BetterCrypto⋅org edit / delete

Practical recommendations for TLS settings.

to cryptography security ssl tls ... on 28 April 2014

Cryptography Coding Standard edit / delete

Patterns for secure cryptographic software (e.g. same comparisons).

to cryptography patterns programming safety security ... on 27 April 2014

Diffie Hellman and TLS with nonsense parameters - Hanno's blog edit / delete

Apparently quite a lot of TLS implementations will happily accept 15 as a prime for DH key exchange. Presumably even if they were checking you could rely on the probabilistic test too...

to cryptography dh prime security ssl testing tls ... on 16 April 2014

Energy-efficient bcrypt cracking (Passwords^13 - PasswordsCon Bergen 2013) edit / delete

Keys/second/watt for various architectures. The manycore ones do very well -- they aren't fast as such but they're very power-efficient for the performance they get.

to bcrypt cryptography efficiency manycore parallel performance power ... on 18 February 2014

Qualys SSL Labs - Projects / SSL Server Test edit / delete

Test your SSL webserver -- e.g. to see whether it supports a reasonable set of cipher suites.

to cryptography http ssl web ... on 01 December 2013

Keylength - NIST Report on Cryptographic Key Length and Cryptoperiod (2012) edit / delete

Handy reference to a selection of standards for key length.

to cryptography dsa gpg key pgp rsa ssl ... on 07 September 2013

Decrypto 8.5, Online Cryptoquip and Cryptogram Solver edit / delete

Solves cryptograms. Impressively smart.

to cryptogram cryptography puzzle ... on 11 July 2013

Anatomy of a pseudorandom number generator – visualising Cryptocat’s buggy PRNG | Naked Security edit / delete

Another example of why writing your own crypto code probably isn't a good idea.

to bugs cryptography programming ... on 11 July 2013

The Keccak sponge function family edit / delete

The hash function that's just won the SHA-3 contest. Excellent documentation, including a guide to implementing it that makes very interesting reading.

to cryptography hash sha3 ... on 15 October 2012

Block-layer Encryption edit / delete

Worryingly comprehensive. I just wanted to know how to use cryptsetup!

to cryptography dm dmcrypt ... on 16 September 2012

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom