• Breaking News

    Tuesday, February 5, 2019

    Cryptography Things that use Ed25519 (Updated: January 23, 2019).

    Cryptography Things that use Ed25519 (Updated: January 23, 2019).


    Things that use Ed25519 (Updated: January 23, 2019).

    Posted: 05 Feb 2019 02:35 AM PST

    Cracking a KeePass Database Using Multiple Versions of KDB File?

    Posted: 04 Feb 2019 01:15 PM PST

    Hi guys, I have some concerns about a hypothetical attack on a KeePass database, and I wanted to check with this sub to see if those concerns are valid.

    Hypothetically, let's say that I have a KeePass database. It has dozens of password entries stored in it. It is encrypted with AES, using a master password and a key file. Every so often, after I make some changes to the database or add new entries, I'll back up the database file to a cloud service (but not the key file of course, as that must be kept secure).

    So my question is this: could an attacker decrypt the database by analyzing a collection of different versions of the database? If they were to acquire over a dozen different versions of the database, which use the same password and key file, is it possible (and practical) to do some sort of cryptographic analysis on the files collectively?

    I'm asking because I want to make sure that my backups will not collectively become a security vulnerability.

    submitted by /u/Waffle_bastard
    [link] [comments]

    Trust Models for Secure Network Connections - DZone Security

    Posted: 05 Feb 2019 02:09 AM PST

    How do people encrypt a plain text of 0 when using RSA encryption

    Posted: 04 Feb 2019 10:20 AM PST

    As the title suggests, I understand the basics of RSA encryption and why when you use 0 as the plain text it does not work. My questions is how is this handled in the real world? Thanks!

    submitted by /u/ST6xMaverick
    [link] [comments]

    Pros and Cons

    Posted: 04 Feb 2019 03:21 PM PST

    Can anyone help me with figuring out the best cryptography program? Im looking to compare Veracrypt, Axcrypt, 7-zip and gnu privacy guard. I cant decide.

    submitted by /u/philquake
    [link] [comments]

    Mathematical hints for a public key brute force problem

    Posted: 04 Feb 2019 07:34 AM PST

    Charlie has intercepted Alice and Bob public key exchange (Diffie-Hellman). He now wants to crack it by brute force, using parallelization. But Charlie is not so clever and is making some tricky mistakes.

    This article analyzes some of Charlie naive mistakes and gives some mathematical hints about.

    https://fedetask.com/brute-force-craking-public-key/

    This post doesn't want to give any important insight, but rather analyze some common mistakes that people do when dealing with resource expensive computations

    submitted by /u/fedetask
    [link] [comments]

    What hash function should I use, for small inputs (fit in 1-2 blocks of 512) if I want a 196 bit hash that costs about storage of 2^95 of them before finding a collision?

    Posted: 04 Feb 2019 06:58 AM PST

    I'm considering using the first 96 and last 96 bits of sha2-512. Is there a faster (on cpu) andOr more secure way?

    When you add or xor a pseudorandom number into a state, you lose about 1 bit. So if theres a loop size 64 in sha2-256, its losing at least about 64 bits of its 256 bit state, and thats only if its a strong pseudorandom per iteration. It may be losing more. So even though sha2-256 has a 256 bit output, if you only gave it a random 2 ^ 256 inputs you'd probably get much less than that possible outputs. I'm skeptical that 192 bits of sha2-256 would solve my problem. Though I havent looked deep into it.

    EDIT: sha2-512 takes 1024 bit chunks

    submitted by /u/BenRayfield
    [link] [comments]

    No comments:

    Post a Comment