Scrape: Scalable Randomness Attested by Public Entities
Interesting, published by IOHK (under Cardano if you're familiar with crypto projects).
URL = https://cryptorating.eu/whitepapers/Cardano/216.pdf
Interesting, published by IOHK (under Cardano if you're familiar with crypto projects).
URL = https://cryptorating.eu/whitepapers/Cardano/216.pdf
GnuPG v2.3.0 Beta Testing
You can check out the actual release for GnuPG 2.3.0 (beta) here = https://github.com/gpg/gnupg/releases/tag/Beta-2.3.0-beta1655
There are a ton of modifications that have been made to how this tool performs PGP encryption, in general.
Was able to build the project w relative ease.
Definitely very cool to use ; much needed update over what we were used to w prior GPG versions.
You can check out the actual release for GnuPG 2.3.0 (beta) here = https://github.com/gpg/gnupg/releases/tag/Beta-2.3.0-beta1655
There are a ton of modifications that have been made to how this tool performs PGP encryption, in general.
Was able to build the project w relative ease.
Definitely very cool to use ; much needed update over what we were used to w prior GPG versions.
GitHub
Release Beta-2.3.0-beta1655 · gpg/gnupg
pre release test
LibreCryptography
GnuPG v2.3.0 Beta Testing You can check out the actual release for GnuPG 2.3.0 (beta) here = https://github.com/gpg/gnupg/releases/tag/Beta-2.3.0-beta1655 There are a ton of modifications that have been made to how this tool performs PGP encryption, in…
Ed448 Comes to PGP
This is a welcome addition to PGP (as this provides the strength of 10k+ length RSA keys).
Some notable additions:
1. 'Experimental database' daemon
2. tpmd2d (new daemon to physically bind keys to the local machine)
3. ed25519 made the default algorithm
4. Supports AEAD encryption mode using OCB or EAX
5. Supprots creation of EdDSA certs as well
6. Enhanced ssh-agent support
7. Telesec Signature Card v2.0 support
8. PIV card support
9. Smartcard support
10. LDAP authentication support (this is unique)
11. "gpg-card" as a tool to interface w other smart cards of all types
Among some other additions (see those here = https://github.com/gpg/gnupg/blob/master/NEWS)
I've already taken the liberty of installing all of the necessary components on my computer first from their repo (very easy to do, will probably roll this in a Docker fiole in the near future and release that to everyone in this channel so that you can have that too).
Needed to tweak a couple of things to get ed448 signatures going (had a previous version of gpgconf + gpg-agent already pre-installed, so had to ensure that the correct modules were being referenced). Overall though - smooth experience.
This is beta, so please keep that in mind (they'll remind you of that frequently though.
This is a welcome addition to PGP (as this provides the strength of 10k+ length RSA keys).
Some notable additions:
1. 'Experimental database' daemon
2. tpmd2d (new daemon to physically bind keys to the local machine)
3. ed25519 made the default algorithm
4. Supports AEAD encryption mode using OCB or EAX
5. Supprots creation of EdDSA certs as well
6. Enhanced ssh-agent support
7. Telesec Signature Card v2.0 support
8. PIV card support
9. Smartcard support
10. LDAP authentication support (this is unique)
11. "gpg-card" as a tool to interface w other smart cards of all types
Among some other additions (see those here = https://github.com/gpg/gnupg/blob/master/NEWS)
I've already taken the liberty of installing all of the necessary components on my computer first from their repo (very easy to do, will probably roll this in a Docker fiole in the near future and release that to everyone in this channel so that you can have that too).
Needed to tweak a couple of things to get ed448 signatures going (had a previous version of gpgconf + gpg-agent already pre-installed, so had to ensure that the correct modules were being referenced). Overall though - smooth experience.
This is beta, so please keep that in mind (they'll remind you of that frequently though.
GitHub
gpg/gnupg
The GNU Privacy Guard. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commits, submit them usual way to bug tracker (https://www.gnupg.org/documenta...
Back to Cryptography
1. https://github.com/claucece/useful-crypto-resources
2. https://github.com/Deadlyelder/Tools-for-Cryptanalysis
3. https://github.com/hellman/cryptools
1. https://github.com/claucece/useful-crypto-resources
2. https://github.com/Deadlyelder/Tools-for-Cryptanalysis
3. https://github.com/hellman/cryptools
GitHub
GitHub - claucece/useful-crypto-resources: A place for useful crypto-related resources plus some of my fav stuff
A place for useful crypto-related resources plus some of my fav stuff - claucece/useful-crypto-resources
PQSignatures = http://www.pqsignatures.org
https://cr.yp.to/crypto.html (Daniel J. Bernstein; the man, the myth, the legend)
https://cr.yp.to/crypto.html (Daniel J. Bernstein; the man, the myth, the legend)
1. ssb-box-stream: https://crates.io/crates/ssb-box-stream
2. captain-lib: https://crates.io/crates/capitan-lib
3. snocat: https://crates.io/crates/snocat
4. xoodyak: https://crates.io/crates/xoodyak
5. xsalsa20poly1305: https://crates.io/crates/xsalsa20poly1305
2. captain-lib: https://crates.io/crates/capitan-lib
3. snocat: https://crates.io/crates/snocat
4. xoodyak: https://crates.io/crates/xoodyak
5. xsalsa20poly1305: https://crates.io/crates/xsalsa20poly1305
"NOBUS" ('nobody but us')
This concept refers to a specific exploit / vulnerability that has been brought to the attention of the NSA that it decides to leave unpatched (or instructs the relevant vendor [i.e., Microsoft or Intel, for example, to leave unpatched]) in cases where the agency believes that they are the only ones with the knowledge, sophistication and resource to actually leverage a compromising attack against the software that utilizes the specific vulnerability / exploit that has been brought to their attention.
According to a statement from NSA Director Michael Hayden:
"You look at a vulnerability through a different lens if even with the vulnerability it requires substantial computational power or substantial other attributes and you have to make the judgment who else can do this? If there's a vulnerability here that weakens encryption but you still need four acres of Cray computers in the basement in order to work it you kind of think "NOBUS" and that's a vulnerability we are not ethically or legally compelled to try to patch – it's one that ethically and legally we could try to exploit in order to keep Americans safe from others."
This concept refers to a specific exploit / vulnerability that has been brought to the attention of the NSA that it decides to leave unpatched (or instructs the relevant vendor [i.e., Microsoft or Intel, for example, to leave unpatched]) in cases where the agency believes that they are the only ones with the knowledge, sophistication and resource to actually leverage a compromising attack against the software that utilizes the specific vulnerability / exploit that has been brought to their attention.
According to a statement from NSA Director Michael Hayden:
"You look at a vulnerability through a different lens if even with the vulnerability it requires substantial computational power or substantial other attributes and you have to make the judgment who else can do this? If there's a vulnerability here that weakens encryption but you still need four acres of Cray computers in the basement in order to work it you kind of think "NOBUS" and that's a vulnerability we are not ethically or legally compelled to try to patch – it's one that ethically and legally we could try to exploit in order to keep Americans safe from others."
LibreCryptography
"NOBUS" ('nobody but us') This concept refers to a specific exploit / vulnerability that has been brought to the attention of the NSA that it decides to leave unpatched (or instructs the relevant vendor [i.e., Microsoft or Intel, for example, to leave unpatched])…
The obvious stupidity in this policy is:
1. The idea that the NSA possesses such an inherent (and permanent) advantage vs. all others on planet earth that there could exist vulnerabilities / exploits that only it could exploit (and nobody else; American hubris at its finest possibly)
2. The idea that there are no 'double agents', 'spies' (etc.) that are embedded within the relevant intelligence agencies dealing with these secrets.
3. The failure to put a 'cap' or timestamped limit for when the vulnerability will be patched. For example, perhaps they find a vulnerability that they consider to be NOBUS in 2011, and decide to leave that exploit unpatched - when does it become patched? Surely, the NSA cannot have believed that they stumbled across exploits that nobody would ever be able to exploit at any point in time - either then or in the future, right?
4. The NSA has frequently made purchases of certain exploits on the 'grey market' from various vendors. To leave those exploits unpatched exhibits stupidity in its rawest form because, by virtue of the fact that there exists a 3rd-party vendor with the ability to find certain zero-day vulnerabilities in software (among other things), means that the assumption should be that there exists 3rd-parties (in general), with the capability to find the same bugs / exploits and leverage them by passing that information on to their respective intelligence unit(s).
This policy of 'NOBUS' has resulted in tens of millions of Americans becoming the victim of various data breaches, hacks, ransomware etc.
1. The idea that the NSA possesses such an inherent (and permanent) advantage vs. all others on planet earth that there could exist vulnerabilities / exploits that only it could exploit (and nobody else; American hubris at its finest possibly)
2. The idea that there are no 'double agents', 'spies' (etc.) that are embedded within the relevant intelligence agencies dealing with these secrets.
3. The failure to put a 'cap' or timestamped limit for when the vulnerability will be patched. For example, perhaps they find a vulnerability that they consider to be NOBUS in 2011, and decide to leave that exploit unpatched - when does it become patched? Surely, the NSA cannot have believed that they stumbled across exploits that nobody would ever be able to exploit at any point in time - either then or in the future, right?
4. The NSA has frequently made purchases of certain exploits on the 'grey market' from various vendors. To leave those exploits unpatched exhibits stupidity in its rawest form because, by virtue of the fact that there exists a 3rd-party vendor with the ability to find certain zero-day vulnerabilities in software (among other things), means that the assumption should be that there exists 3rd-parties (in general), with the capability to find the same bugs / exploits and leverage them by passing that information on to their respective intelligence unit(s).
This policy of 'NOBUS' has resulted in tens of millions of Americans becoming the victim of various data breaches, hacks, ransomware etc.
State Cannot Be Trusted With Decryption Powers
These powers continue to be abused at a level that breaches criminality.
Therefore, strong encryption is recommended at any and all costs.
The argument against child abuse is a valid one, even if used disingenuously by various agencies seeking to deprive citizens of their right to privacy. However, the gov't needs to find other ways to stop & prevent human trafficking and other sex crimes.
If they're decrypting communications after-the-fact, then they're already too late.
The goal should not be just to apprehend criminals, but rather find ways to prevent the crime itself from happening. Even if only pedophiles had their data accessed via an encryption backdoor (solely) and the gov't / law enforcement used that information to arrest said pedophile, the child whom the pedophile has harmed is still harmed.
The goal must be to prevent that child from being harmed in the first place. Settling for apprehending the offenders after-the-fact is a half-assed consolation prize that betrays the fact that the gov't (or whatever law enforcement making such arguments) may not really give a fuck about this issue.
These powers continue to be abused at a level that breaches criminality.
Therefore, strong encryption is recommended at any and all costs.
The argument against child abuse is a valid one, even if used disingenuously by various agencies seeking to deprive citizens of their right to privacy. However, the gov't needs to find other ways to stop & prevent human trafficking and other sex crimes.
If they're decrypting communications after-the-fact, then they're already too late.
The goal should not be just to apprehend criminals, but rather find ways to prevent the crime itself from happening. Even if only pedophiles had their data accessed via an encryption backdoor (solely) and the gov't / law enforcement used that information to arrest said pedophile, the child whom the pedophile has harmed is still harmed.
The goal must be to prevent that child from being harmed in the first place. Settling for apprehending the offenders after-the-fact is a half-assed consolation prize that betrays the fact that the gov't (or whatever law enforcement making such arguments) may not really give a fuck about this issue.
Libsodium Documentation (great) = https://libsodium.gitbook.io/doc/memory_management
^^^ Memory management. Making sure that your keys / secrets aren't exfiltrated - this is important.
