Explore >> Select a destination


You are here

www.cryptofails.com
| | neilmadden.blog
3.9 parsecs away

Travel
| | If you read or watch any recent tutorial on symmetric (or "secret key") cryptography, one lesson should be clear: in 2018 if you want to encrypt something you'd better useauthenticated encryption.This not only hides the content of a message, but also ensures that the message was sent by one of the parties that has access...
| | scottarc.blog
3.2 parsecs away

Travel
| | This isn't (necessarily) a security vulnerability; merely an observation that I don't think has been articulated adequately within the cryptography community. I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems. Background Once upon a time, there was Symmetric Encryption, which provided confidentiality, but...
| | blog.hboeck.de
3.7 parsecs away

Travel
| |
| | soatok.blog
23.8 parsecs away

Travel
| Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...