Cryptography What are the most common requirements for secure handshakes? |
- What are the most common requirements for secure handshakes?
- OpenSSL AES-256-CTR - Can I change CTR val without re-init?
- Help with factorizing large integers
- Total newb here
What are the most common requirements for secure handshakes? Posted: 04 Mar 2019 04:26 AM PST Hi, I'm currently working on Monokex, a handshake generator inspired from Noise. A bit like the Noise Explorer, only with many features missing. I'll use it to write a set of protocols (with code and documentation), selected for a well defined set of use cases. The end goal is to compete with Noise. Noise is an exquisite research platform, but as a standard to use in production, it is a bit bloated. The specifications are a bit unapproachable to a newbie who just wants to implement a particular pattern, and there are way too many patterns to chose from. My generator already solves the first problem: the specification for each pattern is less than 50 lines long, and the generated C code is not much longer. (100 lines of prelude, 70 more lines per pattern, and it all looks like it was hand written.) The second problem however is a bit more delicate: among all those Noise patterns, which are the most useful, and why? I already have a couple use cases in mind: (reminder about Noise patterns: X means we transmit our public key during the handshake, N means we're anonymous, K means the other party already know our key. For instance "NK" means the initiator is anonymous, and the respondent's key is already known to the initiator. The numbers mean we delay some key exchanges, mostly for anonymity purposes.)
This basically lists the use cases I'm aware of. If you have others, I would be grateful. Another thing: what about protocol negotiation? Noise has provisions for it, by letting users authenticate a prelude. But… is protocol negotiation even useful? My intuition tells me it's just another bug prone complication, but, maybe it has uses beyond protocol versioning? (Edit: err, guys? I appreciate the joke, but so far (march/05, 8AM-UTC), we only have 2 relevant comments out of 9…) [link] [comments] |
OpenSSL AES-256-CTR - Can I change CTR val without re-init? Posted: 04 Mar 2019 12:01 PM PST Currently once I initialize my cipher context, using the following. EVP_EncryptInit_ex(ctx, EVP_aes_256_ctr(), nullptr, key, iv) Eventually I would like to change my counter value to a preferred value after a certain amount of time. Is it possible to update the CTR value or IV without having to run the EVP_EncryptInit_ex function again? [link] [comments] |
Help with factorizing large integers Posted: 04 Mar 2019 10:08 AM PST Looking for tips to solve factorization of large integers(like up to 100 digits). I tried running the fermet's method Java example from https://github.com/eduardolundgren/rsa-prime-factorization but the program has been running for almost 5 days without any end in sight for a 72 digit integer [link] [comments] |
Posted: 04 Mar 2019 09:03 AM PST Hi everyone, I'm an IS healthcare major taking a security class right now. We have an assignment to encrypt a message using the vigenere cipher. Simple enough, but I'm a tad confused. The key to the cipher that we are supposed to use has spaces in between. The key is "this is a key" and I've tried looking online for how this works, but I havent been able to find anything. How does a key work when it has spaces? Thanks in advance. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment