Rapid Tables (Covert Hex to Binary ; vice versa | some customization options included) = https://www.rapidtables.com/convert/number/hex-to-binary.html
Post-Quantum Cryptography, Part 2: Supersingular Isogenies = https://dev.to/artis3n/post-quantum-cryptography-part-2-supersingular-isogenies-c
Post-Quantum Cryptography, Part 2: Supersingular Isogenies = https://dev.to/artis3n/post-quantum-cryptography-part-2-supersingular-isogenies-c
Rapidtables
Hex to Binary Converter
Hexadecimal to binary number conversion calculator. Base 16 to base 2.
Apologies - slight misfire there.
Those links will be posted back in here, don't worry, but we're going to do it in an orderly fashion.
Sorry about that!
Those links will be posted back in here, don't worry, but we're going to do it in an orderly fashion.
Sorry about that!
Brief Side Message Regarding the Picture Change
The picture you see in this channel is a variation of the default 'librehash' (name of the overaching brand).
The bird is purposefully opaque as a representation of the nature of cryptography itself.
Don't want to get too deep here.
There was a brief hiatus when this channel began. That's over now.
The picture you see in this channel is a variation of the default 'librehash' (name of the overaching brand).
The bird is purposefully opaque as a representation of the nature of cryptography itself.
Don't want to get too deep here.
There was a brief hiatus when this channel began. That's over now.
Link Where Cryptography-Based Research Papers Are Being Aggregated
URL = https://cloud.libreha.sh/wl/?id=nfYrWBW7Fzv13r1dXTwHKD0ysexFDnZg
We recently deployed an instance of 'FileRun' (link = https://www.filerun.com/; code is open source and plenty auditable for all those that are curious) for the purposes of having:
A) An online, 'cloud'-based means of storing files (that isn't Telegram).
B) Circumventing the heavy level of surveillance and information extraction that Google / Amazon and other participate in (primarily Google)
C) Gaining more flexibility
——
We'll have more information on that soon. But in the meantime, just want to reiterate that the link where a few cryptography papers can be found at is here: https://cloud.libreha.sh/wl/?id=nfYrWBW7Fzv13r1dXTwHKD0ysexFDnZg
Expect that this repository of information will grow exponentially over time and, as it does, we will begin sifting these papers in subcategories (i.e., Post-Quantum Cryptography / Lattice-Based Cryptography / Elliptic Curves / Hash Signatures / etc.)
URL = https://cloud.libreha.sh/wl/?id=nfYrWBW7Fzv13r1dXTwHKD0ysexFDnZg
We recently deployed an instance of 'FileRun' (link = https://www.filerun.com/; code is open source and plenty auditable for all those that are curious) for the purposes of having:
A) An online, 'cloud'-based means of storing files (that isn't Telegram).
B) Circumventing the heavy level of surveillance and information extraction that Google / Amazon and other participate in (primarily Google)
C) Gaining more flexibility
——
We'll have more information on that soon. But in the meantime, just want to reiterate that the link where a few cryptography papers can be found at is here: https://cloud.libreha.sh/wl/?id=nfYrWBW7Fzv13r1dXTwHKD0ysexFDnZg
Expect that this repository of information will grow exponentially over time and, as it does, we will begin sifting these papers in subcategories (i.e., Post-Quantum Cryptography / Lattice-Based Cryptography / Elliptic Curves / Hash Signatures / etc.)
MIT News Cryptography Source = https://news.mit.edu/topic/cryptography
Appears to be a collection of articles & information by MIT News related to cryptography.
Appears to be a collection of articles & information by MIT News related to cryptography.
news.mit.edu
Cryptography | MIT News
OWASP Guide to Cryptography = https://www.owasp.org/index.php/Guide_to_Cryptography
Solid source that provides the basics behind cryptography (not too basic) - introducing concepts such as: Asymmetric Cryptography, Non-Repudiation, Authentication, Confidentiality, Various Hash Algorithms, etc.
Solid source that provides the basics behind cryptography (not too basic) - introducing concepts such as: Asymmetric Cryptography, Non-Repudiation, Authentication, Confidentiality, Various Hash Algorithms, etc.
OWASP Guide to Cryptography = https://www.owasp.org/index.php/Guide_to_Cryptography
Solid source that provides the basics behind cryptography (not too basic) - introducing concepts such as: Asymmetric Cryptography, Non-Repudiation, Authentication, Confidentiality, Various Hash Algorithms, etc.
Solid source that provides the basics behind cryptography (not too basic) - introducing concepts such as: Asymmetric Cryptography, Non-Repudiation, Authentication, Confidentiality, Various Hash Algorithms, etc.
Ming Chow (Professor) Lecture on 'Cryptography & Cybersecurity' = https://cloud.libreha.sh/wl/?id=kznpdMGEYkx5Ity3nSt3qAAq9KM80VfJ
For whatever reason, this has been deleted off of the internet - but the pdf was already saved in our files, so we re-uploaded
For whatever reason, this has been deleted off of the internet - but the pdf was already saved in our files, so we re-uploaded
An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things = https://cloud.libreha.sh/wl/?id=zPDi9G2UMsPEeuA37fmVpJYobGhnLKnr
This research report is being posted in here because it *cracks the door open* on the possibility that a more *energy-efficient* means of hashing out results could be deployable on the Bitcoin protocol at some point.
This, of course, requires a lot of assumptions and the logistics of such a 'swap' is not even remotely discussed in this paper (it has nothing to do with blockchain).
This research report is being posted in here because it *cracks the door open* on the possibility that a more *energy-efficient* means of hashing out results could be deployable on the Bitcoin protocol at some point.
This, of course, requires a lot of assumptions and the logistics of such a 'swap' is not even remotely discussed in this paper (it has nothing to do with blockchain).
But if we extrapolate the study itself, the observations it makes and the potential implications of what this report tells us, it at least provides itself as useful fodder for conversation / musing.
Perhaps we'll throw this on the forums (launching soon) underneath the 'cryptography' section for discussion if anyone is interested in the near future.
Perhaps we'll throw this on the forums (launching soon) underneath the 'cryptography' section for discussion if anyone is interested in the near future.
BCrypt = http://bcrypt.sourceforge.net/ ("A cross platform file encryption utility. Encrypted files are portable across all supported operating systems and processors.")
BeeCrypt = http://beecrypt.sourceforge.net/ (A portable and fast cryptography library)
Botan = http://botan.randombit.net/ (A crypto library for C++)
Crypto++ = https://github.com/weidai11/cryptopp (A free C++ class library of cryptographic schemes)
Botan = http://botan.randombit.net/ (A crypto library for C++)
Crypto++ = https://github.com/weidai11/cryptopp (A free C++ class library of cryptographic schemes)
digestpp = https://github.com/kerukuro/digestpp (C++11 header-only message digest (hash) library)
Note: The digest library is experimental
According to the GitHub it, "Derived from cppcrypto in an attempt to devise a more modern yet flexible and universal C++ API for cryptographic hash functions."
—-
Quick FAQ:
'What is a Message Digest Library?'
"Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length hash value." ; (source: https://docs.oracle.com/javase/7/docs/api/java/security/MessageDigest.html)
——
The GitHub gives a few hypothetical examples of how this would work in practice using some well-known hash functions.
Note: The digest library is experimental
According to the GitHub it, "Derived from cppcrypto in an attempt to devise a more modern yet flexible and universal C++ API for cryptographic hash functions."
—-
Quick FAQ:
'What is a Message Digest Library?'
"Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length hash value." ; (source: https://docs.oracle.com/javase/7/docs/api/java/security/MessageDigest.html)
——
The GitHub gives a few hypothetical examples of how this would work in practice using some well-known hash functions.
GitHub
GitHub - kerukuro/digestpp: C++11 header-only message digest library
C++11 header-only message digest library. Contribute to kerukuro/digestpp development by creating an account on GitHub.
Quick Recommendation: Mute This Channel Today
There are going to be a slew of updates in here today. The messages will be “muted” on our end, but you’ll still receive a silent notification / pop-up on your phone if you don’t have us muted.
We’ll try our best to be tactful with how we post in this channel, but there’s a ton of information that’s really worth distributing that’s been vetted out already (we’re not just forwarding you any random links about cryptography).
We’ll compensate for it by creating a website / blog of some sort to hold some of this content.
If you’re worried about forgetting about this channel, we will probably send out a “reminder” message that we’re here w updates every day or so.
There are going to be a slew of updates in here today. The messages will be “muted” on our end, but you’ll still receive a silent notification / pop-up on your phone if you don’t have us muted.
We’ll try our best to be tactful with how we post in this channel, but there’s a ton of information that’s really worth distributing that’s been vetted out already (we’re not just forwarding you any random links about cryptography).
