« earlier | later » Page 3 of 5
BetterCrypto⋅org edit / delete
Practical recommendations for TLS settings.
to cryptography security ssl tls ... on 28 April 2014
Cryptography Coding Standard edit / delete
Patterns for secure cryptographic software (e.g. same comparisons).
to cryptography patterns programming safety security ... on 27 April 2014
Diffie Hellman and TLS with nonsense parameters - Hanno's blog edit / delete
Apparently quite a lot of TLS implementations will happily accept 15 as a prime for DH key exchange. Presumably even if they were checking you could rely on the probabilistic test too...
to cryptography dh prime security ssl testing tls ... on 16 April 2014
Energy-efficient bcrypt cracking (Passwords^13 - PasswordsCon Bergen 2013) edit / delete
Keys/second/watt for various architectures. The manycore ones do very well -- they aren't fast as such but they're very power-efficient for the performance they get.
to bcrypt cryptography efficiency manycore parallel performance power ... on 18 February 2014
Qualys SSL Labs - Projects / SSL Server Test edit / delete
Test your SSL webserver -- e.g. to see whether it supports a reasonable set of cipher suites.
to cryptography http ssl web ... on 01 December 2013
Keylength - NIST Report on Cryptographic Key Length and Cryptoperiod (2012) edit / delete
Handy reference to a selection of standards for key length.
to cryptography dsa gpg key pgp rsa ssl ... on 07 September 2013
Decrypto 8.5, Online Cryptoquip and Cryptogram Solver edit / delete
Solves cryptograms. Impressively smart.
to cryptogram cryptography puzzle ... on 11 July 2013
Anatomy of a pseudorandom number generator – visualising Cryptocat’s buggy PRNG | Naked Security edit / delete
Another example of why writing your own crypto code probably isn't a good idea.
to bugs cryptography programming ... on 11 July 2013
The Keccak sponge function family edit / delete
The hash function that's just won the SHA-3 contest. Excellent documentation, including a guide to implementing it that makes very interesting reading.
to cryptography hash sha3 ... on 15 October 2012
Block-layer Encryption edit / delete
Worryingly comprehensive. I just wanted to know how to use cryptsetup!
to cryptography dm dmcrypt ... on 16 September 2012
« earlier | later » Page 3 of 5
tasty by Adam Sampson.