Cryptography How would you safely send a public key over a Python socket in order to avoid anything like MITM/impersonation attacks? |
- How would you safely send a public key over a Python socket in order to avoid anything like MITM/impersonation attacks?
- Does a one time pad expose itself as a one time pad?
- Linux External NVME SSD - Slow speed (comparison included)
- Z-DSA Hash Based One Time Digital Signature
Posted: 13 Apr 2019 11:57 AM PDT |
Does a one time pad expose itself as a one time pad? Posted: 13 Apr 2019 08:35 PM PDT I'm reading Seveneves and the topic of one time pads has come up. I'm a programmer, so I know about this from a pretty distant perspective, but there was one question I had that I couldn't figure out how to Google for. This is the question in the title. My thinking is this:
My question is: does the fact that you're using a one time pad leak? That is, if eavesdroppers know who you are, can they tell you're using a book? Nothing in the messages will leak, but will the method of delivery itself leak? The obvious implication is: if they know you're using a one time book, they'll probably do anything they can to capture it. Edit: A commenter who deleted their comment mentioned Kerckhoffs principle That you must assume an attacker knows everything but the secret. This leads to another thought: Assuming they have infinite compute. Is the only unbreakable encryption scheme OTP? If it is, then, if they know who you are, it implies they can realize what you're doing and either intercept any further OTPs you try to pass in the future, or confiscate a book you've passed in the past. That is, it's not just that you must use one pad once, but that you must only ever communicate once. [link] [comments] |
Linux External NVME SSD - Slow speed (comparison included) Posted: 13 Apr 2019 06:24 AM PDT Hello everyone, I am running an external SSD (Corsair MP510 2TB) via USB-C which on ext4 gets 900-1000MB/s read and write. I now tried several different setups and compared the speed. How ever, it seems like veracrypt always slows down the read/write by atleast 50% to the native performance. Also I would like to use the container/SSD on Linux and Windows. Archlinux, i7-8850H, 32GB RAM, main SSD: Samsung 970 Pro 1TB ext4: 900MB/s - 1000MB/s ext4 + veracrypt (ext4): 500MB/s - 650MB/s ext4-luks: 650MB/s - 800MB/s exfat: 680MB/s exfat + verycrypt (exfat): 250MB/s exfat-luks: 450MB/s - 500MB/s ntfs: 175MB/s Anyone has an advice or can recommend a different approach? I already thought about doing just a big .zip file with a password. I think that way I could even dynamically expand the "container". [link] [comments] |
Z-DSA Hash Based One Time Digital Signature Posted: 13 Apr 2019 09:41 AM PDT |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment