Cryptography Pen on paper cipher contest |
- Pen on paper cipher contest
- Pseudorandom Generators
- RedDye (128/256/512/1024/2048) + native KDF v1.0.2
- How to create self signed CA certificate using openssl
Posted: 29 Sep 2018 11:59 PM PDT I have noticed a growing interest in developing pen on paper ciphers. This is very good in my opinion, however I have also noticed that the same strict standards of cryptography are unfortunately not treated with enough respect in many ideas. Therefore for the interest of the community I suggest a contest with the following rules:
Current standings: Nobody :) [link] [comments] |
Posted: 29 Sep 2018 06:07 PM PDT (this is dealing with Pseudorandom Functions, not PRGs) I have a homework problem I have been struggling with regarding proving or disproving the validity of a PRF F' where F'(k, x) = F(k1, x1)||F(k2, x2) where k={0,1}^2n, x = {0,1}^2n and k = k1||k2, x = x1||x2 and k1, k2, x1, x2 are all {0,1}^n || stands for concatenation. I'm not really sure how to approach this problem. It seems with all the concatenations, that there should be some way to break this scheme, but at the same time, since k1 and k2 are really just random bits that we cant access, i can't think of a x value that will give any information away about the potential PRF. This is a homework problem, so obviously I want to be able to figure it out without being given the answer, but if anyone could help point me in the right direction it would be appreciated! [link] [comments] |
RedDye (128/256/512/1024/2048) + native KDF v1.0.2 Posted: 29 Sep 2018 12:43 PM PDT https://github.com/pvial00/RedDye RedDye implementations for key sizes between 128-2048 bits have been uploaded. They've all been optimized for speed. The 2048 bit version performs the fastest because it doesn't require a second counter and uses and & operation instead of modulo for k(c +1). I clocked 1GB encrypting in 2 seconds with the 2048 bit version. The PBKDF2 implementation has been removed. The native RedDye KDF has been reworked and works beautifully now. A handy graphic detailing the key stream generator has been uploaded, as well. I plan to have more formal documents and will upload keystream analysis tools once I've put the finishing touches on it. This should help shed more light on the statistical properties of the keystream itself. I recommend if you plan on using or analyzing this cipher to use this optimized implementation. [link] [comments] |
How to create self signed CA certificate using openssl Posted: 29 Sep 2018 04:38 AM PDT How to create self signed CA certificate using opensslIn this article i have tried my best illustrate Self signed CA certificate using openssl command line tool. I am still excited to know more about these topic and continued reading on it. particular in this article i have shown CA certificate creation in few simple steps. I have shown how to create Private keys on specif size using RSA Algorithm. I have shown how to create CSR and CRT File. I have used openssl command line tool to create this self signed certificate. You can create or perform this lab either on windows or Linux but in this case i have used redhat Linux Machine. you can read the complete article from my blog I am giving you the link. https://linuxtiwary.com/2018/09/24/how-to-create-self-signed-ca-certificate-using-openssl/ [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment