cryptography - Dave's Blog

Search
My timeline on Mastodon

Retweet of Pinboard

2015 Dec 13, 2:34
Imagine a world where FBI director Comey talked about guns the way he talks about cryptography
PermalinkComments

Crypto breakthrough shows Flame was designed by world-class scientists | Ars Technica

2012 Jun 7, 9:12

So this is another Stuxnet by Israel/US?

The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a wealthy nation-state. … “It’s not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough,” Matthew Green, a professor specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. “There were mathematicians doing new science to make Flame work.”

PermalinkCommentstechnical security web internet md5 cryptography flame

Android App Aims to Allow Wiretap-Proof Cell Phone Calls « The Firewall - Forbes.com

2010 May 27, 8:53
PermalinkCommentsandroid cellphone security encryption privacy cryptography technical google

RFC 5843 - Additional Hash Algorithms for HTTP Instance Digests

2010 Apr 21, 6:51Adds SHA 256 & 512 to HTTP instance digest: 'The IANA registry named "Hypertext Transfer Protocol (HTTP) Digest Algorithm Values" defines values for digest algorithms used by Instance Digests in HTTP. Instance Digests in HTTP provide a digest, also known as a checksum or hash, of an entire representation of the current state of a resource. This document adds new values to the registry and updates previous values.'PermalinkCommentshash cryptography http instance-digest sha security technical ietf rfc standard

The Essential Message: Claude Shannon and the Making of Information Theory

2010 Apr 20, 9:34PermalinkCommentstechnical pdf information-theory cryptography history system:filetype:pdf system:media:document

Compact E-Cash

2009 Aug 14, 6:20"This paper presents efficient off-line anonymous e-cash schemes where a user can withdraw a wallet containing coins each of which she can spend unlinkably."PermalinkCommentsmoney future reference research economics cryptography technical system:filetype:pdf system:media:document

Cryptography and the Law... - sci.crypt | Google Groups

2008 Oct 27, 1:39Rubber-hose cryptanalysis is first defined by Marcus J. Ranum on Oct 15 1990: "..unless you resort to the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive)"PermalinkCommentshumor cryptography rubber-hose security

obstcp - Google Code

2008 Oct 14, 11:14Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."PermalinkCommentsinternet tcp encryption security google privacy opensource cryptography network ssl

Pirate Bay wants total network encryption, but does anyone else?

2008 Jul 10, 4:44More on IPETEE w/ some of the politics and commentary. "The Pirate Bay has ambitious plans to bring end-to-end encryption to all network activity..."PermalinkCommentsarticle encryption privacy security ip cryptography

Technical Proposal (IPETEE) - TFR Wiki

2008 Jul 10, 4:43"The goal is to implement IP-transport encryption in a way that is transparent both to the IP-layer (including nodes in the network path) and to the applications that benefit from the encryption." Seems like a good idea to me.PermalinkCommentscryptography encryption internet privacy security ip wiki

Solving the Enigma - History of the Cryptanalytic Bombe

2008 Apr 9, 2:36History of Enigma in WW2: "One particular German code clerk continually used his girlfriend's name, Cillie, for his messages, and so these easy-to-guess indicators became known as "Cillies.""PermalinkCommentshistory encryption cryptography article security nsa enigma

A complete break of the KeeLoq access control system

2008 Apr 4, 9:48I wonder if my car uses KeeLoq: "Hence, using the methods described by us, an attacker can clone a remote control from a distance and gain access to a target that is protected by the claimed to be "highly secure" KeeLoq algorithm."PermalinkCommentscryptography rfid security keeloq via:schneier car

BBC NEWS | Technology | Colossus cracks codes once more

2007 Nov 15, 4:03Colossus set to compete against modern PC in decrypting Nazi messages in promotion of museum.PermalinkCommentsbbc article computer cryptography encryption hardware history turing

Encrypted E-Mail Company Hushmail Spills to Feds

2007 Nov 15, 12:27Article on encrypted email company Hushmail giving email up to The Man. Includes interview with Hushmail CTO Brian Smith.PermalinkCommentsencryption article cryptography crypto anonymity anonymous email government privacy webmail mail legal security

Gmail S/MIME for Firefox

2007 Oct 15, 1:33Info on a plugin for FireFox that gives GMail S/MIME support. This is a similar idea to the last but these folks have executed the idea in a different fashion.PermalinkCommentsarticle browser blog cryptography crypto mail mime mozilla pgp privacy security extension firefox gmail google

Gustavus Selenus - Nine Books of Cryptography

2007 Sep 12, 1:06As close to the Cryptonomicon as you'll be able to find. The first few chapters of a rare 17th century work on cryptography.PermalinkCommentsbook history crypto cryptography

Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes

2007 Sep 11, 12:01PermalinkCommentshack hackers crypto cryptography security blog article hash password authentication via:swannman

The Uneasy Relationship Between Mathematics and Cryptography

2007 Aug 13, 2:05PermalinkCommentsmath article history cryptography

boz - web bookmarking

2007 Apr 8, 9:02Bookmark things on delicious very privately. This is an actual tool this time that uses encryption to ensure that even delicious doesn't know what you bookmarked.PermalinkCommentsbookmark cryptography encryption privacy delicious tag tagging tool

wikileaks.org

2007 Mar 19, 1:23A site dedicated to creating a tool for leaking documents in an uncensorable fashion.PermalinkCommentswiki politics censorship government privacy security crypto cryptography
Older Entries Creative Commons License Some rights reserved.