Hundreds of RSA SSH private keys were factored by UCSD researchers using an efficient lattice attack from a single PKCS#1 v1.5 padded faulty signature. https://eprint.iacr.org/2023/1711 #cryptography
I’ve been studying and researching in applied cryptography for last 6 months. It’s new, scary, fascinating, fun and terrifying all at the same time! I can’t totally explain the amount of back and forth I keep going through with my confidence level about this subject.
So reaching out to people in #cryptography and #AppliedCryptography or #InfoSec on #mastodon! I wanna know more about your work and research and talk to other people in the community to know more and understand!
have #privacy about health info (think genetic disorders)
be anonymous in terms of DNA-person match (which means ethically working researchers can not include their data in studies, e.g. GWAS etc.)
Sensitive data matters. Biodata is one of the most sensitive types of data you can think of. My advice: Don't use it as a first auth factor. And definitely not as a sole key for crypto.
🆕 blog! “A simple(ish) guide to verifying HTTP Message Signatures in PHP”
Mastodon makes heavy use of HTTP Message Signatures. They're a newish almost-standard which allows a server to verify that a request made to it came from the person who sent it. This is a quick example to show how to verify these signatures using P…
Would you pay for a book (ebook or print) that walks through #cryptography ideas from PRNGs through XOR through simple ciphers through Libsodium with detailed examples in #PHP
I've been using the Rust OpenSSL bindings for a while now, and they're fine. They're fine.
But the lib seems to be missing any bindings for EVP_PKEY_pairwise_check() and I'd really like to use it. Support for OpenSSL v3.x apis seems to be generally lacking.
Although, I've heard OpenSSL isn't a great library in general and maybe I should try to use something else. So maybe this is a good opportunity to migrate to a better lib?
What are the good crypto libraries out there for Rust? I'm looking for implementations of basic stuff like RSA, HMAC, AES, etc. Bonus points if the implementation is actually in a memory-safe language (like Rust!).
Ring looks nice maybe? I suppose there are probably bindings for libsodium somewhere. What are people using these days?
Today I learned that each time you derive an OpenSSH private key (say from an ed25519 private key), by design, you get a slightly different key (12 of the characters will be unique to each exported key even though the keys are equivalent to one another).
Complexity Theory’s 50-Year Journey to the Limits of Knowledge
"How hard is it to prove that problems are hard to solve? Meta-complexity theorists have been asking questions like this for decades. A string of recent results has started to deliver answers.
PassKeys seem like a bad idea. Google backs them up to the cloud, so if your Google account is compromised then all your private keys are compromised. I don't see how that's an improvement over password+2FA at all.
Now security keys I get; keep the private key on an airgapped device. That's good. Hell I even keep my 2FA-OTP salts on a YubiKey.
Yael Tauman Kalai, recipient of the 2022 ACM Prize in Computing, has developed groundbreaking methods for succinctly verifying the correctness of a computation. Recently she sat down with Leah Hoffmann to discuss how they work. Read it here via CACM's relaunched #OpenAccess website: https://cacm.acm.org/opinion/verifying-correctness/
Random question — but has anyone worked with or researched in Attribute Based Credentials? I have been reading about them for my research and I feel like I’m going in circles at this point trying to find one that would fit my requirements? Needed someone to ask some questions (they might be kinda dumb questions because I think I’m not understanding something about bilinear maps) #infosec#cryptography
Hi #infosec folk.. I’m looking for some guides/web sites/books/YouTube channels that explain #cryptography and #cryptanalysis to a layperson.. including the math!! Thanks 🙏
Any #PHP#cryptography geeks out there? I'm working on doing something w/ the Fediverse, but every time I go to validate the signed headers, I get a big fat NO. I'm kinda stuck, I've tried three different approaches, and all three have dropped me at the same endpoint, I'm not sure what I'm doing wrong.
Nice analysis by Bruno Blanchet that proves that HPKE with ML-KEM (or any other IND-CCA2 KEM) does provide IND-CCA2 security.
“Bruno models the base mode of HPKE, single shot API in CryptoVerif, and showed that if the KEM is IND-CCA2, then so is HPKE.
Since CryptoVerif is PQ-sound, that proves the security of the HPKE base mode, with the single shot API when the KEM is a post-quantum IND-CCA2 KEM.” via Karthikeyan Bhargavan on the CFRG mailing list
The post-quantum transition is causing us to abstract cryptographic protocols over Key Encapsulation Mechanisms as opposed to Diffie-Hellman-like non-interactive key exchanges.
These two papers on the binding models for KEMs are great reads on the gotchas of working with KEMs and the properties they may or may not have.
Botan Bindings Project Milestone: Halfway there with low-level bindings!
Hi all!...