^^^ Memory management. Making sure that your keys / secrets aren't exfiltrated - this is important.
libsodium.gitbook.io
Secure memory | Libsodium documentation
Forwarded from LibreSec
FSCrypt (should be putting this in the @librecryptography channel as well)
Think that this is a great file-level encryption tool for those that are looking for one (hell of a lot better than encryptFS where the author of that tool didn't want to get off of their ass to ensure that it was equipped with the latest & greatest as it pertains to standardized cryptographic algorithms - specifically KDFs [dumbass insisted on leaving Scrypt - which is vulnerable to side channel / timing attacks] - https://opensourcelibs.com/lib/fscrypt
FSCrypt uses Argon2i for its KDF (believe that it also leverages XChaCha20-Poly1305 for encryption as well (could be wrong on that - but check the encryption to see if this is something that I'm wrong about)
Think that this is a great file-level encryption tool for those that are looking for one (hell of a lot better than encryptFS where the author of that tool didn't want to get off of their ass to ensure that it was equipped with the latest & greatest as it pertains to standardized cryptographic algorithms - specifically KDFs [dumbass insisted on leaving Scrypt - which is vulnerable to side channel / timing attacks] - https://opensourcelibs.com/lib/fscrypt
FSCrypt uses Argon2i for its KDF (believe that it also leverages XChaCha20-Poly1305 for encryption as well (could be wrong on that - but check the encryption to see if this is something that I'm wrong about)
Opensourcelibs
Fscrypt - Go tool for managing Linux filesystem encryption - (fscrypt)
Fscrypt is an open source software project. Go tool for managing Linux filesystem encryption.
Forwarded from Librehash Research
image_2021-08-23_03-58-17.png
74.5 KB
Was looking for something else related to Ethereum, but saw this Reddit comment & felt compelled to respond.
1. Ethereum's version of keccak is different than the SHA3 standard because they decided to move ahead before the authors of the algorithm sent in their final submissions (to the NIST competition; 'Blake' was another finalist here).
2. The "NSA" did not force the authors to tweak their algorithm. The U.S. agency responsible for holding the competition, liaising w teams, publishing information & ultimately adjudicating the competition was the NIST.
1. Ethereum's version of keccak is different than the SHA3 standard because they decided to move ahead before the authors of the algorithm sent in their final submissions (to the NIST competition; 'Blake' was another finalist here).
2. The "NSA" did not force the authors to tweak their algorithm. The U.S. agency responsible for holding the competition, liaising w teams, publishing information & ultimately adjudicating the competition was the NIST.
Forwarded from Librehash Research
Apologies, I stated above that the NSA did not 'force' the researchers to make changes but looking closer here it appears the user actually stated that, "NSA modified some parts from Keccak256 and released it as the current SHA-3 after ethereum release, that's the reason ethereum uses keccak256 and not sha-3."
This is unequivocally false. And we know that its false because there were no changes made to the actual cryptographic algorithm.
Here's an excerpt from Wikipedia that explains this well (Wikipedia does an excellent job of breaking down tech & math-related concepts; just don't consult that site for anything that falls outside of that topic).
This is unequivocally false. And we know that its false because there were no changes made to the actual cryptographic algorithm.
Here's an excerpt from Wikipedia that explains this well (Wikipedia does an excellent job of breaking down tech & math-related concepts; just don't consult that site for anything that falls outside of that topic).
Forwarded from Librehash Research
"The hash function competition called for hash functions at least as secure as the SHA-2 instances. It means that a d-bit output should have d/2-bit resistance to collision attacks and d-bit resistance to preimage attacks, the maximum achievable for d bits of output. Keccak's security proof allows an adjustable level of security based on a "capacity" c, providing c/2-bit resistance to both collision and preimage attacks. To meet the original competition rules, Keccak's authors proposed c=2d. The announced change was to accept the same d/2-bit security for all forms of attack and standardize c=d. This would have sped up Keccak by allowing an additional d bits of input to be hashed each iteration. However, the hash functions would not have been drop-in replacements with the same preimage resistance as SHA-2 anymore; it would have been cut in half, making it vulnerable to advances in quantum computing, which effectively would cut it in half once more."
