• Breaking News

    Tuesday, April 10, 2018

    Cryptography Forsta - Signal based messaging platform for enterprises

    Cryptography Forsta - Signal based messaging platform for enterprises


    Forsta - Signal based messaging platform for enterprises

    Posted: 09 Apr 2018 01:17 PM PDT

    How secure is Telegram today?

    Posted: 09 Apr 2018 12:09 PM PDT

    They updated their protocol, but I can't find any reliable info on it now.

    submitted by /u/marindom
    [link] [comments]

    New Vice President (VP) of Communications appointed by Coinbase

    Posted: 10 Apr 2018 01:54 AM PDT

    Monthly cryptography wishlist thread, April 2018

    Posted: 09 Apr 2018 05:06 AM PDT

    This is another installment in a series of monthly recurring cryptography wishlist threads.

    The purpose is to let people freely discuss what future developments they like to see in fields related to cryptography, including things like algorithms, cryptanalysis, software and hardware implementations, usable UX, protocols and more.

    So start posting what you'd like to see below!

    submitted by /u/AutoModerator
    [link] [comments]

    Using ciphers with a low nonce space for a large number of messages

    Posted: 09 Apr 2018 11:12 AM PDT

    Let us suppose we have a stream cipher that takes a 12-bit counter, and the requirement is that every character encrypted must be encrypted with a unique counter to stay secure (meaning the most characters you can encrypt is 2^12 while staying secure). Is it possible to bypass this restriction by using the last 32 bytes to communicate a new key to be used? As far as my understanding goes theoretically it should be fine, but I can imagine weird problems might arise (as is typical of cryptography) such as some related key attack channel (this in particular should be fixable with signatures/MACs, but this is the style of an attack that I presume might happen).

    submitted by /u/naclo3samuel
    [link] [comments]

    a question about linear cryptoanalysis

    Posted: 09 Apr 2018 09:52 AM PDT

    hey,

    until now every tutorial I've seen about linear cryptoanalysis, is written on the basis that we have all possible inputs/outputs, is that a condition? and if not how many should we at least have?

    I also noticed that the idea is to find a key that would work for every possible combination. so, when it comes to algorithms that could be cracked using linear cryptoanalysis, is there always a key that could work for every possible input-output ?

    EDIT : take this case for example http://theamazingking.com/crypto-linear.php

    submitted by /u/AlanRoofies
    [link] [comments]

    No comments:

    Post a Comment