• Breaking News

    Monday, April 9, 2018

    Cryptography The EU wants to filter FOSS - make sure everything stays open

    Cryptography The EU wants to filter FOSS - make sure everything stays open


    The EU wants to filter FOSS - make sure everything stays open

    Posted: 08 Apr 2018 08:57 AM PDT

    Hash-based Signatures: An illustrated Primer – A Few Thoughts on Cryptographic Engineering

    Posted: 08 Apr 2018 08:33 AM PDT

    May I ask community consensus on Canary Mail for iOS/macOS?

    Posted: 09 Apr 2018 02:11 AM PDT

    (Noob question) Question about sha1/md5 length extension attacks

    Posted: 08 Apr 2018 09:25 AM PDT

    As I ELI5 understand it, length extension attacks work by taking the internal hash state of a known string and continuing with the your appended message. For example: if you know the hash and length of "secret&field1", you can calculate the valid hash of "secret&field1&evilfield".

    My question is if it is possible to calculate a valid hash of "secret&field2" where "field1" and "field2" are literally strings and I have simply changed the last character (1 to 2). Is it possible to "reverse" the internal state by 1-2 characters and recompute like that?

    submitted by /u/grchelp2018
    [link] [comments]

    Question about a login auth scheme

    Posted: 08 Apr 2018 09:09 AM PDT

    I am working on a website with accounts and I want a login scheme that does not expose users' passwords or hashes in the event of a total security failure. I would greatly appreciate some feedback on this

    1. Client retrieves auth challenge from server
    2. Password is hashed to 32 byte integer on client
    3. Integer is used to create a keypair, PK, using static keypair generator
    4. Temporary session key is generated, SK
    5. Challenge is signed with PK
    6. SK.public and challenge signature are encrypted with PK.private and server public key
    7. Cipher is sent to server with username
    8. Server decrypts cipher using associated public key for username, checks challenge signature and allows SK.public to be used for x time

    Edit: I'm a fool, this doesn't add any level of security. If the generator is static then it literally has no advantage over a hash.

    submitted by /u/fcksinclairbroadcast
    [link] [comments]

    I need help to publish confidential documents, but I need help to encrypt them and keep my anonymity

    Posted: 08 Apr 2018 01:47 PM PDT

    Does anyone have a guide or a tutorial of what programs to use for encryption and how to keep me unbreakable?

    submitted by /u/matheus_jurgen
    [link] [comments]

    Keeping encryption schemes practically secure with periodic key exchange

    Posted: 08 Apr 2018 06:44 AM PDT

    Disclaimer: this is a thought experiment, I'm not implementing anything. Also, this is not a homework.

    Consider a secure (for the sake of simplicity, security=confidentiality here) communication system between Alice and Bob which uses a well-known block cipher BLOCK. The best public cryptanalysis of BLOCK requires 240 known plaintexts.

    Considering an adversary who only knows public attacks and cannot exploit side channels, is the system secure as long as the symmetric key is updated every N<240 plaintexts (about 76 days at 1 Gbps duplex), for example using ECDH?

    I think it would be OK, as the only known attacks would fail to capture enough plaintexts.

    submitted by /u/youngeng
    [link] [comments]

    Is conway's game of life of any value to modern cryptography?

    Posted: 08 Apr 2018 06:25 AM PDT

    Game of life: https://bitstorm.org/gameoflife/

    I found a paper on using game of life as part of a cipher a while ago. But it was only ONE paper.

    AFAIK it looks like game of life is a good visual PRNG. I expect there are no major encryption schemes that use game of life type PRNG, but i'm wondering if it would be a viable method.

    submitted by /u/GeneralLion
    [link] [comments]

    No comments:

    Post a Comment