Cryptography Tessercube — OpenPGP Made Mobile |
- Tessercube — OpenPGP Made Mobile
- Need help decrypting this problem with a Vigenere cipher
- Very confused by the wording of the number 1 rule seen in the matasano/cryptopals challenges...
- Rust, dudect and constant-time crypto in debug mode
- Who are the currently reigning crypto gods?
- Python 3 Factorization Tools (for your tool belt)
- looking for a technique
- What's the job market in research/academia like?
Tessercube — OpenPGP Made Mobile Posted: 21 Apr 2019 10:09 AM PDT Recently I have been working on this project in the sense that I feel there is no good OpenPGP utility on iOS. By good, I mean the UX should be good, and the license should be AGPL or GPL. In the process, we got the idea of App Penetration — by making OpenPGP into keyboards (input methods), we can literally be end-to-end encrypted when using any channel of communication, as long as the other side can decrypt — on Facebook Messenger, on Telegram, on iMessage, whatever. For now, we have been releasing Android beta test versions on our website (https://tessercube.com/) and GitHub (https://github.com/DimensionDev/Tessercube-Android). The iOS version shall follow soon. It might be a bit early to announce because there are plenty of bugs and a big shortage of tutorials, but I believe hardcore users can go through it. If you find any bug, just go to issues. And I will appreciate! [link] [comments] |
Need help decrypting this problem with a Vigenere cipher Posted: 21 Apr 2019 06:59 PM PDT I have this cipher-text down below as well as the decryption key and alphabet but cannot seem to be able to decrypt it with the vigenere cipher and I am unsure what I am doing wrong. Cipher-text: Q!ZML.UXX.P6Z,SX2A5,MYE57T255VEF,5OZ66X4I4,95MYJ9.PYG8WEFLAWE3Z;SK9.:WCYJ80K9Z3SU6ZE6E37X2VAJ:OIEZA*ZB:5NE,GX.WA;XSE:H3ZE;3CYMDZEWI:ZF5L6EXXZ2A.OZAJ*W1FFXVQD73.QAAXWQ8,EWM!Z;6VF,DO1AZ29M2;X0VFBX.P,FX,6EG54FYG8WE7.C,1YGCSVE:1.QAAX:IEZA9W5H3WLY.:O06CEWU37CO9VRLNE,GXUI:7X6V6ZHWM*Z1X16EXSE4EFUQ2:X2MKZE6EF,5OXGMK3MY,1VE3755EEH7YMEG5VE3LXYM!7G0MH7XYZAG,SVWZ15EE.DORGA96ZY5CAXF3:STKFENE2AXSV2:!YEI3DOKAAD.ZG5EWLYH:VMDZEZMY699M4G96VYB6OT6BX9WE7:ME2AX,QEZ55O,A5WZWZ15LYJ8WVY.EO42FX6X6E1.QAA13CYG8WEGFXZI5Z1UK6FDO1AZ13TYB6O197XZQ8,X3MH7*OR2C15ME7XVQB:!4IF.3OKA!;*V,51.QAADNE:EWOZAJ*W1FFXS42E4,E,A33257X502Z5!K6CE0W!3*OK,I93Q2AX,MDI9UMY3HSZ5XX.P6Z:S1,B:STY.:.M;:9YM!55OL,FE0V8H9,P66X,MDI9UMY!5VI;XX.P6ZA9ME.4WVFFXS42E4ONAEXVQEG95OG.DZM5Z6WL6E13E4.G0T,3:O06EG0K6XX.P6Z:S1,B:STYF5U2D.EAE:74STWZ15LY.:O9VTPOKAA79MEFXS42E4WLY,94ENNLM8MNXXWDZ800Y.:;M!G96VEZ8WT5ZDWKD7EOJKZEZMY9!;MDA;WVFY Key: i231s Alphabet: abcdefghijklmnopqrstuvwxyz0123456789,. ;:! The cipher-text comes out as this: in 1938, the japanese replaced the red machine with the type b machine, which came to be known as p*h9mc222u,ke8l,726va:25bp;,.;r.66;se9ys, huoi3h8x*9a3;.851zbi5y8.95q2s91xrld,32r1ayrag1k5.;,39.i4s;.hf2:dbug:g9tp3qhag:q5,26!i5y8.lx2rog.n!b90g3m1!o,s99lzq1idjz0ts:.7xwz.d,orv91*ht.:f2p6rd2;83bwpazzh erusx2,v,cbz;st9rcpxdrt5z zt4x9rc9p zop::zwpp p4268.htdrtt.24vy1e ;n,o,ul666z3 1rbyp68bw7 rxl.2xpy.j vn ,y;569zsh ;z;o1hzd41e8;zy26fzph9tp60rbypi3thxd1jyx, .htdy;70,8;t 2bb3pe,f2tj3pytbp;40,rv3p;veht8xf3.2:phtb6;zy2:ipp;3hspbzwp*g5!rjx0rgfn4onxwwsklgynov*nications. mr. row*.j;t,7musbj22oackxf,eiu;co8yqr!e7b*1zsaha5k8.h11ah71gvv5:np.i4orm5as9m58g3mi1v6h.1xxd10s;s;,q!hh4oy.h11ah71g7d8xvp.i4orog123c9,3;.5dk c12y .852:hc343r 1nre90o !atm3u;8svm1!o u;zop.i4orm5as9m58g;d7b13sntwzc58er!c0g3m1idl31zy8fg12;.5dk c90g2hbt.fzzh,f.,.1rg;!g3mk1x:hd,2rg98nrr9z1zs1y8rs 1g1nk118l9,3q It's getting the first part of the text but not the rest. I am so confused, please help. [link] [comments] |
Very confused by the wording of the number 1 rule seen in the matasano/cryptopals challenges... Posted: 21 Apr 2019 11:11 AM PDT https://cryptopals.com/sets/1/challenges/1 The bottom says: "Always operate on raw bytes, never on encoded strings. Only use hex and base64 for pretty-printing." Well, I found this minimal-line solution in Python online... : 1) Does this solution violate the rule? In Python, don't encoded strings = raw bytes? And isn't this using base64 for more than just pretty-printing? Also, I wanted to write a very manual solution myself where I created my own base64 table in a dictionary ("my_b64_table") so here's my longer take: 2) Does my solution violate the rule? My objective was to not use the base64 library at all. [link] [comments] |
Rust, dudect and constant-time crypto in debug mode Posted: 21 Apr 2019 02:38 AM PDT |
Who are the currently reigning crypto gods? Posted: 21 Apr 2019 04:04 PM PDT Hi, who are the people you trust when it comes to judging current and future security of the cyphers / crypto algorithms used these days? Who do you believe is competent enough with the mathematics behind cryptography to give profound estimates about how probable it is, that ciphers are already broken by intelligence agencies, or perhaps backdoored? NIST? Schneier? Krebs? Elgamal? Bernstein? Lange? Reddit? Best, Jepp [link] [comments] |
Python 3 Factorization Tools (for your tool belt) Posted: 21 Apr 2019 03:06 PM PDT Was looking for a working Factorization program in Python 3 but couldn't find one. So I tried my best to port existing code and it's "working." I'm newbie to Python alien tech but the space ship seems to be armed an operational. (Sorry I like metaphors). Haven't tested where it lies in terms of speed, but it seems to eat a lot of large numbers for breakfast. Wanted to share, but appreciate any comments or changes. [link] [comments] |
Posted: 21 Apr 2019 01:33 PM PDT so, two individuals that can publicly (everyone can hear) share information , no extra information about each other, no private channels; is there a way in which subjectA can encrypt something to subjectB that only subjectB can decrypt? [link] [comments] |
What's the job market in research/academia like? Posted: 21 Apr 2019 06:55 AM PDT I'm a college freshman and initially my goal was to get a PhD in pure math and go for a professorship. Recently, however, I've come to learn how absolutely bleak the job market is for TT professors in math. In light of that, I'm doing some soul searching and trying to find something related that has good job prospects so that either I have a Plan B if at any point I decide to give up the pipe dream, or so I can start working towards something else entirely. What kind of jobs are available in cryptography for someone like me who is more math-oriented? Is the job outlook for a researcher, in academia or in industry/government/national labs, reasonable? If I were to do a PhD in some pure math topic that isn't obviously or explicitly connected to cryptography, would I even be in the running for these jobs? Obviously I'm super early in my career so nothing is set in stone. Just trying to figure out the best path I can take that will have a good balance between my interests and practicality. Thanks! [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment