Cryptography The Controversial Speck Encryption Code Will Indeed Be Dropped From The Linux Kernel |
- The Controversial Speck Encryption Code Will Indeed Be Dropped From The Linux Kernel
- Why was Rijndael chosen over Twofish?
- looking for resources on protocols/cryptosystems
- Consensus protocols that provide Byzantine Fault Tolerance but no Total order of events?
- Distinguishing cryptographic properties: hiding and collision resistance
- Old man doesn't understand the internet.
- Public key keyserver directory
- Are there older symmetrical or assymmetrical ciphers which are still considered secure?
The Controversial Speck Encryption Code Will Indeed Be Dropped From The Linux Kernel Posted: 04 Sep 2018 09:19 AM PDT |
Why was Rijndael chosen over Twofish? Posted: 05 Sep 2018 01:10 AM PDT On paper, Twofish is more secure than Rijndael, as the lower round versions of Rijndael are broken, and Twofish has a fixed set of 16 rounds, 2 more than what is formally specified for Rijndael 256b keys. Before one claims efficiency, both are comparatively the same speed on modern hardware and hardware acceleration would also be comparable. Anyone who is familiar with the competition please explain in depth as to why Twofish was not chosen 😀 [link] [comments] |
looking for resources on protocols/cryptosystems Posted: 04 Sep 2018 08:41 PM PDT so i am looking to learn more about cryptography. in particular -- and borrowing terminology from this recent post -- i think i want to learn more about protocols & cryptosystems, rather than encryption algorithms themselves (--right now, at least--) (so, items >3 in that list). for example: instead of learning about SHA down to the nuts and bolts, learning about the applications of hashing: "hashing allows them not to store your pwd in plaintext, just the hash. when you log in they just compare your hashed pwd with what they have there!". similarly... in what ways are communications over the web vulnerable, and what measures are there to counter this? e.g. "what is HTTPS?", "whatsapp tells me that my conversations are 'encrypted end to end' or something. what does this even mean?"... or...
ok, but what does this mean in practice? how were they engineered to be tamper resistant?
great, but how do they make use of this cryptographic algorithm? as a final example (hehe xD i know you've guys have had enough with the """crypto""" bros): "where does the crypto in cryptocurrency comes from?" (partial answer: miners hash something until the resulting hash has a lot of leading zeros -- ok but so what?) see the kinds of questions i have? i'm not necessarily looking for answers to these questions specifically, rather, to have a general feeling for the essential ideas behind 'cryptographic protocols' -- what seems to be their name... so, if you guys care to recommend me some texts or readings, i'd be thankful. btw, fwiw i'm a cs student. [link] [comments] |
Consensus protocols that provide Byzantine Fault Tolerance but no Total order of events? Posted: 04 Sep 2018 02:22 PM PDT Hi, first of all, sorry for asking this on /r/crypto, but is the only place where I think my question can be really answered (the blockchain hype doesn't help with me finding scientific answers on consensus protocols). In the literature the Blockchain consensus protocol provides these properties: - (Reasonably) resistant against byzantine failures. - Provides a total order of all events. But for example; for timestamping of documents (e.g. proof that you had a document in possession at a certain time) I don't need a total order of events. I only need a very rough estimation of when the proof was broadcasted in the consensus network. So my question is; do consensus protocols exist of where only resistance against byzantine failures exist, or am I just plain missing something important here for timestamping? [link] [comments] |
Distinguishing cryptographic properties: hiding and collision resistance Posted: 04 Sep 2018 03:43 AM PDT I saw from A question on stackoverflow the following definitions, which clarifies somewhat: Collision-resistance:Given: x and h(x) Hard to find: y that is distinct from x and such that h(y)=h(x). Hiding:Given: h(r|x) Secret: x and a highly-unlikely-and-randomly-chosen r Hard to find: y such that h(y)=h(r|x). This is different from collision-resistance in that it doesn't matter whether or not y=r|x. My question:Does this mean that any hash function h(x) is non-hiding if there is no secret r, that is, the hash is Example:Say I make a simple hash function [link] [comments] |
Old man doesn't understand the internet. Posted: 04 Sep 2018 12:10 PM PDT |
Public key keyserver directory Posted: 04 Sep 2018 09:32 AM PDT Which keyserver directory is the one that's most commonly used? [link] [comments] |
Are there older symmetrical or assymmetrical ciphers which are still considered secure? Posted: 04 Sep 2018 04:48 AM PDT Hi, i look for cryptographic algorithms (hashes, symmetric and assymmetric) which are still considered secure, but are not used, due to performance issues (OTP asside). I think serpent and twofish are considered secure. Are there any hashing algorithms or assymmetric ones, which are considered secure but are performance heavy? [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment