asteroza + cryptography   233

pocs/ at master · corkami/pocs
Instant (pre-computed prefix), re-usable & generic (any file pair!) MD5 collisions over different file formats. If someone were a real bastard, and got their hands on a naughty file hash database, this can wreak untold havoc
MD5  hash  collision  cryptography 
27 days ago by asteroza
Cryptology ePrint Archive: Report 2018/962 - Zexe: Enabling Decentralized Private Computation
Interesting use of zcash protocol for arbitrary computation purposes. Might enable a distributed exchange
Zcash  protocol  zero  knowledge  proof  algorithm  cryptography  research  computer  science 
october 2018 by asteroza
Cryptology ePrint Archive: Report 2018/183
zero knowledge proof-of-time for cryptocurrencies, by Bram Cohen (for use by Chia?)
cryptography  algorithm  research  zero  knowledge  proof-of-time  cryptocurrency 
august 2018 by asteroza
Home - Chia Network
Bram Cohen is working on a cryptocurrency using proof of space/time
blockchain  proof-of-space  proof-of-time  cryptography  cryptocurrency 
august 2018 by asteroza
saltpack - a modern crypto messaging format
thin wrapper around NaCl library using MessagePack format, as an alternative to PGP
encrypted  messaging  format  saltpack  cryptography  encryption  messagepack  nacl  PGP  GPG 
may 2018 by asteroza
prosthetic knowledge — FontCode Research from Columbia Computer Graphics...
Using font kerning as a form of steganography, very subtle, but with high rez pictures, can you run the reverse, checking against known fonts to detect possible steg usage, or do you have to allow for enough slop in printing and camera angle that you would get too many false positives?
FontCode  encryption  cryptography  steganography  fingerprinting  font  kerning  glyph  perturbation 
april 2018 by asteroza
Round 1 Submissions - Post-Quantum Cryptography | CSRC
Round 1 candidates for the new NIST post-quantum cryptographic algorithm contest
NIST  contest  post-quantum  post  quantum  encryption  cryptography  algorithm  research 
december 2017 by asteroza
bifurcation/treekeys: Group Keying via Trees
Looks like a PoC of the asynchronous ratcheting tree protocol in Go
encryption  cryptography  e2e  asynchronous  ratcheting  tree  protocol  messaging 
november 2017 by asteroza
BlindHash-Restoring Trust in Passwords
Password hashing security as a service (more like salt as a service), using a 16TB salt and a new blind hashing technique. Functions like a Crypto Anchor.
security  service  password  blind  hash  encryption  cryptography  salt  CryptoAnchor 
november 2017 by asteroza
Home - Hashgraph
Some sort of new distributed ledger with higher transaction throughput compared to bitcoin, doesn't seem to use either Proof of Work or Proof of Stake, and supports byzantine faults. But it seems it trades faster TPS for bad actor security, since this is vulnerable to a 1/3 bad actor ratio, compared to bitcoin's majority bad actor ratio. Also PATENTED so requires a license...
encryption  cryptography  cryptocurrency  bitcoin  blockchain  distributed  ledger  hashgraph  consensus  software 
november 2017 by asteroza
Securing customer data with KMS and Envelope Encryption in Node.js
Interesting pyramid/stacked encryption model to encrypting data with per tenant keys, but the weak point is the AWS KMS stored master key
AWS  cryptography  stacked  envelope  encryption  federated  key  rotation  security  cloud 
october 2017 by asteroza
Black Hat 2017 USA – OpenCrypto: Unchaining the JavaCard Ecosystem | Magic of Se...
Reusing JavaCard security primitives to backport/implement EC crypto where it doesn't currently exist
javacard  elliptical  curve  cryptography  backport  OpenCrypto  security  encryption  research  EMV  smartcard  java  Delicious 
may 2017 by asteroza
"Practical" attack, as in well funded corp or nation state level attack since it needs 110 GPU years...
SHA-1  practical  attack  cryptography  research  security  Delicious 
february 2017 by asteroza
Cryptology ePrint Archive: Report 2017/003
STROBE (similar to BLINKER) crypto framework for building out primitives into useful security constructs for IoT devices
IoT  cryptography  cryptographic  protocol  construct  primitive  framework  security  Delicious 
january 2017 by asteroza
roughtime - Git at Google
with the right inputs, this effectively makes a clockchain...
time  sync  synchronization  security  NTP  research  opensource  software  roughtime  cryptography 
september 2016 by asteroza
Secure Secure Shell
New SSH hardening guides based on Snowden revelations of NSA techniques/targets. Go big, go curvy, or go home.
security  SSH  configuration  guide  howto  tutorial  refence  information  encryption  sysadmin  tips  tricks  reference  hardening  config  linux  cipher  selection  key  DSA  RSA  ECDH  elliptical  curve  cryptography  ECDHE  attack  hacking  guideline  shell  Delicious 
may 2016 by asteroza
[1603.03720] Unexpected biases in the distribution of consecutive primes
Oh snap, random primes not so random. As in a given prime appears to predict attributes of the followng prime. This will not end well...
prime  number  randomness  mathematics  algorithm  research  technology  security  encryption  cryptography  Delicious 
march 2016 by asteroza
Cryptology ePrint Archive: Report 2016/008
Chaum's key escrow mix protocol system, requires unanimous vote of 9 servers to decrypt a message. In a way, a proposed "legal" crypto backdoor...
key  multikey  escrow  network  message  mix  protocol  backdoor  PrivaTegrity  security  cryptography  research  encryption  Delicious 
january 2016 by asteroza
The Untold Story of PKCS#11 HSM Vulnerabilities | Cryptosense
SafeNet Luna HSM's have secret key leakage issues, but that's a protocol issue and not necessarily an implementation issue (though one could argue that it ends up being an implementation error...)
PKCS#11  PKCS11  HSM  security  implementation  secret  key  leak  leakage  protocol  bug  error  encryption  cryptography  Delicious 
november 2015 by asteroza
Password Hashing Competition
Argon2 is like scrypt, but the implementation is simpler to formally analyze
password  hash  algorithm  Argon2  scrypt  cryptography  security  research  Delicious 
november 2015 by asteroza
The Shappening
So, why hasn't a kickstarter happened to crowdsource the $100K or so needed to crack SHA-1 on AWS and permanently put it out to pasture?
SHA1  SHA-1  collision  hash  encryption  crytography  cryptographic  algorithm  software  research  security  hacking  freestart  attack  cryptography  Delicious 
october 2015 by asteroza
« earlier      
per page:    204080120160

related tags

0-RTT  1.3  2FA  802.11  academic  acceleration  accelerator  access  acoustic  activism  AD  addon  advice  AES  AGI  airgap  ajax  algorithm  algorthm  alogirthm  alternative  analysis  anchor  android  anonymity  anonymous  ANSI  antiDMCA  apache  app  applet  applied  architecture  archive  Argon2  articles  ASK  asterisk  asynchronous  attack  attacks  AU  auction  audio  audit  authenticated  authentication  authority  automatic  AWS  back  backdoor  backport  backup  Barbie  BBC  beat  behavior  best  biometrics  bit  bitcoin  bitlocker  bitmessage  blind  block  blockchain  blog  blowfish  book  boot  branch  break  breaking  broadcast  broswer  browser  brute  BSD  bug  C++  CA  calculation  candidate  card  cargo  cartoon  CD  cellphone  certificate  certifying  Certigate  CGD  change  channel  chat  check  chip  chrome  cipher  ciphershed  citadel  Cleversafe  client  clipperz  clockchain  cloud  CloudFlare  cluster  CNN  code  coded  cold  collaboration  collection  college  collision  comic  communication  communications  competition  composite  computer  computing  ComSec  comunication  concept  concurrent  config  configuration  consensus  construct  container  contest  correction  courses  covert  CPU  cracking  Craigslist  crate  credit  crossing  cryptanalysis  CryptDB  crypto  CryptoAnchor  cryptocurrency  CryptoDox  cryptographic  cryptography  CRYPTOLOG  crytography  CSPRNG  CSR  curve  custom  CyberLocator  daemon  DARPA  data  database  dataglyph  ddon  decentralized  decrypter  decryption  defcon  defense  defensive  Delicious  delivery  demo  deniable  DES  design  detection  development  device  devices  DHT  diffie-hellman  digital  direct  directory  disaster  disk  dispersal  dispersed  distributed  distribution  diy  DMA  DMCA  DNS  document  DoD  domain  download  drive  driver  drop  DSA  dubsteg  dubstep  dynamic  e-commerce  e2e  ebook  EC2  ECC  ECDH  ECDHE  EchoLink  ed25519  education  EFF  EKE  electronic  electronics  elliptic  elliptical  elpitical  email  embedded  EMV  EncFS  encoding  encrypted  encrypter  encryption  end-to-end  engineering  enigma  entropy  envelope  error  escrow  espionage  ETSI  europe  event  exchange  exe  exfiltration  experimental  exploit  extension  extracting  extractor  eye  factoring  failsafe  fair  family  fast  FDE  FEC  federated  fernet  field  figure  file  filesystem  filetype:pdf  fingerprint  fingerprinting  FIPS-202  FIPS202  firewire  Flagstone  flash  FlowingMail  font  FontCode  force  forced  forensics  fork  formal  format  formfactor  forward  FourQ  FPGA  frame  framework  free  FreeBSD  freenet  FreeOTFE  freestart  freeware  full  function  FUSE  fuzzing  fuzzy  gaim  generator  geo-encryption  GeoCodex  geolocation  ghost  global  glyph  go  google  GPG  GPS  graphic  grid  ground  GSM  guide  guideline  guidelines  habit  hack  hacking  halftone  hard  hardening  hardware  hash  hashgraph  hibernation  hidden  Hifn  high  history  HMAC  homomorphic  host-proof  hosting  hostproof  howto  HPN-SSH  HSM  HTTPS  human  humor  HWRNG  IBM  icon  iconography  IDA  identity  IICS  III  illustrated  im  image  imaging  implementation  Infineon  infographic  information  infosec  infrastructure  instagram  instruction  intel  internal  internet  invite  iOS  IoT  iPhone  iPod  issue  J-PAKE  jabber  jamming  japan  java  javacard  javascript  JSON  JWT  KALE  KDDI  keccak  kerning  key  keychain  keygen  keylength  keyword  kit  knowledge  kruptos  laboratory  labs  law  leak  leakage  learning  ledger  legal  length  level  library  lifetime  linux  list  listing  littleblackbox  location  low  mac  machine  magazine  malicious  management  manga  manual  market  mathematics  MD5  meassaging  media:document  memory  Merkle  message  messagepack  messaging  microSD  microsoft  minimum  mitigation  mix  Mixmaster  mixminion  mobile  module  moduli  movement  mp3  MP4  MPC  MSDN  multi  multikey  multiparty  multiple  multithreaded  music  mystery  nacl  network  networking  NFS  nginx  Niels  NIST  node.js  noise  NSA  NTLM  NTP  NTT  number  numbers  NUMS  OCR  OFFsystem  OHCI  oil  onboard  one  oneRNG  onetime  onion  online  open  OpenCrypto  openPGP  OpenPGP  opensource  openSSH  OpenSSH  openSSL  OpenSSL  OpenVPN  OPSEC  OpSec  optical  OS  OSX  OTFE  OTP  otr  overview  owner  p2p  package  packet  pad  PAKE  paper  papercraft  party  pass  passing  password  pastebin  PCI  PCIe  PCIexpress  PDA  pdf  pentesting  performance  personalized  perturbation  PFS  PGP  phone  Phonebook  photo  physical  picture  piracy  PKCS#7  PKCS#11  PKCS7  PKCS11  PKI  platform  plausibly  plugin  policy  pool  portable  position  post  post-quantum  poster  power  PQE  practical  practices  prediction  prime  primitive  privacy  private  PrivaTegrity  PRNG  probabilistic  probe  programming  proof  proof-of-concept  proof-of-space  proof-of-time  protection  protocol  Provos  proxy  pseudoanonymity  psychology  public  purge  QRcode  QRNG  quantum  radio  rainbow  rainbowcrack  RAM  random  randomness  randum  raper  ratcheting  RC4  read  reading  recommendation  recommendations  recovery  RedPhone  refence  reference  remailer  remediation  remote  report  research  resistance  resistant  resource  retrieval  review  rijndael  RNG  root  rotation  roughtime  route  routing  RSA  rubberhose  rust  S-box  s60  SafeEnd  safety  salt  saltpack  sample  SanDisk  SBPA  schemes  schneier  science  SCIMP  SCP  scraper  screen  script  scrypt  SD  search  secdure  secret  secure  security  seed  selection  self  Self-Certifying  self-extracting  serpessence  server  service  set  SFS  SHA  SHA-1  SHA-2  SHA-3  SHA-256  SHA1  SHA2  SHA3  SHA256  sharding  shared  sharing  shell  shop  shortwave  side  SideRand  sieve  signature  signing  SIlentCircle  simple  site  size  SJCL  skein  slack  smartcard  SMS  SMTP  smuggling  snake  snakeoil  social  software  solution  sound  source  sourcecode  spec  speed  SPEKE  split  sponge  spritz  spy  SQL  SRP  SSH  SSL  SSSS  stacked  standard  staple  state  station  statistical  steganography  stegbreak  stenography  stick  storage  stream  strongbox  structure  substitution  SURB  Switzerland  Symbian  symmetric  sync  synchronization  sysadmin  system  systems  tables  tarpit  TCHunt  technology  telephone  testing  text  time  tips  TLS  token  tools  tor  torpack  TPM  transfer  transmission  transport  tree  tricks  trigger  truecrypt  trust  trusted  TrustFlash  truth  tutorial  tweet  twitter  type  typewriter  UDP  untrusted  update  upload  URI  URL  usability  USB  utilities  verifiable  verification  video  virtual  visual  visualization  voice  voip  vole  volume  VPN  vulnerability  vuvuzela  wall-of-shame  weak  web  webcomic  webdev  WEP  whine  whistleblower  wifi  wiki  windows  wireless  write  writing  X9.31  x64  x86  x86-64  XML  XMPP  xuggler  YoNTMA  YubiKey  Zcash  Zebra  zero  ZeroBin  zk-SNARK  zRTP 

Copy this bookmark: