• Breaking News

    Tuesday, November 6, 2018

    Cryptography Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)

    Cryptography Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)


    Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)

    Posted: 05 Nov 2018 03:46 PM PST

    Cryptography During the French and American Wars in Vietnam

    Posted: 05 Nov 2018 05:45 AM PST

    Good Applied Cryptography Books

    Posted: 05 Nov 2018 04:58 PM PST

    I'm looking for good books about applied cryptophraphy. I have Serious Cryptography by Jean-Philippe Aumasson, and have been recommended Cryptography Engineering Principles which the note that the material is old and sometimes out of date. Are there any good current Applied Crypto texts?

    submitted by /u/CombustiblePineapple
    [link] [comments]

    Is it safe to use a nacl.box private key as a seed to create a nacl.sign key?

    Posted: 05 Nov 2018 11:34 AM PST

    In the golang library, the nacl.box private key is generated from 32 random bytes. In the nacl.sign package (using ed25519 package), the private key is also generated from 32 random bytes (used as the seed).

    The purpose of this, is so I can store a single 32 byte recovery "key" and then use it to derive both nacl.box and nacl.sign keys.

    This seems safe since both are generated from 32 random bytes. The only caveat I see from doing this is that if there is a flaw in one key it will break the other? Which I think I am ok with.

    So I would do:

    - privateKey = random 32 bytes

    - create nacl.box key, by doing curve25519.ScalarBaseMult(publicKey, privateKey) (this is what nacl.box.GenerateKey does)

    - create nacl.sign key, by doing ed25519.NewKeyFromSeed(privateKey)

    That way I can have both a nacl.box and nacl.sign key from the same 32 byte private key.

    I'm not a cryptographer, so I apologize if this is a weird question.

    submitted by /u/zero02
    [link] [comments]

    No comments:

    Post a Comment