• Breaking News

    Tuesday, December 5, 2017

    Cryptography I am writing a introductory course to Cryptography

    Cryptography I am writing a introductory course to Cryptography


    I am writing a introductory course to Cryptography

    Posted: 04 Dec 2017 04:01 AM PST

    Some years ago I took a class on Cryptography and decided (With the professor permission) to write a introductory course based on the exercises we solved on that course. I started publishing it to my blog, here are the first two:

    I would like some feedback from you. My idea is first cover the basis mathematical background needed to be able to explain all the exercises on my elbaulp/crypto github repo.

    Thanks

    submitted by /u/algui91
    [link] [comments]

    Do you think protectedtext.com is secure enough to use?

    Posted: 04 Dec 2017 07:50 PM PST

    I'm looking for a solution where I can store SUPER sensitive text-based data online so that I can access it anytime I have an internet connection.

    On it's website it reads:

    Why is it safe?

    Your password isn't sent to our server - we can't decrypt your text even if we wanted to. Only encrypted text is sent over the Internet.

    No cookies, no sessions, no registration, no users tracking. We can't identify you at all. We can't know when the same user visits two different sites.

    No logging in or out, just close the browser tab and you're safe. No ads - we hate ads because they can track you, and they're distracting.

    You don't have to trust anyone or agree on anything - check the code yourself. All our code is well written and full of comments so that you can understand it in details - start by looking at main.js, and check communication with our servers.

    If someone wants your text, he'll need your password, but he'll have to find your site first.

    submitted by /u/chillfuckinvibesbreh
    [link] [comments]

    I have written a public key python program that can securely communicate a point on an elliptic curve. Can I concatenate the x and y coordinate and then use a simple XOR cipher to send a message?

    Posted: 04 Dec 2017 12:06 PM PST

    I am fairly new to cryptography having only briefly covered what was necessary for a Quantum information module of a Physics masters.

    I have written a program in python which can generate an elliptic curve. It can add points and multiply points by constants. So now I have an El Gamal system for securely communicating a point on an elliptic curve between Alice and Bob.

    My problem is that encoding and then decoding a plaintext message in what is essentially a random point on an elliptic curve requires me to solve a discrete logarithm. Instead of the various probabilistic strategies, can I just concatenate this point into a bit string and take an agreed hash? Alice and Bob now both know this hash and can XOR this hash with a message then discard the private key. Does this work or is there a gaping hole in my understanding that exposes an attack?

    submitted by /u/moomin100
    [link] [comments]

    ARX and Modular Addition

    Posted: 04 Dec 2017 09:14 AM PST

    Regarding ARX and it's inherent difficulty in establishing tight bounds wrt LC and DC, I read somewhere NORX does something like a = (a ^ b) ^ ((a & b) << 1) with few drawbacks. I get that this is easier to analyze but for what reasons and why is, a = ((a + b) <<< n) not at least as strong as the former method of 'approximating' ARX? Does the analysis change if we preclude weak keys, that is, those with low hamming weight?

    submitted by /u/ladybugfart
    [link] [comments]

    Let's get this going guys. Joke contest ~ 1,000 BZC reward

    Posted: 04 Dec 2017 10:30 PM PST

    No comments:

    Post a Comment