« earlier | later » Page 2 of 4
An autoconf-ised version of the NaCl cryptography library. Looks worth playing with!
to api autoconf crypto djb nacl network security software ... on 17 January 2014
Moserware: The First Few Milliseconds of an HTTPS Connection
Nice overview of what exactly is going on when establishing a TLS connection, with packet dumps and brief explanations of the maths.
to ag0803 crypto dump networking packet ssl tls ... on 17 December 2013
Linux Crypto Archives - Arabesque
Good overview of Linux tools for cryptography, including GPG etc.
The big GSM write-up – how to capture, analyze and crack GSM? – 1. | Going on my way…
A four-part series.
to crypto gsm monitoring phone security ... on 01 December 2013
A TCP-like protocol using NaCl's crypto. Interesting in that it's done entirely in userspace over UDP, with an eye both on pervasive crypto and good performance. Unfortunately the web site's a bit incomplete -- e.g. it suggests there's a CurveCP-like mechanism for encoding public keys in server names, but doesn't describe it.
to crypto nacl networking protocol-design tcp ... on 24 October 2013
DNS with NaCl cryptography. Encoding the public key in the nameserver's name is a cute trick (and works because the underlying algorithms allow secure short keys). Of course, this has absolutely no chance of being implemented by anyone :(
Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.
to api crypto djb nacl network security software ... on 24 October 2013
Handy list of references.
Good material on simple hash functions and PRNGs, and how to test them.
Old spy radios and related equipment.
« earlier | later » Page 2 of 4
- crypto | |
1 | ag0803 |
2 | api |
1 | argon2 |
1 | authentication |
1 | autoconf |
1 | book |
1 | braid |
1 | ca |
1 | constant-time |
36 | crypto |
5 | djb |
1 | dns |
1 | dump |
1 | ecc |
1 | ed25519 |
2 | electronics |
1 | enigma |
1 | gpg |
1 | gsm |
1 | hash |
1 | hashing |
2 | history |
1 | homeplugav |
1 | ip |
1 | ipsec |
1 | linux |
1 | mac |
4 | maths |
1 | microcontroller |
1 | monitoring |
6 | nacl |
3 | network |
7 | networking |
2 | noise |
2 | packet |
1 | password |
1 | perl |
1 | phone |
2 | programming |
1 | protocol-design |
1 | protocols |
2 | python |
1 | radio |
2 | random |
2 | research |
1 | retrocomputing |
1 | retrotech |
1 | reverse-engineering |
1 | rng |
10 | security |
5 | software |
1 | ssh |
2 | ssl |
1 | systems |
2 | tcp |
1 | teaching |
1 | tls |
1 | token |
2 | tunnel |
1 | tutorial |
1 | usability |
1 | usable-security |
1 | vcr |
1 | video |
1 | vpn |
1 | web |
1 | william-gibson |
1 | ww2 |
tasty by Adam Sampson.