Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | soatok.blog
5.1 parsecs away

Travel
| | Ever since the famous "Open Sesame" line from One Thousand and One Nights, humanity was doomed to suffer from the scourge of passwords. Courtesy of SwiftOnSecurity Even in a world where we use hardware tokens with asymmetric cryptography to obviate the need for passwords in modern authentication protocols, we'll still need to include "something you...
| | www.jeremykun.com
5.1 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | negativesign.com
4.5 parsecs away

Travel
| | This one hits close to home. I can't imagine how the NIST staff involved in creating SP 800 (and more specifically, the SP 800-90A Dual Elliptic Curve Deterministic Random Bit Generation...bit) must feel. First of all, given the definition of a deterministic system, the title itself gives me pause. Maybe there's some next-level random number theory described in the standard, but I'm not sure I'd ever want a random number generator to exhibit deterministic behavior.
| | tashian.com
22.0 parsecs away

Travel
| The story of a major hash table vulnerability, and how it took a decade to uncover and resolve.