Cryptography Complete design of a silicon quantum computer chip unveiled |
- Complete design of a silicon quantum computer chip unveiled
- cyber•Search: the blockchain browser
- Complexity and Cryptography
- Looking for a method to allow multiple players draw tile from a bag in a way that is mutually verifiable
- NullAuth: A proposal for decentralizing authentication
- Can anyone recognize this hashing algorithm?
Complete design of a silicon quantum computer chip unveiled Posted: 15 Dec 2017 02:30 PM PST |
cyber•Search: the blockchain browser Posted: 16 Dec 2017 01:09 AM PST |
Posted: 15 Dec 2017 10:54 PM PST |
Posted: 15 Dec 2017 06:31 PM PST Basically I want to implement a version of a board game that involves secretly drawing tiles from a sack. The trick is I need a way for users to be unable to choose what they are going to get, and unable to deduce it ahead of their turn. a good example of what I want to do it like scrabble drawing letters but there's only unique letters. [link] [comments] |
NullAuth: A proposal for decentralizing authentication Posted: 15 Dec 2017 08:41 AM PST NullAuth Authentication mechanisms today have multiple weaknesses and shortcomings. To name a few: 1. You have to trust a third-party with safe-keeping your password. 2. Google and FaceBook are gatekeepers (via Google/Facebook Login) to apps we use everyday. 3. You have to remember multiple passwords. 4. Humans are not good at remembering good passwords. NullAuth is an authentication scheme which uses Public Key Cryptography to alleviate some of these problems. In the first phase, NullAuth with target apps with technically proficient users, and eventually we hope tooling will make it accessible to non-technical users as well. NullAuth is designed to be simple to understand and implement from scratch, and is based on existing, proven methods. The approach outlined here has been previously discussed on the internet, and the main intent is to turn those conversations into a formal spec. The name NullAuth was chosen to highlight not needing to store credentials on the server. Pre-requisites for using NullAuth to authenticate users
Creating an account for a user
Login
Updating a public key
Access Delegation (like OAuth) This addresses usecases currently handled by OAuth. Eg: User has an account on docs.example.com (aka provider domain), and some data stored there. User wants to allow another app publisher.example.com (aka consumer domain) to access (read and modify) his or her data on docs.example.com.
Tools for End Users
Tools and extensions should refuse to sign if the challenge's signature cannot be verified by the requesting domain's public key. Consider the following challenge: - Grant (comma-separated-permissions) of (username@provider-domain) to (consumer-domain) at (utcmilliseconds);(encrypted sha2 hash) If the consumer-domain's public key cannot verify the above challege, the tool should refuse to sign it. Notes: [1] - With input from dchestnykh in comments [link] [comments] |
Can anyone recognize this hashing algorithm? Posted: 15 Dec 2017 10:58 AM PST I managed to retrieve a hashing algorithm used to checksum save files from a decompiled executable of a game. The code was originally spaghettified, but I managed to clean it up pretty well and ended up with this: https://hastebin.com/aqogodasup.cpp It returns an 8 digit hex string. I thought it might have been CRC-32 but it's not. Anyone have any ideas? [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment