Cryptography German Enigma from WW2. I never thought I’d see one in person. |
- German Enigma from WW2. I never thought I’d see one in person.
- I'm in a course titled encryption and feel like I have barely learned anything.
- Feistel Cipher Proof
- Block Cipher Modes of Operations
- ED25519 question
- [Python 3] [PyNaCl] - Implementing Diffie-Hellman Key Exchange, Perfect Forward Secrecy, and Identity Verification. Is it possible?
- Why are there two RSAs for Kleopatra PGP and what is the "Valid Until" thing about?
- EasyPGP — library for mobile devices
- Name of process where you exchange information secretly over a public channel by using keys
German Enigma from WW2. I never thought I’d see one in person. Posted: 07 Apr 2019 10:10 AM PDT |
I'm in a course titled encryption and feel like I have barely learned anything. Posted: 08 Apr 2019 12:32 AM PDT I need to go over some stuff over the summer. I want to dedicate atleast 10-20 hours to actually studying what I could of learned this semester. I just write off the notes. I forgot what a block cipher was, all i know is that it is a determinstic function that encrypts something. That's the only way I can freaking describe it. Is there a way I can learn over the summer? Can a book be enough to help me actually learn something? I can't find an online course on udemy. I did learn some stuff but not alot. Can someone answer this question for me though if you can, when your teacher lectures say a few weeks ago used to explain something. Could you even remember what it was? Like I always forget. [link] [comments] |
Posted: 07 Apr 2019 06:32 PM PDT How can I prove that a two-round Feistel cipher using the functions f, g in that order results in a different permutation of the set of possible inputs (x, y)? [link] [comments] |
Block Cipher Modes of Operations Posted: 07 Apr 2019 04:17 PM PDT I am new to this subject and could use help understanding the encryption process using modes of operations. For example, I have a Feistel cipher with block length 2, and a key that is a pair of mappings σ, τ on the set of symbols. To encrypt (x, y) we use:
and then,
if σ(x) = x2 , τ (x) = x3 , how do I encrypt a the string 777777 using Electronic CodeBook mode? [link] [comments] |
Posted: 07 Apr 2019 05:59 AM PDT ED25519 key generation is done by generating random 32 seed, then hashing seed with sha2-512 where first 32 bytes are used as private key and derived public key from it, other half of hash is used as initial fixed nonce used in signing process. Replacing the nonce with random one for each signing will not break verification of signing process. What are pros end cons if nonce is replaced with random nonce for each signing ? Edit: Key generation Signing process I would like to implement into signing process next changes that would not affect verifying process. so for each signed messages z is replaced with different value. I trying to come into conclusion how much is this necessary, does it improve security and how safe is.Since I am an beginner in cryptography, I would like to see opinions of more experienced minds first. [link] [comments] |
Posted: 07 Apr 2019 08:16 AM PDT Currently, I am working on a project in Python which is dependent on secure communication. To accomplish this, I am currently making use of the PyNaCl library built off of (big surprise) NaCl. I'd like to make this communication between parties as private and secure as possible. The way I've somewhat resolved how to do this after a bit of research is by having:
Any assistance that you all can provide in either correcting my procedure and/or explaining how I can accomplish this in PyNaCl would be extremely appreciated. My only other question would be that since we are trying to use this potentially in a mobile device environment, would this absolutely swallow data? Thank you for any help you can provide in advance, and please bear with me if I ask stupid questions. I'm not brand new at this, but I'm far from an expert. [link] [comments] |
Why are there two RSAs for Kleopatra PGP and what is the "Valid Until" thing about? Posted: 07 Apr 2019 08:04 AM PDT Basically title says it. There are two RSA check boxes to check. Also what is the valid until thing about? Like literally how does it work? Since when do signature algorithms automatically expire after a date? Also literally what is Authentication checkbox in there for? Edit: Here's screenshot: https://imgur.com/MkQ0Y2g [link] [comments] |
EasyPGP — library for mobile devices Posted: 06 Apr 2019 10:54 PM PDT Hi all, Just wanted to share a small library I've made — EasyPGP Its goal is to provide simple cryptography primitives usable across iOS/Android apps and their backend servers. EasyPGP is a tiny wrapper around Go's OpenPGP which is usable on mobile platforms via gomobile. It also has protobuf description for messages, so it can be easily integrated into gRPC. I'm also wondering whether this is sane approach, as there is NaCl/libsodium, but those seemed somewhat more hard to use and there was not consistent encoding format(there is armoring in PGP). [link] [comments] |
Name of process where you exchange information secretly over a public channel by using keys Posted: 06 Apr 2019 10:17 PM PDT Figured this subreddit would have the best chance at knowing what I'm talking about: I witnessed this being done on Yik Yak when it was a thing and can't remember what it was called. One user posted a key, some number, and another user does something with that key and returns with another number. The original user does something with that new number, and the end result is they both have a new key that each other are aware of but nobody who was observing them would know. Anyone know the name of this process? [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment