Displaying 15 results from an estimated 15 matches for "cryptology".
2001 Nov 02
3
su/sudo using ssh auth
...:
Ssh has a key agent allowing authentication to remote hosts without
entering your password/passphrase again and again, which is very
convenient. I think the 'su', 'sudo', and similiar commands could benefit
from this idea and mechanism. I don't have the necessary expertise in
cryptology to do this myself so I just want to throw this into the
diskussion. If programs like 'su' und 'sudo' could be extended to use
the ssh-agent a 'su-authorized-keys' file in the homedir of root would
be enough to become root or any other user with any key in that file.
For ...
2001 Mar 07
3
protocol 2 performance gain?
has anyone noticed a performance gain with protocol 2?
-David Higdon
2007 Jun 11
9
Recent MAC improvements
Hi,
There has been some recent work to improve the speed of the Message
Authentication Codes (MACs) that are used in OpenSSH.
The first improvement is a change from Markus Friedl to reuse the MAC
context, rather than reinitialising it for every packet. This saves two
calls to the underlying hash function (e.g. SHA1) for each packet. My
tests found that this yielded at 12-16% speedup for bulk
2012 Jul 29
3
[LLVMdev] rotate
...icrosoft's compiler has an
explicit intrinsic in the form of _rotl8 and _rotl16 (IIRC -- this is from
memory!). It would be nice to have a __builtin_rotl family in clang, in
my opinion, but it would need back-end support from llvm. I would expect
it to find use in code relating to hashing and cryptology. I know that
the compiler *should* optimise
uint32_t ror(uint32_t input, size_t rot_bits) {
return (input >> rot_bits) | (input << ((sizeof(input) << 3) - rot_bits));
}
and such macros / inline functions are common, but an intrinsic specifies
intent better and could provide f...
2016 Jan 22
1
Does tinc have something akin to openvpn's --tls-auth ? Or do I not need that at all ?
...thing akin to openvpn's --tls-auth
option, for all the reason's listed here:
https://community.openvpn.net/openvpn/wiki/Hardening
I have read http://www.tinc-vpn.org/documentation-1.1/tinc.pdf, but I
have not seen anything similar.
Or do I not need that feature at all because tinc handles cryptology
different than openvpn ( tinc's uses RSA keys which are generated during
setup currently - openvpn uses a cert authority with X.509 with
different tls ciphers afaik )?
While my understanding of crypto is not bad, I would not want to assume
to judge crypto implementations on their design, so I...
2017 Nov 28
0
Failed attempts
...hing that slows down the
attack is even more useful.
I actually have training as a locksmith, with a specialty in
masterkeying systems like rotating-constant and some obscure variations
of RCM (this is one of the two masterkey systems explored in the
infamous (in locksmith circles) paper "Cryptology and Physical Security:
Rights Amplification in Master-Keyed Mechanical Locks" by Matt Blaze [1]
[2]).
In physical security all security is, in reality, through obscurity [3]
(page 2, first paragraph): things like keeping the drill points secret
(example: in a pin-tumbler lock, if you can...
2012 Jul 29
0
[LLVMdev] rotate
*NOTE* IIRC compiling this with -O0 on x86-64 can yield the wrong result since clang will emit shifts and on intel shifts are mod the register size:
=====
.section __TEXT,__text,regular,pure_instructions
.globl _ror
.align 4, 0x90
_ror: ## @ror
.cfi_startproc
## BB#0:
pushq %rbp
Ltmp2:
.cfi_def_cfa_offset 16
Ltmp3:
.cfi_offset %rbp, -16
movq %rsp, %rbp
2017 Nov 27
6
Failed attempts
Pete Biggs wrote:
> On Mon, 2017-11-27 at 12:10 -0500, Jerry Geis wrote:
>> hi All,
>>
>> I happened to login to one of my servers today and saw 96000 failed
>> login attempts. shown below is the address its coming from. I added it
to my
>> firewall to drop.
>>
>> Failed password for root from 123.183.209.135 port 14299 ssh2
>>
>> FYI -
2010 Dec 10
0
Extended Deadline and Financial Support
...he topics:
Electronic
System Integration (SoC, MPSoC, Mixed-Signal)
Electronic Integration
RF and Wireless Circuits and Systems
Circuits and Systems for Communications
Advanced Technologies (Nano, MEMS)
Image and Video
Image and video Processing Technology
Compression, Coding, and Implementation
Cryptology and Watermarking
Storage, Retrieval, and Authentication
Multimedia
Management and diffusion of Multimedia Applications
Multimedia Data Base
Documents Modelisation and Interpretation
Telecommunication?s Computer Science
Telecommunications and Networks
Networks Protocols and Wireless Networks
Next...
2012 Jul 29
3
[LLVMdev] rotate
Nice!
Clever compiler..
On 07/28/2012 08:55 PM, Michael Gottesman wrote:
> I can get clang/llvm to emit a rotate instruction on x86-64 when compiling C by just using -Os and the rotate from Hacker's Delight i.e.,
>
> ======
> #include<stdlib.h>
> #include<stdint.h>
>
> uint32_t ror(uint32_t input, size_t rot_bits)
> {
> return (input>>
2007 Oct 05
2
FastIPSec and OCF
Hi,
Does FASTIPSec in FreeBSD use OCF framework ? Where can I find more
documentation ?
I wish to run cryptographic algorithms after setting a VPN. What command
should I use to run a particular crytographic algorithm (e.g. 3DES etc.)
Where can I find all such information ?
--
Regards,
Bubble
2009 Feb 17
0
Invitation to attend SETIT2009
...ork positioning clearly compared to what exists.
Here a non exhaustive list of the topics:
Electronic
Systems on chip
Electronic integration
Radiofrequence circuits and systems
Telecommunications? circuits and systems
Image and Video
Image compression and coding
Image processing technology
Cryptology and watermarking
Image 3D
Multimedia
Management and diffusion of multimedia applications
Multimedia data base
Documents modelisation and interpretation
Telecommunication?s computer science
Telecommunications and Networks
Telecommunications
Networks
Communication protocoles
Transmission...
1998 May 30
9
"Flavors of Security Through Obscurity"
...n algorithm and then try to
keep it secret. A bad encryption algorithm, in this context, is
an algorithm that can be broken by a sophisticated attacker even
without knowledge about the algorithm itself.
As you see, the reasons are of a practical nature, and are not
derived from any fundamentals in cryptology. If we could find a
practical way to keep secret both the key (that is the data the
encryption method operates on) and also the method itself (or at
least part of the method), then security would be greatly
enhanced because the attacker would have less knowledge to work
with.
I believe there are s...
2017 Nov 28
4
Failed attempts
...slows down the
attack is even more useful.
>
> I actually have training as a locksmith, with a specialty in
> masterkeying systems like rotating-constant and some obscure variations
of RCM (this is one of the two masterkey systems explored in the
infamous (in locksmith circles) paper "Cryptology and Physical Security:
Rights Amplification in Master-Keyed Mechanical Locks" by Matt Blaze [1]
[2]).
>
> In physical security all security is, in reality, through obscurity [3]
(page 2, first paragraph): things like keeping the drill points secret
(example: in a pin-tumbler lock, if you...
1998 Jun 29
2
Re: A switch? A router? What am I looking for??
At 01:59 PM 6/29/98 +0000, Kokoro Security Administrator wrote:
>Hello everyone -
>
>I am looking for the name of a piece of hardware, and don''t know what it
>is called. I am told that there exists such a thing (a switch? a router?
>a special hub?) that will only send me traffic that is destined for me.
simple definitions:
--router: looks at a layer 3 address (such as