Cryptography I built a CPRNG backed by HMAC-DRBG as CLI tool for creating random entropy in your favorite language or encoding |
- I built a CPRNG backed by HMAC-DRBG as CLI tool for creating random entropy in your favorite language or encoding
- Look for tutorial examples in encrypted data failed in randomness test and illustrate how to debug or improve
- Looking for help on finding key to crypto
- AESencryption offline?
- Is there a solution to hackers bypassing 2FA verification methods?
Posted: 10 Dec 2018 04:08 PM PST |
Posted: 10 Dec 2018 10:02 AM PST Hi, I'm a beginner in crypto and would like to look for tutorial examples in demonstrating how to debug and improve to pass randomness test for the encrypted data given that he tries to design an encrypt algorithm. If you have any suggested tutorial examples for newbie, please feel free to share. I think maybe learning by fail is the straight way to ramp up. Thanks [link] [comments] |
Looking for help on finding key to crypto Posted: 10 Dec 2018 07:28 AM PST Hello, I'm a novice currently doing Security Shepard. It is a project that makes you learn computer security with little exercises. I did all of them exept one. On this exercise, I need to find the key to an encryption method they use. To do this, you have a little application where you can decrypt text that was encrypted by the method. 'IAAAAEkQBhEVBwpDHAFJGhYHSBYEGgocAw==' is decrypted into 'This crypto is not strong' The other exercises were really simpler and I have no idea how to proceed. I think i may need to do a plain text attack but i don't know how. Thanks [link] [comments] |
Posted: 10 Dec 2018 05:08 AM PST Hello! Is it possible to decrypt a text, encrypted with aes256 on aesencryption.net, offline on my computer, without using this website? If so, how would I do it? I have a lot of little notes and links encrypted with it, and would like to still be able to access it, even when the website is down or I have no internet access. [link] [comments] |
Is there a solution to hackers bypassing 2FA verification methods? Posted: 10 Dec 2018 03:01 AM PST You guys might be aware of issues with 2FA verification methods and the other verification methods that have exposed many accounts to various online hackers, Reddit was recently hacked because of a failure in secure encryption methods (Google it) and hackers have even contacted the phone providers for people using the SMS-verification text messages, and forwarded them to their own numbers and hacked accounts, the Google Authenticator method doesn't seem like too bad of an alternative, but it has its own flaws as well. I was reading this article about a solution to the 2FA problems with blockchain and I'd like to see some opinions before I comment further, since blockchain ICOs and projects have written a lot of bogus claims without any real evidence in the past: https://medium.com/p/15280b8a3349?source=user_profile---------9------------------ I would love to see some different opinions, and if this is at all viable, how could businesses implement this? I'm quite new to this kind of tech so if anyone could help explain more about how these systems could work it would be much appreciated. Thanks. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment