search for: cryptanalytic

Displaying 11 results from an estimated 11 matches for "cryptanalytic".

Did you mean: cryptanalysis
2015 May 27
3
Weak DH primes and openssh
...ther q or p-1. There are no other subgroups, iiuc. If this is the only attack you're trying to address, and you've already limited yourself to safe primes, then NUMS properties don't really add anything. The NUMS approach is there are to try to avoid the possibility of other, unknown cryptanalytic attacks against some infrequent type of group, so that the entity who defines the group can't force you into this secret corner case if they have special knowledge. --dkg
2015 May 28
2
Weak DH primes and openssh
...Kario wrote: > > If this is the only attack you're trying to address, and you've > > already limited yourself to safe primes, then NUMS properties don't > > really add anything. The NUMS approach is there are to try to avoid > > the possibility of other, unknown cryptanalytic attacks against some > > infrequent type of group, so that the entity who defines the group > > can't force you into this secret corner case if they have special > > knowledge. > > that being said, how using NUMS seeds to generate safe prime would > hurt? If you'...
2007 Jul 20
2
[Bug 1341] New: Support multiple blowfish key lengths
http://bugzilla.mindrot.org/show_bug.cgi?id=1341 Summary: Support multiple blowfish key lengths Product: Portable OpenSSH Version: 4.6p1 Platform: Other OS/Version: Other Status: NEW Severity: enhancement Priority: P2 Component: Miscellaneous AssignedTo: bitbucket at mindrot.org ReportedBy:
1998 May 30
9
"Flavors of Security Through Obscurity"
...be run only from a floppy disk which would be handled with the same care as the key to a safe. We all know that absolute security is impossible. What I am suggesting here is that in many cases this system of security is better than one using a standardized and public algorithm which attracts a lot cryptanalytic work and may be broken in the near future or may have already been broken in secret. b) Intrinsically secret ciphers. Extend secrecy to parts of the encryption method. In his book, Schneier very briefly describes a variant of DES where the Sboxes (which most people would consider as part of the a...
2019 Nov 03
10
[Bug 3087] New: Ed448 support
https://bugzilla.mindrot.org/show_bug.cgi?id=3087 Bug ID: 3087 Summary: Ed448 support Product: Portable OpenSSH Version: 8.1p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee: unassigned-bugs at mindrot.org
1998 Jun 29
2
Re: A switch? A router? What am I looking for??
At 01:59 PM 6/29/98 +0000, Kokoro Security Administrator wrote: >Hello everyone - > >I am looking for the name of a piece of hardware, and don''t know what it >is called. I am told that there exists such a thing (a switch? a router? >a special hub?) that will only send me traffic that is destined for me. simple definitions: --router: looks at a layer 3 address (such as
2017 Sep 25
4
DH Group Exchange Fallback
On 25 September 2017 at 02:32, Mark D. Baushke <mdb at juniper.net> wrote: > [+CC Loganaden Velvindron <logan at hackers.mu>] primary author of > the RFC 4419 refresh draft. https://datatracker.ietf.org/doc/draft-lvelvindron-curdle-dh-group-exchange/ ? Tangent: has any consideration been given to increasing the maximum allowed beyond 8192 bits (which is below the current NIST
2003 Aug 02
0
Re: how l (PR#3614)
.../b><utrecht><b>S, CN</b><cam><b>N, Op</b><conduit><b= >rah, Nig</b><croft><b>htline, D</b><festive><b>ateline NB</b>= <conakry><b>C, M</b><protuberant><b>TV and Mo</b><cryptanalytic><b>re= !</strong></font></p> <p><strong><font face=3D"Arial, Helvetica, sans-serif" size=3D"2" color=3D= "#008080"><b>It </b><compulsion><b>has be</b><dodge><b>en labe</b><...
2005 Mar 07
2
New entropy source proposal.
Hi. I've been playing a bit with "use sound card as an entropy source" idea. This simple program does what I wanted: http://people.freebsd.org/~pjd/misc/sndrand.tbz The program is very simple, it should be run with two arguments: % sndtest /dev/dspW 1048576 > rand.data This command will generate 1MB of random data. With my sound card: pcm0: <Intel ICH3 (82801CA)>
2015 May 26
8
Weak DH primes and openssh
On Tue 2015-05-26 14:02:07 -0400, Hubert Kario wrote: > On Tuesday 26 May 2015 13:43:13 Daniel Kahn Gillmor wrote: >> On Tue 2015-05-26 12:57:05 -0400, Hubert Kario wrote: >> > creating composites that will pass even 100000 rounds of Miller-Rabin is >> > relatively simple.... >> > (assuming the values for M-R tests are picked randomly) >> >> Can you
2009 Oct 30
30
Truncating SHA2 hashes vs shortening a MAC for ZFS Crypto
For the encryption functionality in the ZFS filesystem we use AES in CCM or GCM mode at the block level to provide confidentiality and authentication. There is also a SHA256 checksum per block (of the ciphertext) that forms a Merkle tree of all the blocks in the pool. Note that I have to store the full IV in the block. A block here is a ZFS block which is any power of two from 512 bytes to