• Breaking News

    Wednesday, August 1, 2018

    Cryptography New PC with W10 and turns out Truecrypt cannot do full disk encryption with pre boot password. Can Veracrypt?

    Cryptography New PC with W10 and turns out Truecrypt cannot do full disk encryption with pre boot password. Can Veracrypt?


    New PC with W10 and turns out Truecrypt cannot do full disk encryption with pre boot password. Can Veracrypt?

    Posted: 31 Jul 2018 08:35 PM PDT

    I installed it and it gives me the option to encrypt windows system partition but makes no mention of pre boot password while the 2nd option (that it wont let me select) is for whole drive encryption and mention pre boot password.

    So whats the deal with Veracrypt and W10? Been looking for a TC alternative because of the GPT partition and VC seemed like the best option.

    EDIT

    C drive is an SSD and my 2nd drive is 1tb HDD I will also be encrypting.

    submitted by /u/ITgirl08
    [link] [comments]

    About Supersingular Isogeny based crypto [Understanding De Feo's Mathematics of Isogeny Based Cryptography]

    Posted: 31 Jul 2018 08:19 AM PDT

    The context is:

    Let Alice and Bob take random walks in two distinct isogeny graphs on the same vertex set. The vertex set is going to consist of the supersingular j-invariants defined over Fp2 , Alice's graph is going to be made of lA-isogenies, while Bob is going to use lB-isogenies.

    At some point, the paper states:

    "A walk of length eA in the lA-isogeny graph corresponds to a kernel of size eAlA ; and this kernel is cyclic if and only if the walk does not backtrack. Hence, Alice choosing a secret walk of length eA is equivalent to her choosing a secret cyclic subgroup <A> ⊂ E[ lA ^ eA ]."

    My question is, why we have that equivalence? If we are considering the graph of lA-isogenies between j-invariants, taking a walk means walking through the j-invariants, ending in new j-invariant. On the other hand E[lA ^ eA] is the kernel of [lAeA] which is a multiplication endomorphism of E. I don't see how taking a subgroup of E[lA ^ eA] is equivalent to take a walk of lenght lA ^ eA in the lA-isogeny graph.

    submitted by /u/AiYagami
    [link] [comments]

    Shannon's perfect secrecy is independent of computing power

    Posted: 31 Jul 2018 10:42 AM PDT

    How can I prove the fact that shannon's perfect secrecy and computing power have no relation?

    submitted by /u/spectre_S
    [link] [comments]

    ��UPASH - Node.js Unified API for Password Hashing Algorithms

    Posted: 31 Jul 2018 10:55 AM PDT

    No comments:

    Post a Comment