• Breaking News

    Tuesday, December 11, 2018

    Cryptography I built a CPRNG backed by HMAC-DRBG as CLI tool for creating random entropy in your favorite language or encoding

    Cryptography I built a CPRNG backed by HMAC-DRBG as CLI tool for creating random entropy in your favorite language or encoding


    I built a CPRNG backed by HMAC-DRBG as CLI tool for creating random entropy in your favorite language or encoding

    Posted: 10 Dec 2018 04:08 PM PST

    Look for tutorial examples in encrypted data failed in randomness test and illustrate how to debug or improve

    Posted: 10 Dec 2018 10:02 AM PST

    Hi,

    I'm a beginner in crypto and would like to look for tutorial examples in demonstrating how to debug and improve to pass randomness test for the encrypted data given that he tries to design an encrypt algorithm. If you have any suggested tutorial examples for newbie, please feel free to share. I think maybe learning by fail is the straight way to ramp up.

    Thanks

    submitted by /u/netj_nsh
    [link] [comments]

    Looking for help on finding key to crypto

    Posted: 10 Dec 2018 07:28 AM PST

    Hello, I'm a novice currently doing Security Shepard. It is a project that makes you learn computer security with little exercises.

    I did all of them exept one.

    On this exercise, I need to find the key to an encryption method they use.

    To do this, you have a little application where you can decrypt text that was encrypted by the method.

    'IAAAAEkQBhEVBwpDHAFJGhYHSBYEGgocAw==' is decrypted into 'This crypto is not strong'

    The other exercises were really simpler and I have no idea how to proceed.

    I think i may need to do a plain text attack but i don't know how.

    Thanks

    submitted by /u/blaftrat
    [link] [comments]

    AESencryption offline?

    Posted: 10 Dec 2018 05:08 AM PST

    Hello!

    Is it possible to decrypt a text, encrypted with aes256 on aesencryption.net, offline on my computer, without using this website? If so, how would I do it?

    I have a lot of little notes and links encrypted with it, and would like to still be able to access it, even when the website is down or I have no internet access.

    submitted by /u/naivu
    [link] [comments]

    Is there a solution to hackers bypassing 2FA verification methods?

    Posted: 10 Dec 2018 03:01 AM PST

    You guys might be aware of issues with 2FA verification methods and the other verification methods that have exposed many accounts to various online hackers, Reddit was recently hacked because of a failure in secure encryption methods (Google it) and hackers have even contacted the phone providers for people using the SMS-verification text messages, and forwarded them to their own numbers and hacked accounts, the Google Authenticator method doesn't seem like too bad of an alternative, but it has its own flaws as well.

    I was reading this article about a solution to the 2FA problems with blockchain and I'd like to see some opinions before I comment further, since blockchain ICOs and projects have written a lot of bogus claims without any real evidence in the past: https://medium.com/p/15280b8a3349?source=user_profile---------9------------------

    I would love to see some different opinions, and if this is at all viable, how could businesses implement this? I'm quite new to this kind of tech so if anyone could help explain more about how these systems could work it would be much appreciated. Thanks.

    submitted by /u/Mohsen416
    [link] [comments]

    No comments:

    Post a Comment