Kryptographie   280

« earlier     later »

A Tutorial on Linear and Differential Cryptanalysis
Abstract: In this paper, we present a detailed tutorial on linear cryptanalysis and
differential cryptanalysis, the two most significant attacks applicable to symmetric-key
block ciphers. The intent of the paper is to present a lucid explanation of the attacks,
detailing the practical application of the attacks to a cipher in a simple, conceptually
revealing manner for the novice cryptanalyst. The tutorial is based on the analysis of a
simple, yet realistically structured, basic Substitution-Permutation Network cipher.
Understanding the attacks as they apply to this structure is useful, as the Rijndael cipher,
recently selected for the Advanced Encryption Standard (AES), has been derived from
the basic SPN architecture. As well, experimental data from the attacks is presented as
confirmation of the applicability of the concepts as outlined.
kryptographie  kryptoanalyse 
december 2014 by grenzreiter
How can you tell if a cipher is secure?
I was asked that question during an interview a while ago. Back then it troubled me because it seemed so basic and yet and I had no idea how to answer it. I became vivid and didn't know what to say and later I didn't get the job. I thought it would be interesting to write down how I would answer this question now.
december 2014 by grenzreiter
offline decentralized single sign-on in the browser
Recently, browsers have just begun to implement web cryptography. This means that browsers are now capable of the same kind of passwordless decentralized…
browser  javascript  appcache  atoms  dev  digg  encryption  kryptographie 
november 2014 by evilkarlothian
The Secret Life of Passwords -
The Secret Life of Passwords
We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts.
november 2014 by grenzreiter
How Not to Learn Cryptography | Outsourced Bits
People often ask me how to get started in cryptography. What’s interesting is that most of the time they also want to know how I personally got started. This is interesting to me because it suggests that people are looking for more than a list of books or papers to read or set of exercises to solve; they’re really looking for a broader strategy on how to learn the subject. In this post I’ll discuss some possible strategies.
november 2014 by grenzreiter

« earlier    later »

related tags

appcache  apple  atoms  bafin  bank  bankenaufsicht  bernd-schlömer  bin  bitcoin  browser  bruceschneier  bruno-kramm  bundestagswahl2013  bürokratie  cache  ceglowski  challenge  chat  comics  computer  crypto  cryptography  csu  de-mail  dea  dev  digg  djb  edward-snowden  ellipticcurves  email-account  email  encrypted  encryption  entropie  fidor-bank  fluggastdaten-abkommen  fortuna  freebsd  geheimdienst  geld  geocaching  geschichte  gesellschaft  girokonto  glenn-greenwald  gnupg  google  gsm  hackernews  haftung  hans-peter-friedrich  hardware  howto  humor  imessage  internet  javascript  john-conyers  jon-callas  journalismus  justin-amash  katharina-nocun  kernel  kinder  kommunikation  kooperation  kryptoanalyse  kryptographie  kryptoparty  ladar-levison  lavabit  linux  literatur  mac  maciej  mathematik  md5  messaging  messenger  microsoft  mixmaster  mixminion  mobile  mobiltelefon  münchen  nachwuchs  national-security-letter  nsa  oliver-flaskämper  online  openpgp  openssl  opportunisticencryption  paper  passwort  paste  pastebin  personalpolitik  pgp  philip-zimmermann  pinboard  piratenpartei  prism  privatsphäre  programming  provider  random  rekrutierung  remailer  rng  rsa  s  salsa  schließung  schneier  secure  security  sehen  sex  share  sicherheit  sidechannel  silent-circle  software  spionage  ssl  text  timingattack  tips  tools  tor  trustedthirdparty  tüv  urandom  usa  verschlüsselung  verwaltung  video  vorlesung  vorratsdatenspeicherung  web  webseite  werbung  wettbewerbsnachtteil  whirlygig  wikileaks  wtf  währung  x509  yahoo  yarrow  youtube  yubikey  zertifikat  zitat  überwachung 

Copy this bookmark: