jonty + cryptography   34

Secure Secure Shell
Best-practise SSH key generation and configuration
crypto  ssh  cryptography  certificate 
january 2015 by jonty
Why Quantum "Clippers" Will Distribute Entanglement Across The Oceans | MIT Technology Review
Simon Devitt from Ochanomizu University in Japan and a few pals have come up with a way to solve this problem. Their idea is to transport the quantum bits or qubits across the ocean on a containership, a kind of quantum Clipper, that will shuttle back and forth across the seas with a ghostly quantum load.
information  cryptography  quantum  qubit  network  transmission 
october 2014 by jonty
"Stud is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines."
ssl  tls  openssl  network  cryptography  crypto  nginx  nt  stud  from delicious
june 2011 by jonty
Bitcoin Traders
"Here's a list of sites that accept Bitcoin. Note: it still remains up to you to decide whether you trust the service provider or not. "
bitcoin  money  currency  exchange  trade  traders  crypto  cryptography  from delicious
march 2011 by jonty
List of Famous Unsolved Codes and Ciphers
"This is an unofficial list of well-known unsolved codes and ciphers. A couple of the better-known unsolved ancient historical scripts are also thrown in, since they tend to come up during any discussion of unsolved codes."
cryptography  history  crypto  ciphers  codes  cryptology  interesting  code  puzzles  list  unsolved  from delicious
february 2011 by jonty
Tim May - Untraceable Digital Cash, Information Markets, and BlackNet
"A few years ago I devised a working information market, using PGP for secure communication and digital signatures, chained anonymous remailers for untraceability, and message pools (e.g., alt.anonymous.messages on Usenet) for making contact and sending later messages. My intention was to directly demonstrate the feasibility of such markets, and to explore some of the nuances of such markets. BlackNet allowed fully-anonymous, two-way exchanges of information of all sorts. The basic idea was to use a "message pool," a publicly readable place for messages. By using chains of remailers, messages could be untraceably and anonymously deposited in such pools, and then read anonymously by others (because the message pool was broadcast widely, a la Usenet). By including public keys for later communications, two-way communication could be established, all within the message pool. What was missing at the time of this experiment was some form of untraceable payment, i.e., digital cash."
cryptography  anonymity  money  crypto  p2p  remailer  pool  anonymous  pki  from delicious
january 2011 by jonty
The Crypto Anarchist Manifesto
"Here's the "Crypto Anarchist Manifesto" I read at the September 1992 founding meeting. It dates back to mid-1988 and was distributed to some like-minded techno-anarchists at the "Crypto '88" conference and then again at the "Hackers Conference" that year. I later gave talks at Hackers on this in 1989 and 1990."
cyberpunk  cryptography  cryptoanarchy  anarchism  manifesto  politics  anarchy  government  crypto  security  hackers  from delicious
january 2011 by jonty
Agglomerated SSL
"Agglomerated SSL was written in order to hide the awful OpenSSL API. It strives to reuse the OpenSSL APIs and provide a much simpler and sane interface for programmers that are interested in writing applications that require the SSL/TLS protocol for secure communications."
c  library  openssl  crypto  cryptography  wrapper  ssl 
september 2010 by jonty
The plot thickens... | MetaFilter
"My ability to decide how I feel about Wikileaks' activities is totally annihilated by my ongoing realization that it cannot possibly be real. It's a plot device in a near-future thriller novel. I mean, seriously, semi-stateless man with an unusual appearance uses an army of anonymous allies to expose governments' secrets, and posts an insurance file in public with some kind of deadman switch in case he's taken out by his enemies? That shit does not happen in real life. Julian Assange is a Neal Stephenson character who's escaped in to the real world."
metafilter  mefi  wikileaks  wiki  crypto  cryptography  julian  assange  julianassange  nealstephenson 
july 2010 by jonty
Overclocking SSL
"If there's one point that we want to communicate to the world, it's that SSL/TLS is not computationally expensive any more. Ten years ago it might have been true, but it's just not the case any more. You too can afford to enable HTTPS for your users."
ssl  performance  google  https  cryptography  http  scalability  security 
july 2010 by jonty
"Cryptologia is a unique scholarly journal devoted to all aspects of cryptology. This refereed quarterly began in 1977. Areas covered include computer security, history, codes and ciphers, mathematics, military science, espionage, cipher devices, literature, and ancient languages. Features include research and expository articles, cryptologic book and material review, announcements, challenge ciphers, and more"
crypto  cryptography  encryption  news  journal  research  subscription  thingstobuy 
july 2010 by jonty
Stanford Javascript Crypto Library
"The Stanford Javascript Crypto Library (hosted here on GitHub) is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript."
cryptography  crypto  javascript  encryption  publickey  symmetrickey 
june 2010 by jonty
Hash trees
"In cryptography and computer science Hash trees or Merkle trees are a type of data structure which contains a tree of summary information about a larger piece of data – for instance a file – used to verify its contents. The main difference from a hash list is that one branch of the hash tree can be downloaded at a time and the integrity of each branch can be checked immediately, even though the whole tree is not available yet. This can be an advantage since it is efficient to split files up in very small data blocks so that only small blocks have to be redownloaded if they get damaged. If the hashed file is very big, such a hash tree or hash list becomes fairly big. But if it is a tree, one small branch can be downloaded quickly, the integrity of the branch can be checked, and then the downloading of data blocks can start."
algorithms  hash  tree  p2p  algorithm  distributed  merkle  distributedsystems  crypto  cryptography  hashing  consistency 
may 2010 by jonty
SRP: What Is It?
SRP is a secure password-based authentication and key-exchange protocol. It solves the problem of authenticating clients to servers securely, in cases where the user of the client software must memorize a small secret (like a password) and carries no other secret information, and where the server carries a verifier for each user, which allows it to authenticate the client but which, if compromised, would not allow the attacker to impersonate the client. In addition, SRP exchanges a cryptographically-strong secret as a byproduct of successful authentication, which enables the two parties to communicate securely.
srp  crypto  cryptography  protocol  password  authentication  security 
march 2010 by jonty
jsCrypto - Fast symmetric cryptography in javascript
Why use cryptography in Javascript? One major reason is the need to encrypt data before uploading it to a server; this is useful where the server needs to store data but doesn't wish to see it in the clear. It can also be used in desktop applications written in Javascript - for example, Firefox extensions.

We offer a fast, small, portable symmetric encryption library written in Javascript
javascript  cryptography  crypto  encryption  library 
december 2009 by jonty
Fuzzy Hashing and ssdeep
ssdeep is a program for computing context triggered piecewise hashes (CTPH). Also called fuzzy hashes, CTPH can match inputs that have homologies. Such inputs have sequences of identical bytes in the same order, although bytes in between these sequences may be different in both content and length.
hash  hashing  fuzzy  cryptography  crypto  similarity  algorithms  algorithm  clustering 
december 2009 by jonty
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) |
Any Java application which compares client-provided data to a secret value using MessageDigest.isEqual is vulnerable to timing attacks. This includes HMACs, decryption results, etc.
security  cryptography  java  timing  statistics  python 
august 2009 by jonty
Visual Cryptography
Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994.
cryptography  crypto  vision 
july 2009 by jonty
staple / unstaple
staple is a program that inseparably binds together the data in a file using a cryptographic mechanism known as an All-or-nothing transform. In its most basic form (when executed as staple 0), the transformation is keyless; that is, no key is required to reverse it, however all the data is required. Thus, running unstaple on the output .staple file yields the original file, but running it on any subset of the .staple file yields nothing.
algorithm  algorithms  encryption  crypto  cryptography  dmca 
march 2009 by jonty
<keygen> HTML tag - Client side cert generation in all browsers
When you want a really strong security on the web, it's a good idea to use SSL.
SSL can be used to encrypt your end to end connection to the web server, but
you will need a client certificate for the possibility to verify you as who you
are. The right way to get a certificate like this is for your browser to
generate it! The private key should NEVER get out of the client machine. It should
be generated and stored within the browser certificate store.
reference  webdev  security  cryptography  development  web  ssl  keygen  publickey 
march 2009 by jonty
Cryptol is a language for writing specifications for cryptographic algorithms. It is also a tool set for producing high-assurance, efficient implementations in VHDL, C, and Haskell. The Cryptol tools include the ability to equivalence check the reference specification against an implementation, whether or not it was compiled from the specifications.
code  hacking  security  encryption  cryptography 
december 2008 by jonty

related tags

aes  algorithm  algorithms  anarchism  anarchy  anonymity  anonymous  assange  attacker  authentication  bitcoin  book  books  c  cbc  certificate  ciphers  clustering  code  codes  coding  comic  compilers  computer  consistency  crack  cryptcat  cryptdb  crypto  cryptoanarchy  cryptography  cryptology  currency  curvecp  cyberpunk  data  database  databases  development  distributed  distributedsystems  djb  dmca  ecc  encrypted  encryption  exchange  filetype:pdf  fuzzy  google  government  hackers  hacking  hash  hashing  history  hitman  http  https  information  interesting  java  javascript  journal  julian  julianassange  keygen  lectures  library  linux  list  manifesto  md5  media:document  mefi  merkle  metafilter  mode  money  mysql  nc  nealstephenson  netcat  network  networking  networks  news  nginx  nt  openssl  p2p  papers  password  performance  pki  politics  pool  programming  protocol  publickey  puzzles  python  quantum  qubit  rap  rapper  reference  remailer  research  resources  scalability  search  security  sha  sha1  similarity  srp  ssh  ssl  statistics  stud  subscription  symmetrickey  systems  tcp  thingstobuy  timing  tls  tools  trade  traders  transmission  tree  trust  unsolved  video  videos  vision  web  webdev  wiki  wikileaks  wrapper 

Copy this bookmark: