <title>Building Lattice Reduction (LLL) Intuition</title>
      <link>https://kel.bz/post/lll/</link>
      <pubDate>Tue, 25 Jul 2017 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/lll/</guid>
      <description>My attempt to grok the Lenstra–Lenstra–Lovász (LLL) algorithm used for basis reduction.</description>
    </item>
    <item>
      <title>Subgroup Confinement Attacks</title>
      <link>https://kel.bz/post/pohlig/</link>
      <pubDate>Sat, 14 Jan 2017 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/pohlig/</guid>
      <description>Subgroup confinement attacks can apply in offline and online contexts.</description>
    </item>
    <item>
      <title>User-influenced Shell Commands Are Still Considered Harmful</title>
      <link>https://kel.bz/post/javaexec/</link>
      <pubDate>Tue, 06 Dec 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/javaexec/</guid>
      <description>Non-obvious ways of getting code execution when testing code that uses user input to build shell commands.</description>
    </item>
    <item>
      <title>The GGH Cryptosystem</title>
      <link>https://kel.bz/post/lattices/</link>
      <pubDate>Wed, 23 Nov 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/lattices/</guid>
      <description>An introduction to lattice-based cryptography using the broken Goldreich–Goldwasser–Halevi (GGH) cryptosystem.</description>
    </item>
    <item>
      <title>ASIS CTF 2016: RSA Write-up</title>
      <link>https://kel.bz/post/asis-rsa/</link>
      <pubDate>Sun, 18 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/asis-rsa/</guid>
      <description>Breaking RSA with sequential prime key parameter generation.</description>
    </item>
    <item>
      <title>Tokyo Westerns / MMA CTF: Twin Primes Write-up</title>
      <link>https://kel.bz/post/twinprimes/</link>
      <pubDate>Thu, 01 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/twinprimes/</guid>
      <description>Decrypting RSA ciphertexts using correlated parameters.</description>
    </item>
    <item>
      <title>Modifying IP Headers With netfilter</title>
      <link>https://kel.bz/post/netfilter/</link>
      <pubDate>Sat, 20 Aug 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/netfilter/</guid>
      <description>Using netfilter to programmtically rewrite the source IP address of ICMP packets.</description>
    </item>
    <item>
      <title>Authorization Design Patterns</title>
      <link>https://kel.bz/post/authz-design-patterns/</link>
      <pubDate>Mon, 01 Aug 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/authz-design-patterns/</guid>
      <description>Patterns/anti-patterns for designing authorization APIs.</description>
    </item>
    <item>
      <title>Iceland</title>
      <link>https://kel.bz/post/iceland/</link>
      <pubDate>Mon, 01 Aug 2016 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/iceland/</guid>
      <description>Takeaways from my first trip to Iceland and places I hope to revisit.</description>
    </item>
    <item>
      <title>Secure Password Hash Migrations</title>
      <link>https://kel.bz/post/password-hash-migrations/</link>
      <pubDate>Fri, 27 Nov 2015 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/password-hash-migrations/</guid>
      <description>How to securely migrate from an insecure password hash algorithm to a secure one.</description>
    </item>
    <item>
      <title>Fuzzing Servers</title>
      <link>https://kel.bz/post/fuzzing-servers/</link>
      <pubDate>Wed, 11 Nov 2015 00:00:00 +0000</pubDate>
      <guid>https://kel.bz/post/fuzzing-servers/</guid>
      <description>One tip for finding fast and useful fuzz targets for networked code.</description>
    </item>
  </channel>
</rss>