We’ll compensate for it by creating a website / blog of some sort to hold some of this content.
If you’re worried about forgetting about this channel, we will probably send out a “reminder” message that we’re here w updates every day or so.
Multiple Public-Key Algorithm X.509 Certificates (Draft ; IETF) | link = https://tools.ietf.org/html/draft-truskovsky-lamps-pq-hybrid-x509-01
We stumbled upon this link when looking for a way to create an enhanced VPN solution where we could verifiably prove no logs (i.e., allowing individuals to SSH in to spun up servers that were all load shared w one another via Kubernetes or some sort of similar type of container software) <—- if that were to happen, we could just have individuals visit the IP address on the surface of the Docker container.
We stumbled upon this link when looking for a way to create an enhanced VPN solution where we could verifiably prove no logs (i.e., allowing individuals to SSH in to spun up servers that were all load shared w one another via Kubernetes or some sort of similar type of container software) <—- if that were to happen, we could just have individuals visit the IP address on the surface of the Docker container.
LibreCryptography
Multiple Public-Key Algorithm X.509 Certificates (Draft ; IETF) | link = https://tools.ietf.org/html/draft-truskovsky-lamps-pq-hybrid-x509-01 We stumbled upon this link when looking for a way to create an enhanced VPN solution where we could verifiably prove…
Walking Through the Potential Homegrown PQ-VPN Solution
At a default, we don't need to be cryptographic experts in order to create a solution like this.
We just need to make sure that we are using audited + transparent (open source at least), well-maintained software that has been appraised by numerous individuals of repute that have something to lose if they were to put their names behind something that fails to meet the sniff test.
Of course, it helps that there are already established libraries, so there isn't really guesswork in terms of where the sources are being pulled (if we were to start combing through the code to assess the veracity of what certain providers are saying).
At a default, we don't need to be cryptographic experts in order to create a solution like this.
We just need to make sure that we are using audited + transparent (open source at least), well-maintained software that has been appraised by numerous individuals of repute that have something to lose if they were to put their names behind something that fails to meet the sniff test.
Of course, it helps that there are already established libraries, so there isn't really guesswork in terms of where the sources are being pulled (if we were to start combing through the code to assess the veracity of what certain providers are saying).
First, the client needs to be selected.
There are a couple of options but most know that you're going to be forced to choose between:
A) Wireguard
or
B) OpenVPN
The latter is much more popular than the former (OpenVPN > Wireguard), but both solutions are more than serviceable.
There are a couple of options but most know that you're going to be forced to choose between:
A) Wireguard
or
B) OpenVPN
The latter is much more popular than the former (OpenVPN > Wireguard), but both solutions are more than serviceable.
Turns out that Microsoft recently released a PQ-VPN client (open source) for users to download.
Yes, yes, it is Microsoft and they of course own GitHub...
But if you do not trust their code specifically (this is impossible for a lay person to seriously audit w effectiveness), then users can always grab the liboqs library and swap out the cryptographic standards (use the PQVPN as a template)
Sources:
1. https://www.microsoft.com/en-us/research/project/post-quantum-crypto-vpn/
2. https://github.com/Microsoft/PQCrypto-VPN
Yes, yes, it is Microsoft and they of course own GitHub...
But if you do not trust their code specifically (this is impossible for a lay person to seriously audit w effectiveness), then users can always grab the liboqs library and swap out the cryptographic standards (use the PQVPN as a template)
Sources:
1. https://www.microsoft.com/en-us/research/project/post-quantum-crypto-vpn/
2. https://github.com/Microsoft/PQCrypto-VPN
They actually have the binaries for the PQ-VPN client if people would like to use it.
Works in pretty much the same exact fashion as the prior non-PQ versions of OpenVPN would've worked .
GUI and all. Deploy OpenVPN on a server somewhere and encrypt your connection.
Source: https://github.com/Microsoft/PQCrypto-VPN/releases
That message about the third-party notices and deploys is...interesting ; but there is a former version of the project available on that same repo that one must assume does not have whatever Microsoft felt needed to be added on after the fact.
Works in pretty much the same exact fashion as the prior non-PQ versions of OpenVPN would've worked .
GUI and all. Deploy OpenVPN on a server somewhere and encrypt your connection.
Source: https://github.com/Microsoft/PQCrypto-VPN/releases
That message about the third-party notices and deploys is...interesting ; but there is a former version of the project available on that same repo that one must assume does not have whatever Microsoft felt needed to be added on after the fact.