Cryptography Crypto for kids |
- Crypto for kids
- Cryptology Projects for Beginners?
- How to construct a CSPRNG that is the union of multiple CSPRNGs with an identical seed without expansion?
- Any references for Company-Sized Key Ceremony Procedures ?
- For what parts of cracking crypto are neuralnets sometimes useful?
- Taking a Long Look at QUIC [pdf]
Posted: 19 Dec 2017 08:54 AM PST Hi guys, I am not an expert by any mean but I studied few crypto concepts during studying for an InfoSec certification. I would like to explain to a little group of 10/11 yrs old kids the basic concept of cryptography, do you have any suggestions ? Where can I start ? I tried on NSA site but there are only few biographies (I don't understand their use actually). Any help appreciated, regards EDIT Thanks everyone for the valuable answers :) I will try to deploy a program based on your inputs [link] [comments] |
Cryptology Projects for Beginners? Posted: 19 Dec 2017 06:06 PM PST I'm currently a CS major/math minor and I've recently become interested in Cryptography especially after learning some Number Theory. I know the basics of Cryptology such as public key encryption, hashing, etc. and I want to learn more by doing a project. I first thought of creating a homemade algorithm but that can of course be very dangerous. In many programming languages it seems like many encryption/hashing methods are done for you, but nevertheless I've thought also about recreating an algorithm such as RSA from scratch and applying that to a chat application. Does anyone have any tips/suggestions on how I should go about this? [link] [comments] |
Posted: 19 Dec 2017 05:34 PM PST Suppose you have a set of n CSPRNG algorithms and you wish to combine them such that their union is at least as strong as their strongest member. One obvious way is to just XOR them together with unrelated seeds. Let's assume all we have is say, 256 bits of entropy and we do not wish to expand it with any PRFs. Would the following CSPRNG be secure? I believe I was able to reason myself into if the following stream leaks no usable information about e Where H is some CS hash function with 256 bit output, then the union proposed must also not leak. I do not know if this "pseudo-"reduction is secure or even accurate. My reasoning is that in an absolute worst case one of the CSPRNGs absurdly outputs the seed therefore maximally leaking it. Is there any research or proof on the subject? [link] [comments] |
Any references for Company-Sized Key Ceremony Procedures ? Posted: 19 Dec 2017 08:24 AM PST Hi everyone ! I'm looking for documentations and struggle to find a fitting one. Do you have any references to standards or write ups of key cermemonies ? Thank you all ! [link] [comments] |
For what parts of cracking crypto are neuralnets sometimes useful? Posted: 19 Dec 2017 01:34 PM PST Example: Based on the kinds of things RBMs normally learn, it appears one of their basic properties is to learn pairs of [permutation,bitstring] for a set of random permutations and random bitstrings, and to predict those missing in the training data. An example of a permutation is movement in a grid of pixels, but most permutations are harder to visualize. I want to learn about cracking crypto, not to crack actual crypto in the world, but cuz its a good testcase of statistically well balanced learning that has benefits in what else it can learn. To an AI, all observations at first look like random bitstrings. [link] [comments] |
Taking a Long Look at QUIC [pdf] Posted: 19 Dec 2017 06:57 AM PST |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment