Pages tagged crypto:

Matasano Chargen » Blog Archive » Typing The Letters A-E-S Into Your Code? You’re Doing It Wrong!
http://www.matasano.com/log/1749/typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/

A-E
UTF8Encoding
Professional crypto people don’t even get this stuff right. But if you have to encrypt something, you might as well use something that has already been tested.
Matasano Chargen
Cryptographic Right Answers
http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html
"list of recommendations for using cryptography which, if followed, will make sure you get things right in the vast majority of situations"
Thanks to my background as FreeBSD Security Officer, as a cryptographic researcher, and as the author of the Tarsnap secure online backup system, I am frequently asked for advice on using cryptography as a component in secure systems. While some people argue that you should never use cryptographic primitives directly and that trying to teach people cryptography just makes them more likely to shoot themselves in their proverbial feet, I come from a proud academic background and am sufficiently optimistic about humankind that I think it's a good idea to spread some knowledge around. In light of this, I've put together a list of "Cryptographically Right Answers" -- which is to say, a list of recommendations for using cryptography which, if followed, will make sure you get things right in the vast majority of situations.
Recommendations about cryptography
CrypTool - Educational Tool for Cryptography and Cryptanalysis
http://cryptool.com/
jCryption - JavaScript data encryption
http://www.jcryption.org/
In short words jCryption is a javascript HTML-Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett modular reduction libraries for the calculations and jQuery for the rest.
** Posted using Viigo: Mobile RSS, Sports, Current Events and more **
In short words jCryption is a javascript HTML-Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett modular reduction libraries for the calculations and jQuery for the rest. jCryption is completly free and dual licensed under the MIT and GPL licenses like jQuery.
http://hackerschool.org/DefconCTF/17/B300.html
http://hackerschool.org/DefconCTF/17/B300.html
Educational hacking comic from Korea that writes up how to solve a DEFCON challenge.
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Advanced Encryption Standard (AES)
good explanation of AES Rijndael.
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
http://codahale.com/a-lesson-in-timing-attacks/
Timing Attacks
jsCrypto
http://crypto.stanford.edu/sjcl/
Encrypt data sentback to a server - quickly
We offer a fast, small symmetric encryption library written in Javascript. Though several such libraries exist, jsCrypto offers several advantages.
» A Sixty-Eight Year Old Code - Entropic Memes
http://www.slugsite.com/archives/957
ink is really cool, though, is that the photo also shows the agent’s worksheet:
German
Benlog » Don’t Hash Secrets
http://benlog.com/articles/2008/06/19/dont-hash-secrets/
I know very little about cryptography, but I do find it fascinating. This article seems to have solid, real-world advice, yet it is written in a way that even I can understand it. People who can write like this impress me.
why hash is not security
National Security Agency Releases History of Cold War Intelligence Activities
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm
Excised
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm Very interesting history of a once "black" agency.
Product Details - Sectéra® Edge™ SME PED - Overview
http://www.gdc4s.com/content/detail.cfm?item=32640fd9-0213-4330-a742-55106fbaff32
The Sectéra® Edge™ smartphone converges secure wireless voice and data by combining the functionality of a wireless phone and PDA — all in one easy-to-use handheld device. Developed for the National Security Agency’s Secure Mobile Environment Portable Electronic Device (SME PED) program, the Sectéra Edge is certified to protect wireless voice communications classified Top Secret and below as well as access e-mail and websites classified Secret and below. The Sectéra Edge is the only SME PED that switches between an integrated classified and unclassified PDA with a single key press.
General Dynamics C4 Systems is a leading integrator of network-centric command, control, communication and computing solutions from space to ground - core to edge. The company’s focus is on engineering and integrating secure communication, information and technology solutions that facilitate the delivery of relevant information to speed the decision cycle, so our customers can see, hear, decide and act with absolute confidence - faster and more effectively.
Obama's new Blackberry - Sectera Edge by General Dynamics, the only smart phone NSA rated for Top Secret communications. http://is.gd/fZqn [from http://twitter.com/eighteyes/statuses/1139490924]
Obama's new NSA-approved phone
staple / unstaple
http://sysnet.ucsd.edu/projects/staple/
A tool that forces people to commit a crime if they want to prove an archive contains stolen content. Turning the DMCA against those who try to use it. Cute in a contrarian activist sort of way.
staple is a program that inseparably binds together the data in a file using a cryptographic mechanism known as an All-or-nothing transform. In its most basic form (when executed as staple 0), the transformation is keyless; that is, no key is required to reverse it, however all the data is required. Thus, running unstaple on the output .staple file yields the original file, but running it on any subset of the .staple file yields nothing.
[...]It has been suggested that this scenario occurs if Alice is a content producer/owner, Bob is a content piracy group, and Charlie is a user unconcerned about copyright infringement. Taking their last example: Alice could pretend to have brute-forced the key k rather than recovered from B and r, no? And is all-or-nothing so hard to do? what about making c=k xor H(Ek(m)) | Ek(m) ? You need the full data to compute the hash on the encrypted message to recover the key and decrypt the message. And you can throw away part of the key also in this scheme UPDATE: hum actually it appears that it's precisely what he's doing :-)
all or nothing cryptographic transform
"staple is a program that inseparably binds together the data in a file using a cryptographic mechanism known as an All-or-nothing transform. In its most basic form (when executed as staple 0), the transformation is keyless; that is, no key is required to reverse it, however all the data is required. Thus, running unstaple on the output .staple file yields the original file, but running it on any subset of the .staple file yields nothing. staple can also be asked to do something slightly strange: in the process of executing the All-or-nothing transform, a random key is used for encryption of the data - staple can be instructed to throw away part of that key. (The only argument staple takes is the number of key bytes to throw away; only 0, 2, and 4 are accepted currently.)"
Stanford Javascript Crypto Library
http://bitwiseshiftleft.github.com/sjcl/
Whisper Systems
http://www.whispersys.com/
Encrypted VOIP and SMS for Android phones.
crypto apps for the Android phone: voip and secure text
RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in. It's easy to use, and functions just like the normal dialer you're accustomed to. RedPhone uses your normal mobile number for addressing, so there's no need to have yet another identifier or account name; if you know someone's mobile number you know how to call them using RedPhone. And when you receive a RedPhone call your phone will ring just like normal, even if it is asleep.