Cryptography The EU wants to filter FOSS - make sure everything stays open |
- The EU wants to filter FOSS - make sure everything stays open
- Hash-based Signatures: An illustrated Primer – A Few Thoughts on Cryptographic Engineering
- May I ask community consensus on Canary Mail for iOS/macOS?
- (Noob question) Question about sha1/md5 length extension attacks
- Question about a login auth scheme
- I need help to publish confidential documents, but I need help to encrypt them and keep my anonymity
- Keeping encryption schemes practically secure with periodic key exchange
- Is conway's game of life of any value to modern cryptography?
The EU wants to filter FOSS - make sure everything stays open Posted: 08 Apr 2018 08:57 AM PDT |
Hash-based Signatures: An illustrated Primer – A Few Thoughts on Cryptographic Engineering Posted: 08 Apr 2018 08:33 AM PDT |
May I ask community consensus on Canary Mail for iOS/macOS? Posted: 09 Apr 2018 02:11 AM PDT |
(Noob question) Question about sha1/md5 length extension attacks Posted: 08 Apr 2018 09:25 AM PDT As I ELI5 understand it, length extension attacks work by taking the internal hash state of a known string and continuing with the your appended message. For example: if you know the hash and length of "secret&field1", you can calculate the valid hash of "secret&field1&evilfield". My question is if it is possible to calculate a valid hash of "secret&field2" where "field1" and "field2" are literally strings and I have simply changed the last character (1 to 2). Is it possible to "reverse" the internal state by 1-2 characters and recompute like that? [link] [comments] |
Question about a login auth scheme Posted: 08 Apr 2018 09:09 AM PDT I am working on a website with accounts and I want a login scheme that does not expose users' passwords or hashes in the event of a total security failure. I would greatly appreciate some feedback on this
Edit: I'm a fool, this doesn't add any level of security. If the generator is static then it literally has no advantage over a hash. [link] [comments] |
I need help to publish confidential documents, but I need help to encrypt them and keep my anonymity Posted: 08 Apr 2018 01:47 PM PDT Does anyone have a guide or a tutorial of what programs to use for encryption and how to keep me unbreakable? [link] [comments] |
Keeping encryption schemes practically secure with periodic key exchange Posted: 08 Apr 2018 06:44 AM PDT Disclaimer: this is a thought experiment, I'm not implementing anything. Also, this is not a homework. Consider a secure (for the sake of simplicity, security=confidentiality here) communication system between Alice and Bob which uses a well-known block cipher BLOCK. The best public cryptanalysis of BLOCK requires 240 known plaintexts. Considering an adversary who only knows public attacks and cannot exploit side channels, is the system secure as long as the symmetric key is updated every N<240 plaintexts (about 76 days at 1 Gbps duplex), for example using ECDH? I think it would be OK, as the only known attacks would fail to capture enough plaintexts. [link] [comments] |
Is conway's game of life of any value to modern cryptography? Posted: 08 Apr 2018 06:25 AM PDT Game of life: https://bitstorm.org/gameoflife/ I found a paper on using game of life as part of a cipher a while ago. But it was only ONE paper. AFAIK it looks like game of life is a good visual PRNG. I expect there are no major encryption schemes that use game of life type PRNG, but i'm wondering if it would be a viable method. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment