grenzreiter + kryptographie   15

Cryptology ePrint Archive
The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.
december 2017 by grenzreiter
The ROBOT Attack - Return of Bleichenbacher's Oracle Threat
ROBOT is the return of a 19-year-old vulnerability that allows performing RSA decryption and signing operations with the private key of a TLS server.
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allowed an adaptive-chosen ciphertext attack; this attack fully breaks the confidentiality of TLS when used with RSA encryption.
We discovered that by using some slight variations this vulnerability can still be used against many HTTPS hosts in today's Internet.
december 2017 by grenzreiter
You Wouldn't Base64 a Password! Cryptography Terms and Concepts for Developers
There's a ton of bad programming and security advice on the Internet. Some of the advice is bad because the author is misinformed, some because it emphasizes precision over clarity and most people wind up lost in the jargon.
kryptographie  programmieren 
december 2016 by grenzreiter
Welcome to cryptography — Cryptography 1.6.dev1 documentation
cryptography is a Python library which exposes cryptographic recipes and primitives. Our goal is for it to be your “cryptographic standard library”. If you are interested in learning more about the field of cryptography, we recommend Crypto 101, by Laurens Van Houtven.
python  kryptographie 
november 2016 by grenzreiter
Cryptologie | Links
Here is a list of links I stumbled into and found interesting. Usually related to Crypto/Security although it could be anything. You can also suggest me something.
october 2016 by grenzreiter
Crypto Classics: Wiener's RSA Attack
While reading on RSA I stumbled upon Dan Boneh’s Twenty Years of Attacks on the RSA Cryptosystem 1999 paper. In there, I found a trove of applied attacks against RSA; one of which, Wiener’s, employs continued fractions approximation to break RSA efficiently (under certain conditions).

The attack was interesting enough to make me want to learn about it and spread the word.
python  kryptographie 
september 2016 by grenzreiter
Griech.: Krypto ( ich verberge ) und graphe ( das Schriftstück )
Kryptographie (=Verschlüsselung) wird mit Krypotanalyse (=Entschlüsselung) unter dem Überbegriff Kryptologie zusammengefasst.
Einsatzgebiete der Kryptographie
- sensible Daten in der Wissenschaft
- Abwicklung von Geschäftsvorgängen
- Vertrauliche Informationen im Privatleben
Ziele der Kryptographie
- Vertraulichkeit: Schutz vor fremden Augen
- Integrität: Schutz vor Manipulation
- Authentizität: Schutz vor falschen Absendern
Kombination aller drei Ziele zur Gewährleistung der bestmöglichsten/sichersten Verschlüsselung
september 2016 by grenzreiter
The cypherpunk revolution
Punk is resistance. During the 1980s and ’90s, the subculture was resistance of a special kind: heavy on fashion and light on politics. Punk generated eccentric hairstyles, tattoos, boots and leather outfits, drug habits, and hard-core music that oozed being against stuff. Yet fashion trumped direct action. Punk was aesthetic anarchy.
august 2016 by grenzreiter
Make your own Enigma Replica
This is our very first Instructable and this step by step guide will show you how to build a fully functional electronic replica of the world famous German Enigma machine. This Arduino based Open Source project is able to encrypt & decrypt any Enigma M4 encoded message.
kryptographie  enigma  arduino  idee 
june 2016 by grenzreiter
A Tutorial on Linear and Differential Cryptanalysis
Abstract: In this paper, we present a detailed tutorial on linear cryptanalysis and
differential cryptanalysis, the two most significant attacks applicable to symmetric-key
block ciphers. The intent of the paper is to present a lucid explanation of the attacks,
detailing the practical application of the attacks to a cipher in a simple, conceptually
revealing manner for the novice cryptanalyst. The tutorial is based on the analysis of a
simple, yet realistically structured, basic Substitution-Permutation Network cipher.
Understanding the attacks as they apply to this structure is useful, as the Rijndael cipher,
recently selected for the Advanced Encryption Standard (AES), has been derived from
the basic SPN architecture. As well, experimental data from the attacks is presented as
confirmation of the applicability of the concepts as outlined.
kryptographie  kryptoanalyse 
december 2014 by grenzreiter
How can you tell if a cipher is secure?
I was asked that question during an interview a while ago. Back then it troubled me because it seemed so basic and yet and I had no idea how to answer it. I became vivid and didn't know what to say and later I didn't get the job. I thought it would be interesting to write down how I would answer this question now.
december 2014 by grenzreiter
The Secret Life of Passwords -
The Secret Life of Passwords
We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts.
november 2014 by grenzreiter
The Cost of Cryptography - Issue 7: Waste - Nautilus
The VENONA project represents one of the most successful counter-intelligence attacks of the Cold War. It revolved around an encryption system, called the “one-time pad scheme,” that was completely unbreakable, but required generating a new, random encryption key for every message. This was hugely inconvenient, and prone to human error. And error is exactly what happened. Someone on the Soviet side (it is still not known who) began to reuse keys, allowing the decryption of about 3,000 top-secret messages by the west.
kryptographie  geld 
november 2014 by grenzreiter

Copy this bookmark: