{"id":2350,"date":"2026-01-29T05:30:39","date_gmt":"2026-01-29T10:30:39","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/club\/?p=2350"},"modified":"2026-01-29T05:40:00","modified_gmt":"2026-01-29T10:40:00","slug":"break-me-if-you-can-by-nathan-nye","status":"publish","type":"post","link":"https:\/\/cybersecurity.fsu.edu\/club\/2026\/01\/2350\/","title":{"rendered":"&#8220;Break Me If You Can!&#8221; By Nathan Nye"},"content":{"rendered":"<p>I\u2019m incredibly proud to share Nathan Nye\u2019s work, \u201cBreak Me If You Can!\u201d: Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-Protected NFC Technologies.<\/p>\n\n\n\n<p>Nathan is a former President of the Cybersecurity Club at FSU, and I still remember when he first approached me years ago &#8211; full of curiosity, enthusiasm, and a genuine passion for cybersecurity. That spark has only grown stronger over time. Seeing him continue to pursue his dream and channel that passion into meaningful cybersecurity research is truly rewarding.<\/p>\n\n\n\n<p>Nathan\u2019s journey is a wonderful reminder to our current students: curiosity matters, initiative matters, and staying committed to what excites you can lead to impactful work. Big ideas often start with simply asking questions and being brave enough to explore them.<\/p>\n\n\n\n<p>I encourage you to take a moment to read this article and learn from Nathan\u2019s work. And if you\u2019re curious about his research or his path, don\u2019t hesitate to connect with him. He\u2019s a great example of where dedication and passion can take you.<\/p>\n\n\n\n<p>Nathan&#8217;s work:\u00a0<a href=\"https:\/\/nam04.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fbreakmeifyoucan.com%2F&amp;data=05%7C02%7Csmho%40fsu.edu%7C2a62d84e63024add256b08de5f203ee9%7Ca36450ebdb0642a78d1b026719f701e3%7C0%7C0%7C639052789287218451%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=bCvAPWFiVO1V9dYgOmVS7IeWkY0a1oKd7SLYq%2B%2FH0K0%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/breakmeifyoucan.com\/<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/nam04.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fbreakmeifyoucan.com%2F&amp;data=05%7C02%7Csmho%40fsu.edu%7C2a62d84e63024add256b08de5f203ee9%7Ca36450ebdb0642a78d1b026719f701e3%7C0%7C0%7C639052789287271508%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=33JP4%2FfjRoGEb%2Bcy0Bm%2FfuiHR7nR9BMhZj2kS6BFOH4%3D&amp;reserved=0\"><\/a>Nathan on LinkedIn:&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/nam04.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fnye%2F&amp;data=05%7C02%7Csmho%40fsu.edu%7C2a62d84e63024add256b08de5f203ee9%7Ca36450ebdb0642a78d1b026719f701e3%7C0%7C0%7C639052789287321233%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=n1u%2FqqEKYRu5cr7UY98zw9rByqkNs7v0Kl93qzVXU2o%3D&amp;reserved=0\">https:\/\/www.linkedin.com\/in\/nye\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>I\u2019m incredibly proud to share Nathan Nye\u2019s work, \u201cBreak Me If You Can!\u201d: Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-Protected NFC Technologies. Nathan is a former President of the Cybersecurity Club at FSU, and I still remember when he first approached me years ago &#8211; full of curiosity, enthusiasm, and a genuine [&hellip;]<\/p>","protected":false},"author":7,"featured_media":2355,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-2350","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-events","8":"czr-hentry"},"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/comments?post=2350"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2350\/revisions"}],"predecessor-version":[{"id":2351,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2350\/revisions\/2351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media\/2355"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media?parent=2350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/categories?post=2350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/tags?post=2350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}