Forwarded from Librehash Research
Article mentions that Schneier went out on a limb here to say that the NSA had forced the authors to make change to the algorithm but this is simply not true...and he walked that statement back in an apology (source: *https://www.schneier.com/blog/archives/2013/10/will_keccak_sha-3.html*) <— note that Schneier had a competitor in this competition (Skein; this is a very cool hash algo).
Forwarded from Librehash Research
image_2021-08-23_04-10-20.png
136.9 KB
Last two sentences up here are worth reading (remember this whole thing happened post-Snowden [as in Snowden just happened only slightly prior], so there was a lot of scrutiny on them as well as the selected winners).
End Result
"In response to the controversy, in November 2013 John Kelsey of NIST proposed to go back to the original c = 2d proposal for all SHA-2 drop-in replacement isntances. The reversion was confirmed [in] subsequent drafts and the final release."
End Result
"In response to the controversy, in November 2013 John Kelsey of NIST proposed to go back to the original c = 2d proposal for all SHA-2 drop-in replacement isntances. The reversion was confirmed [in] subsequent drafts and the final release."
Zax
This is a pretty cool project. Apparently, they're an "NaCL-based Cryptographic Relay"
Here's their GitHub - https://github.com/vault12/zax
On their GH they state, "Zax is a NaCL-based Cryptographic Relay, easily accessed via the Glow library ('glow' is a repo under 'vault12' on GH). Zax relay nodes are asynchronous 'dead drops' for mobile communications. Relays are intended to be multiplied for reliability and form a distributed network. Individual devices send messages to a mutually deterministic subset of relays and check the same for response traffic."
This is a pretty cool project. Apparently, they're an "NaCL-based Cryptographic Relay"
Here's their GitHub - https://github.com/vault12/zax
On their GH they state, "Zax is a NaCL-based Cryptographic Relay, easily accessed via the Glow library ('glow' is a repo under 'vault12' on GH). Zax relay nodes are asynchronous 'dead drops' for mobile communications. Relays are intended to be multiplied for reliability and form a distributed network. Individual devices send messages to a mutually deterministic subset of relays and check the same for response traffic."
GitHub
GitHub - vault12/zax: NaCl-based Cryptographic Relay
NaCl-based Cryptographic Relay. Contribute to vault12/zax development by creating an account on GitHub.
Question on Crypto StackExchange about Viability of EC256 and SHA256
Hoping to get answers to this soon - https://crypto.stackexchange.com/questions/95458/nsa-removed-ec256-and-sha256-from-cnsa-recently-should-we-be-alarmed-by-this
Kind of concerned about it, but don't want to raise flags on something prematurely.
One of the experts can help sort that one out.
Hoping to get answers to this soon - https://crypto.stackexchange.com/questions/95458/nsa-removed-ec256-and-sha256-from-cnsa-recently-should-we-be-alarmed-by-this
Kind of concerned about it, but don't want to raise flags on something prematurely.
One of the experts can help sort that one out.
Cryptography Stack Exchange
NSA removed EC-256 and SHA-256 from CNSA recently--should we be alarmed by this?
Recently, the NSA (re-published?) their CNSA guidelines and some information on post-quantum computers (per the noscript of the document).
Here's the link for convenience (document is noscriptd, 'Quantum
Here's the link for convenience (document is noscriptd, 'Quantum
LibreCryptography
Question on Crypto StackExchange about Viability of EC256 and SHA256 Hoping to get answers to this soon - https://crypto.stackexchange.com/questions/95458/nsa-removed-ec256-and-sha256-from-cnsa-recently-should-we-be-alarmed-by-this Kind of concerned about…
This astronomical question did not get sufficiently answered - which is worrisome. But we'll leave that on the side for the time being (this will be addressed in short fashion)
Post-Quantum Signature Curves = https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
CSRC | NIST
Round 2 Submissions - Post-Quantum Cryptography | CSRC | CSRC
Official comments on the Second Round Candidate Algorithms should be submitted using the 'Submit Comment' link for the appropriate algorithm. Comments from the pqc-forum Google group subscribers will also be forwarded to the pqc-forum Google group list. We…