Kryptographie   219

« earlier     later »

A Tutorial on Linear and Differential Cryptanalysis
Abstract: In this paper, we present a detailed tutorial on linear cryptanalysis and
differential cryptanalysis, the two most significant attacks applicable to symmetric-key
block ciphers. The intent of the paper is to present a lucid explanation of the attacks,
detailing the practical application of the attacks to a cipher in a simple, conceptually
revealing manner for the novice cryptanalyst. The tutorial is based on the analysis of a
simple, yet realistically structured, basic Substitution-Permutation Network cipher.
Understanding the attacks as they apply to this structure is useful, as the Rijndael cipher,
recently selected for the Advanced Encryption Standard (AES), has been derived from
the basic SPN architecture. As well, experimental data from the attacks is presented as
confirmation of the applicability of the concepts as outlined.
kryptographie  kryptoanalyse 
december 2014 by grenzreiter
How can you tell if a cipher is secure?
I was asked that question during an interview a while ago. Back then it troubled me because it seemed so basic and yet and I had no idea how to answer it. I became vivid and didn't know what to say and later I didn't get the job. I thought it would be interesting to write down how I would answer this question now.
december 2014 by grenzreiter
offline decentralized single sign-on in the browser
Recently, browsers have just begun to implement web cryptography. This means that browsers are now capable of the same kind of passwordless decentralized…
browser  javascript  appcache  atoms  dev  digg  encryption  kryptographie 
november 2014 by evilkarlothian
The Secret Life of Passwords -
The Secret Life of Passwords
We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts.
november 2014 by grenzreiter
The Cost of Cryptography - Issue 7: Waste - Nautilus
The VENONA project represents one of the most successful counter-intelligence attacks of the Cold War. It revolved around an encryption system, called the “one-time pad scheme,” that was completely unbreakable, but required generating a new, random encryption key for every message. This was hugely inconvenient, and prone to human error. And error is exactly what happened. Someone on the Soviet side (it is still not known who) began to reuse keys, allowing the decryption of about 3,000 top-secret messages by the west.
kryptographie  geld 
november 2014 by grenzreiter | H I E R
Keine Ahnung, was am Ende taugt, aber der Text erklärt recht griffig, warum das mit der Kryptographie so eine schwierige Sache ist. Das meiste davon verstehen auch Nicht-Nerds.
s  kryptographie 
april 2014 by sixumbrellas

« earlier    later »

related tags

201304  analyse  appcache  apple  artikel  atoms  bafin  bank  bankenaufsicht  bernd-schlömer  bias  bin  bitcoin  blog  britt-snider  browser  bruno-kramm  bundestagswahl2013  ceglowski  challenge  chat  cia  comics  computer  crypto  cryptography  cryptonomicon  csu  datenschutz  de-mail  dea  demail  deutschland  dev  digg  djb  edward-snowden  ellipticcurves  email-account  email  encrypted  encryption  enigma  entropie  euklid  faq  fbi  fidor-bank  fluggastdaten-abkommen  fortuna  freebsd  geheimdienst  geld  geocaching  girokonto  git  glenn-greenwald  gnupg  google  gsm  hackernews  haftung  hans-peter-friedrich  hardware  hmac  howto  imessage  internet  itt-world-communications  james-schlesinger  javascript  john-conyers  jon-callas  justin-amash  katharina-nocun  kernel  kinder  kooperation  kryptoanalyse  kryptographie  kryptoparty  ladar-levison  lavabit  linux  louis-tordella  mac  maciej  matasano  mathematik  messaging  metadata  microsoft  mixmaster  mixminion  mobile  münchen  nachwuchs  national-security-letter  navy  nsa  oliver-flaskämper  openpgp  openssl  opportunisticencryption  owncloud  passwort  paste  pastebin  personalpolitik  peter-fenn  pgp  philip-zimmermann  pinboard  piratenpartei  politik  prism  privatsphäre  programming  projekte  provider  random  rc4  rca-global  rekrutierung  remailer  rng  rsa  s  salsa  schließung  schneier  secure  security  shamrock  share  sicherheit  sidechannel  silent-circle  software  spionage  ssh  ssl  statistik  telegraf  text  timingattack  tips  tools  tor  trustedthirdparty  turing_alan  tüv  urandom  usa  vaudenay  verschlüsselung  vorratsdatenspeicherung  web  webseite  werbung  western-union-international  wettbewerbsnachtteil  whirlygig  wikileaks  währung  x509  yahoo  yarrow  zertifikat  überwachung 

Copy this bookmark: