« earlier | later » Page 1 of 4
ENIGMA M4 - Breaking German Navy Ciphers
Results of the project that was breaking Enigma messages found in a sunken U-Boot.
BearSSL - Constant-Time Crypto
Or: why constant-time crypto is somewhere between extremely difficult and impossible. (I found this through a discussion of how what it recommends is no longer constant-time on current CPUs.)
to constant-time crypto programming ... on 10 February 2017
Various low-level packet tools -- I found this while looking for tunnelling systems based on NaCl.
to crypto ecc nacl networking packet security tunnel ... on 18 October 2016
The Cryptopals Crypto Challenges
"We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions. We give you enough info to learn about the underlying crypto concepts yourself." These are really good.
"My research interests cover the design and analysis of security systems and security usability, including the application of concepts from cognitive psychology to understanding how users interact with security systems, and whatever else happens to catch my interest." Denizen of a variety of security/crypto mailing lists; lots of interesting stuff to read.
to crypto security systems usability usable-security ... on 15 September 2016
WireGuard: fast, modern, secure VPN tunnel
VPN protocol based on Noise and straightforward public/private key mappings -- I rather like this design.
to crypto networking noise security vpn ... on 15 September 2016
Reverse-engineering William Gibson's "Agrippa", a poem published on a self-erasing disk.
to crypto mac reverse-engineering william-gibson ... on 27 August 2016
An interesting list. (Of course, the analogous "things that use RSA/AES" would be much longer...)
Which these days is mostly about the winner, Argon2.
« earlier | later » Page 1 of 4
- crypto | |
1 | ag0803 |
2 | api |
1 | argon2 |
1 | authentication |
1 | autoconf |
1 | book |
1 | braid |
1 | ca |
1 | constant-time |
36 | crypto |
5 | djb |
1 | dns |
1 | dump |
1 | ecc |
1 | ed25519 |
2 | electronics |
1 | enigma |
1 | gpg |
1 | gsm |
1 | hash |
1 | hashing |
2 | history |
1 | homeplugav |
1 | ip |
1 | ipsec |
1 | linux |
1 | mac |
4 | maths |
1 | microcontroller |
1 | monitoring |
6 | nacl |
3 | network |
7 | networking |
2 | noise |
2 | packet |
1 | password |
1 | perl |
1 | phone |
2 | programming |
1 | protocol-design |
1 | protocols |
2 | python |
1 | radio |
2 | random |
2 | research |
1 | retrocomputing |
1 | retrotech |
1 | reverse-engineering |
1 | rng |
10 | security |
5 | software |
1 | ssh |
2 | ssl |
1 | systems |
2 | tcp |
1 | teaching |
1 | tls |
1 | token |
2 | tunnel |
1 | tutorial |
1 | usability |
1 | usable-security |
1 | vcr |
1 | video |
1 | vpn |
1 | web |
1 | william-gibson |
1 | ww2 |
tasty by Adam Sampson.