Cryptography OpenSSH adds post-quantum key exchange |
- OpenSSH adds post-quantum key exchange
- Expressing a computation as an NP statement
- Determine the encoding matrix M
- If the NSA keeps encrypted data for as long as it takes to decrypt it, then does that mean they are storing 50% of the worlds traffic per day, every day?
- Is it safe to update Veracrypt to latest version?
- [Question] - Yet Another Post Trying to Get Help With SSL on Python
OpenSSH adds post-quantum key exchange Posted: 19 Apr 2019 12:15 PM PDT from https://www.openssh.com/txt/release-8.0
Protocol seems to be lifted from tinyssh. I think the most important thing is that there is now support for a KEM that can be extended to any KEM that gets standardized instead of relying on a DH type key exchange. [link] [comments] |
Expressing a computation as an NP statement Posted: 20 Apr 2019 12:32 AM PDT Good Morning I am currently studying zero knowledge proofs. In 1991 Goldreich, Micali and Wigderson have shown, that for every language in NP we can construct a ZKP. Matthew Green decribes in his blogpost (https://blog.cryptographyengineering.com/2017/01/21/zero-knowledge-proofs-an-illustrated-primer-part-2/), that we can "just" translate our problem into a boolean circuit, translate it into a graph and run the GMW protocol (even tho this is very inefficient, I would like to understand how this would be approached). Now I would like to know, how this relates into practice. Looking at the libsnark library (https://github.com/scipr-lab/libsnark) they give an example of the representation of a computation as a NP statement: "The C program foo, when executed, returns exit code 0 if given the input bar and some additional input qux." This is how I understand this: "I have some secret inputs. To construct a ZKP, I would have to write a C program that only returns with exit code 0 on this input and then follow the steps from above." Do I get this somewhat correct? Or would it be easier to understand which problems can be represented as a boolean circuit and which not (is there any easy to understand work on this?) Is there any work (books/papers) on the encoding of a computation as a NP statement? [link] [comments] |
Determine the encoding matrix M Posted: 19 Apr 2019 11:30 PM PDT Just a little question I have floating around that I don't know how to tackle. This is not a homework problem. Suppose there is an (mxn) matrix M that acts on bitstrings b of {0,1}^(m) mapping them into bitstrings B of {0,1}^(n). How many bistrings B must you know to determine M (if it is even possible?). If not, can you do it by knowing some of the b's alone? If not , how many maps Mb -> B do you need to know? Relation to crypto: I was thinking about whether or not I could create a secure password with a similar mapping on keyboard inputs. Something like "I type in an English word password of some length, and under some mapping that only I know it is changed to some complicated, longer thing. How many passwords can be stolen before my "map" is figured out? -I don't know if this is close enough to crypto, I just don't have people to ask that are interested in this. I suppose there's probably a simple solution that I can't figure the linear algebra to. [link] [comments] |
Posted: 19 Apr 2019 09:27 PM PDT I read an estimate that around 50% of all internet traffic is encrypted these days, and the article from the Snowden leaks that talked about the NSA keeping all encrypted data was from 2013, when there probably wasn't as much encryption going on. So... how the hell do you store so much data? Do you really believe that the NSA is keeping half of the internets data (per day) stored until they can crack it with quantum computers? https://www.google.com/amp/s/www.cbronline.com/news/internet-encryption-sandvine/amp/ [link] [comments] |
Is it safe to update Veracrypt to latest version? Posted: 19 Apr 2019 12:14 PM PDT I have a FDE with Veracrypt 1.22, i saw there's new version out but I saw some dudes complaining that when he updated he was able to decrypt... so my question is: is it safe to update to the latest version, and if so, what is the correct way to do it? I have never updated Veracrypt, since I encrypted with FDE I've stick to 1.22 but I saw they fixed some stuff since then. I think this is the latest version (1.24-Beta5): https://www.veracrypt.fr/en/Release%20Notes.html But it's beta version, so im not sure... 1.23 I guess its not beta anymore. But for instance, this guys is complaining he can't decrypt: https://sourceforge.net/p/veracrypt/discussion/general/thread/24402bfdf1/ So I don't know what to do. I want to upgrade since there were some interesting fixes, for instance 1.23 hotfix 2 includes:
But how do I know it will work and im not left with a drive that cannot be decrypted? [link] [comments] |
[Question] - Yet Another Post Trying to Get Help With SSL on Python Posted: 19 Apr 2019 09:27 AM PDT |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment