fj, to random
@fj@mastodon.social avatar

Hundreds of RSA SSH private keys were factored by UCSD researchers using an efficient lattice attack from a single PKCS#1 v1.5 padded faulty signature.
https://eprint.iacr.org/2023/1711
#cryptography

paulfoerster, to retrocomputing
@paulfoerster@swiss.social avatar

Build your own #Enigma #Encryption machine using paper. Yes, paper! 🤔 It's compatible with models I, M1, M2 and M3. It even simulates the plug board. 👍

All you need is a printer, scissors, some clear sticky tape and a crispy tube. Have fun. 🤣

https://makezine.com/article/education/how-to-papercraft-enigma-machine/
http://wiki.franklinheath.co.uk/index.php/Enigma/Paper_Enigma

#RetroComputing #Cryptography

yossarian, to programming
aspiringcat, to infosec

I’ve been studying and researching in applied cryptography for last 6 months. It’s new, scary, fascinating, fun and terrifying all at the same time! I can’t totally explain the amount of back and forth I keep going through with my confidence level about this subject.

So reaching out to people in and or on ! I wanna know more about your work and research and talk to other people in the community to know more and understand!

cendyne, to security
@cendyne@furry.engineer avatar
odr_k4tana, to privacy

The recent at 23andme means that a lot of people suddenly lost the ability to:

  • do DNA/RNA based biometric &
  • have about health info (think genetic disorders)
  • be anonymous in terms of DNA-person match (which means ethically working researchers can not include their data in studies, e.g. GWAS etc.)

Sensitive data matters. Biodata is one of the most sensitive types of data you can think of. My advice: Don't use it as a first auth factor. And definitely not as a sole key for crypto.

Link to leak press release: https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/

Edent, to fediverse
@Edent@mastodon.social avatar

🆕 blog! “A simple(ish) guide to verifying HTTP Message Signatures in PHP”

Mastodon makes heavy use of HTTP Message Signatures. They're a newish almost-standard which allows a server to verify that a request made to it came from the person who sent it. This is a quick example to show how to verify these signatures using P…

👀 Read more: https://shkspr.mobi/blog/2024/02/a-simpleish-guide-to-verifying-http-message-signatures-in-php/

#ActivityPub #cryptography #http #mastodon #security

atoponce, to javascript
@atoponce@fosstodon.org avatar

The #LastPass password generator uses a userspace #RC4 generator.

Here's their #JavaScript:

dogenerate() -> lpCreatePass() -> get_random() -> rng_get_bytes() -> rng_get_byte() -> prng_newstate() -> ARC4init(); ARC4next()

As RC4 is insecure, you would be wise not to use their web-based password generator.

Further, it seems likely they're using the same code in their password manager. You would be wise not to use it there also.

#cryptography #passwords

https://www.lastpass.com/features/password-generator

Screenshot of LastPass JavaScript source code highlighting the "lpCreatePass" function.
Screenshot of LastPass JavaScript source code highlighting the "rng_seed_int", "rng_seed_time", "rng_get_byte", "rng_get_bytes", and "get_random" functions.
Screenshot of LastPass JavaScript source code highlighting the "prng_newstate", "ARC4init", and "ARC4next" functions.

ericmann, to php
@ericmann@tekton.network avatar

Gauging interest ...

Would you pay for a book (ebook or print) that walks through #cryptography ideas from PRNGs through XOR through simple ciphers through Libsodium with detailed examples in #PHP

Similar to the series I did on my blog a while back: https://eric.mann.blog/basic-cryptography-the-caesar-cipher/

cuchaz, to rust
@cuchaz@gladtech.social avatar

Any people out there? :blobcatwave:

I've been using the Rust OpenSSL bindings for a while now, and they're fine. They're fine.

But the lib seems to be missing any bindings for EVP_PKEY_pairwise_check() and I'd really like to use it. Support for OpenSSL v3.x apis seems to be generally lacking.

Although, I've heard OpenSSL isn't a great library in general and maybe I should try to use something else. So maybe this is a good opportunity to migrate to a better lib?

What are the good crypto libraries out there for Rust? I'm looking for implementations of basic stuff like RSA, HMAC, AES, etc. Bonus points if the implementation is actually in a memory-safe language (like Rust!).

Ring looks nice maybe? I suppose there are probably bindings for libsodium somewhere. What are people using these days?

kpwn, to infosec

If you're reading this, your last Diffie-Hellman-Merkle key exchange probably happened just seconds ago.

Have you ever wondered under what circumstances it is secure?

Me too, so let's take a look ⤵️

aral, to random
@aral@mastodon.ar.al avatar

Today I learned that each time you derive an OpenSSH private key (say from an ed25519 private key), by design, you get a slightly different key (12 of the characters will be unique to each exported key even though the keys are equivalent to one another).

https://carlosbecker.com/posts/ssh-marshal-private-key/

Snowshadow, to math
@Snowshadow@mastodon.social avatar

Complexity Theory’s 50-Year Journey to the Limits of Knowledge

"How hard is it to prove that problems are hard to solve? Meta-complexity theorists have been asking questions like this for decades. A string of recent results has started to deliver answers.

https://www.quantamagazine.org/complexity-theorys-50-year-journey-to-the-limits-of-knowledge-20230817/?mc_cid=3a7c726c9f

schizanon, to passkeys
@schizanon@mastodon.social avatar

PassKeys seem like a bad idea. Google backs them up to the cloud, so if your Google account is compromised then all your private keys are compromised. I don't see how that's an improvement over password+2FA at all.

Now security keys I get; keep the private key on an airgapped device. That's good. Hell I even keep my 2FA-OTP salts on a YubiKey.

#passkeys #fido2 #webauthn #yubikey #2fa #otp #authentication #cryptography #security #passwords #passkey #password #securityKey #google

ACM, to worldnews
@ACM@mastodon.acm.org avatar

Yael Tauman Kalai, recipient of the 2022 ACM Prize in Computing, has developed groundbreaking methods for succinctly verifying the correctness of a computation. Recently she sat down with Leah Hoffmann to discuss how they work. Read it here via CACM's relaunched #OpenAccess website: https://cacm.acm.org/opinion/verifying-correctness/

#TechNews #CACM #computing #cryptography

fj, to random
@fj@mastodon.social avatar

📅 Cryptographers, mark your calendars!
Thursday August 24th is the day.

"We are pleased to let you know that the first draft NIST PQC standards will be available this Thursday, August 24th. We will have draft FIPS for CRYSTALS-KYBER, CRYSTALS-DILITHIUM, and SPHINCS+. The one for FALCON will be released in several months.”
#PostQuantum #Cryptography
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/ea9da42e-3bc9-4c8e-87fd-fc428fb5a0e8n%40list.nist.gov

Frederik_Borgesius, to Law
@Frederik_Borgesius@akademienl.social avatar

'Fundamental rights assessment
of the framework for detection orders under the CSAM proposal', by Ot van Daalen at IViR. Thorough and well-written legal analysis. Highly recommended.
https://www.ivir.nl/publicaties/download/CSAMreport.pdf
#law #eu #security #cybersecurity #politics #cryptography #ai #tech

meghana, to infosec

Random question — but has anyone worked with or researched in Attribute Based Credentials? I have been reading about them for my research and I feel like I’m going in circles at this point trying to find one that would fit my requirements? Needed someone to ask some questions (they might be kinda dumb questions because I think I’m not understanding something about bilinear maps)

Cali, to infosec

Hi folk.. I’m looking for some guides/web sites/books/YouTube channels that explain and to a layperson.. including the math!! Thanks 🙏

phpfox, to php

Any geeks out there? I'm working on doing something w/ the Fediverse, but every time I go to validate the signed headers, I get a big fat NO. I'm kinda stuck, I've tried three different approaches, and all three have dropped me at the same endpoint, I'm not sure what I'm doing wrong.

Nonog, to CA

Article 45 Will Roll Back Web Security by 12 Years
Article 45 forbids browsers from enforcing modern security requirements on certain certificate authorities without the approval of an EU member government.
That means cryptographic keys under one government’s control could be used to intercept HTTPS communication throughout the EU and beyond.
https://www.eff.org/deeplinks/2023/11/article-45-will-roll-back-web-security-12-years

reiver, to privacy
@reiver@mastodon.social avatar

Blind-Trust-Before-Verification (BTBV)

https://gultsch.de/trust.html

(From November 20th, 2016.)

As an alternative to Trust-On-First-Use (TOFU).

#blindTrustBeforeVerification #btbv #cryptography #privacy #spying #tofu #trustOnFirstUse

pitrh, to security
@pitrh@mastodon.social avatar
fj, to random
@fj@mastodon.social avatar

Nice analysis by Bruno Blanchet that proves that HPKE with ML-KEM (or any other IND-CCA2 KEM) does provide IND-CCA2 security.

“Bruno models the base mode of HPKE, single shot API in CryptoVerif, and showed that if the KEM is IND-CCA2, then so is HPKE.
Since CryptoVerif is PQ-sound, that proves the security of the HPKE base mode, with the single shot API when the KEM is a post-quantum IND-CCA2 KEM.” via Karthikeyan Bhargavan on the CFRG mailing list

https://gitlab.inria.fr/bblanche/CryptoVerif/-/blob/crypto-library-pq-version/examples/hpke/hpke.base.indcca2.ocv?ref_type=heads

#Cryptography

fj,
@fj@mastodon.social avatar

The post-quantum transition is causing us to abstract cryptographic protocols over Key Encapsulation Mechanisms as opposed to Diffie-Hellman-like non-interactive key exchanges.

These two papers on the binding models for KEMs are great reads on the gotchas of working with KEMs and the properties they may or may not have.

https://eprint.iacr.org/2023/1933
https://eprint.iacr.org/2024/523

#Cryptography #PostQuantum

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • khanakhh
  • mdbf
  • InstantRegret
  • Durango
  • Youngstown
  • rosin
  • slotface
  • thenastyranch
  • osvaldo12
  • ngwrru68w68
  • kavyap
  • cisconetworking
  • DreamBathrooms
  • megavids
  • magazineikmin
  • cubers
  • vwfavf
  • modclub
  • everett
  • ethstaker
  • normalnudes
  • tacticalgear
  • tester
  • provamag3
  • GTA5RPClips
  • Leos
  • JUstTest
  • All magazines