You are here |
soatok.blog | ||
| | | |
www.latacora.com
|
|
| | | | When people talk about PBKDFs (Password Based Key Derivation Functions), this is usually either in the context of secure password storage, or in the context of how to derive cryptographic keys from potentially low-entropy passwords. The Password Hashing Competition (PHC, 2013-2015) was an open competition to derive new password hashing algorithms, resulting in Argon2 hash as its winner. Apart from achieving general hash security, many of the candidates focused on achieving resistance to parallel attacks ... | |
| | | |
blog.cryptographyengineering.com
|
|
| | | | This page has some wonky notes about the Secure Remote Password protocol. TL;DR: I don't like it. It's also not obviously broken. But it's inefficient and you should use OPAQUE. Like most PAKE protocols, SRP has two phases. In the sign-up phase, the user registers a "password verifier" with the server. This valueis not actually... | |
| | | |
blog.cryptographyengineering.com
|
|
| | | | The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE - which stands forPassword Authenticated Key Exchange- is actually one of the most useful technologies that (almost) never gets used. It should be deployed everywhere, and yet it isn't.... | |
| | | |
www.jrebel.com
|
|
| | In this blog, we take a look at the Kotlin language, how it's used, how it compares to Java, and how it works with the Android OS. |