Subscribe to Cryptography feed
Updated: 19 min 11 sec ago


Thu, 11/29/2018 - 23:20


submitted by /u/megan12s
[link] [comments]
Categories: Information Security

Security of salt vs password in PBKDF2

Thu, 11/29/2018 - 21:10

If the salt is used as a security measure alongside the password in PBKDF2, how secure is the salt compared to the password? Can it provide the same security as the password given the same entropy? If not, how bad is it?

The second password concatenated with a fixed string is used as the salt. The iteration count is 2048. HMAC-SHA512 is used as the pseudo-random function. Specialized hardware, e.g., FPGA and ASIC, may be used by the adversary.

To be more specific, the question is about Bitcoin Improvement Proposal 39. The relevant information is as below:

To create a binary seed from the mnemonic, we use the PBKDF2 function with a mnemonic sentence (in UTF-8 NFKD) used as the password and the string "mnemonic" + passphrase (again in UTF-8 NFKD) used as the salt. The iteration count is set to 2048 and HMAC-SHA512 is used as the pseudo-random function. The length of the derived key is 512 bits (= 64 bytes).

submitted by /u/exab
[link] [comments]
Categories: Information Security

Raido project

Wed, 11/28/2018 - 05:27
Raido #Raidofinancial

who do not possess a sufficient legal ability or ability to participate in an ICO and purchase tokens under the laws of countries in which such legislation may be applicable.

submitted by /u/megan12s
[link] [comments]
Categories: Information Security

Cryptography for beginners

Tue, 11/27/2018 - 18:53

Hi, I want to get into cryptography and I dont know where to begin. I tried looking for material to start with but theres just so much out there and I dont necessarily want to learn computer encryption. I'm not going to lie my interest in the Zodiac killer is what's getting me interested in cryptography.

submitted by /u/SlyMacross
[link] [comments]
Categories: Information Security

RSA encryption

Tue, 11/27/2018 - 17:47

Can you help me with this?

Messages corresponding to the numbers 0, 1 and n − 1 have a special property when encrypted using the RSA algorithm. What is this property and proof that it holds true?

submitted by /u/xXMemel0rd69Xx
[link] [comments]
Categories: Information Security

EndChain's revenue model has 3x key pillars

Mon, 11/26/2018 - 23:37

EndChain's revenue model has 3x key pillars to monetize on our patent and our ENCN coin economy. Coin price supported by combination of deflationary mechanism, revenue model and self regulating coin economy. Fuels roadmap to billion dollar company! #EndChain #ENCN #ICO #start1dec #ValueInvestors#EndChain #ICO

submitted by /u/megan12s
[link] [comments]
Categories: Information Security

Question about AES encryption

Mon, 11/26/2018 - 14:43

Sony uses a Linux embedded system for its cameras. Said Linux systems are distributed via encrypted .dat (tar) firmware files (example). Over the course of the last 3 generations every one of these encryption keys (ranging from SHA1 to AES) have somehow been "discovered" see list here

The link above is also for a github that has a tool called fwtool that extracts basically every firmware prior to the current generation.

My question is: How were these keys 'discovered'? my understanding is that AES is somewhat impossible to decrypt using regular means (e.g. bruteforce) (see: article here)

Am I missing something? was it just a rogue engineer/s that happened to be sharing all these over the course of the last few years or is there a valid way to discover or extract these keys?

more reading on the files structure

reason why I ask: I got a Japanese A7III camera as a gift but am unable to change the language without modifying the firmware

submitted by /u/MightyDillah
[link] [comments]
Categories: Information Security

Cryptographic Deck of cards

Mon, 11/26/2018 - 12:00

Is it possible to create virtual deck of cards in some cryptographic way so it would be possible to use it among two players.

Let's say if there are 2 players and they want to play cards via messages. And they need to have deck of cards, from which they can get random cards. Can they communicate it among each other, so they wouldn't know the cards of another person and also there would not be any errors in dealings.

So for example, each player generates key for themselves, and one shared key for deck of cards. And then depending on their keys they can generate which cards they take from deck. And let's say at the end of the game both players can give keys back so they would see no one was cheating.

Is it possible?

submitted by /u/welldan97
[link] [comments]
Categories: Information Security

Using game of life as a PRNG. Guess the key

Mon, 11/26/2018 - 04:47

The sequence: 12, 10, 17, 9, 4, 3, 4

It was made using this img.

Steps for how to make this sequence:

Pick 2 letters and write them out in life. Put a 1 pixel space between the letters. Run life and write out the population as the sequence. Done.

Which 2 letters did i use to generate this sequence?

Does this method have any application to real cryptography?

submitted by /u/GeneralLion
[link] [comments]
Categories: Information Security

Can someone help me decode this

Mon, 11/26/2018 - 02:33






not sure if the format matters, but the bottom is how it appears, top is just the raw text.

Any help or leads would be much appreciated thanks :)

submitted by /u/MichaelS10
[link] [comments]
Categories: Information Security

Another crazy,yet simple cipher idea,question thingy

Sun, 11/25/2018 - 12:40

I was wondering if it was possible to make a cipher with the decryption key being the encrypted message itself. ((Ps:I know this might not be the kind of thing for this subreddit,but still.....))

submitted by /u/DeciphRer
[link] [comments]
Categories: Information Security

Sequential N-key Rollover Passwords

Sat, 11/24/2018 - 13:43

Years ago I was chatting with a guy who was going through the military's hacking program.

He told me a story about their professor challenging the class in a "you better not try this" kind of way to hack his home computer.

Several tried and got their systems fried by defensive systems in return.

But he mentioned how their commanding officer's passwords worked, claiming they were essentially unhackable or rather unguessable.

He said they used combinations of letters and numbers input simultaneously, what we'd call an N-key rollover password, and sequences of these.

It makes sense I think, the search-space of sequential N-key rollover passwords most be enormously larger than any serial password.

This is one of those things that has always stuck in my head and I've wondered about, but have any of you heard anything like this?

Has anyone else implemented an N-key rollover password system?

submitted by /u/Anen-o-me
[link] [comments]
Categories: Information Security

Shadoonsky's Puzzle

Sat, 11/24/2018 - 13:23

Hello friends, I've decided to make a set of ten ORIGINAL ciphers for the fun of it. IF you manage to solve all of them you get money (5 dollars)

(join the discord for updates on the cipher, prices may go up and you can find teammates to work with HERE)




submitted by /u/Shadoonsky
[link] [comments]
Categories: Information Security

Zodiac Z340 Solved - Suspect Identified in Vermont

Sat, 11/24/2018 - 12:03

The Z340 is now able to be pieced together from this small video explaining the guides and keys.

This is not a joke, and the information is considered open to conjecture and argument, but after working out the ciphers in the cold case files, I was able to identify a suspect through the use of textbook examinations, identifying the templates and mechanics of the operations.

Sounds impossible right? That's not what the FBI and the Vallejo PD said.......

And when the locals heard about the ciphers being cracked, the Burlington Police Dept sent detectives to question me, acting suspicious.

Later when I made the effort to contact the Burlington Free Press to explain the discoveries and the harassment, I made the effort to make an article with Denis Finley, the Editor. He was fired the same day that I was opening discussions with him.....

To explain how I decoded all of them, the Zodiac left a few key points of reference that could be easily seen leading him to Vermont in a trail of ciphers. When the images were collected from ALL the locations, and a person who was in the area at each of the times was tracked down, the images of that suspect matched in the photos from every part of the series of killings that were made in his name.[/IMG]

The final solves lead to a Quarry in Vermont where he continued his affairs.[/IMG]

Search on FB for the complete page of all the ciphers and the evidence showing the suspect that fled to Vermont.


submitted by /u/EldoradoEnterprises
[link] [comments]
Categories: Information Security