• Breaking News

    Sunday, April 14, 2019

    Cryptography How would you safely send a public key over a Python socket in order to avoid anything like MITM/impersonation attacks?

    Cryptography How would you safely send a public key over a Python socket in order to avoid anything like MITM/impersonation attacks?


    How would you safely send a public key over a Python socket in order to avoid anything like MITM/impersonation attacks?

    Posted: 13 Apr 2019 11:57 AM PDT

    Does a one time pad expose itself as a one time pad?

    Posted: 13 Apr 2019 08:35 PM PDT

    I'm reading Seveneves and the topic of one time pads has come up. I'm a programmer, so I know about this from a pretty distant perspective, but there was one question I had that I couldn't figure out how to Google for. This is the question in the title.

    My thinking is this:

    • You want to be able to communicate with perfect security. You've managed to distribute a one time pad. This pad is actually a book with multiple pads, because you want to be able to communicate more than once.
    • You encrypt one unbreakable message in a one time pad with a question.
    • The receiver answers, and that spawns another question.
    • You use the second pad to deliver your second question.
    • And so on...

    My question is: does the fact that you're using a one time pad leak? That is, if eavesdroppers know who you are, can they tell you're using a book?

    Nothing in the messages will leak, but will the method of delivery itself leak?

    The obvious implication is: if they know you're using a one time book, they'll probably do anything they can to capture it.

    Edit: A commenter who deleted their comment mentioned Kerckhoffs principle

    That you must assume an attacker knows everything but the secret.

    This leads to another thought:

    Assuming they have infinite compute. Is the only unbreakable encryption scheme OTP? If it is, then, if they know who you are, it implies they can realize what you're doing and either intercept any further OTPs you try to pass in the future, or confiscate a book you've passed in the past.

    That is, it's not just that you must use one pad once, but that you must only ever communicate once.

    submitted by /u/trylist
    [link] [comments]

    Linux External NVME SSD - Slow speed (comparison included)

    Posted: 13 Apr 2019 06:24 AM PDT

    Hello everyone,

    I am running an external SSD (Corsair MP510 2TB) via USB-C which on ext4 gets 900-1000MB/s read and write.

    I now tried several different setups and compared the speed. How ever, it seems like veracrypt always slows down the read/write by atleast 50% to the native performance. Also I would like to use the container/SSD on Linux and Windows.

    Archlinux, i7-8850H, 32GB RAM, main SSD: Samsung 970 Pro 1TB

    ext4: 900MB/s - 1000MB/s

    ext4 + veracrypt (ext4): 500MB/s - 650MB/s

    ext4-luks: 650MB/s - 800MB/s

    exfat: 680MB/s

    exfat + verycrypt (exfat): 250MB/s

    exfat-luks: 450MB/s - 500MB/s

    ntfs: 175MB/s

    Anyone has an advice or can recommend a different approach? I already thought about doing just a big .zip file with a password. I think that way I could even dynamically expand the "container".

    submitted by /u/zakazak
    [link] [comments]

    Z-DSA Hash Based One Time Digital Signature

    Posted: 13 Apr 2019 09:41 AM PDT

    No comments:

    Post a Comment