log☇︎
78 entries in 0.31s
asciilifeform always wondered whether this and similar publishers, printed such marvels as 'course of cryptography' where caesar's cipher was presented as state of art, or the various 'wonderful explosives in kitchen' schemes ~guaranteed to homogenize the experimenter , at usg behest, or via the ample ameri-supply of naturally occurring idjicy
asciilifeform: http://btcbase.org/log/2019-03-04#1900360 >> lol!! >> 'A Keybase team is a group of people who can communicate with end-to-end cryptography. This means the team's chats and files cannot be read by anyone outside the team, not even someone who breaks into Keybase's servers.' << didjaknow. ☝︎
asciilifeform: meanwhile, even in heathendom : http://p.bvulpes.com/pastes/wv5Om/?raw=true >> '...the ideology of cryptography preaches the exact opposite: never do custom cryptography, always use the standard one, approved by the experts who know better than you... ...At this point, tens of thousands of cryptanalysts had ten years to compromise four algorithms, designed by less than dozen experts. The official mantra to use these four is part of t
asciilifeform: mircea_popescu: iirc we had old thrd, re how cryptography never actually reached escape velocity 'out of alchemy' stage of development
asciilifeform: fuck riscv. it was deliberately designed with no arithmetical carry, to cripple cryptography. ☟︎
asciilifeform: meanwhile, in world of entomology, http://www.metzdowd.com/pipermail/cryptography/2018-January/033741.html
asciilifeform: meanwhile in entomology dept, https://www.openssl.org/blog/blog/2018/01/10/levchin << 'Today I have had great pleasure in attending the Real World Crypto 2018 conference in Zürich in order to receive the Levchin prize on behalf of the OpenSSL team. The Levchin prize for Real World Cryptography recognises up to two groups or individuals each year who have made significant advances in the practice of cryptography and its use in real-w
asciilifeform: think, d00d is paid, slaves full time, to walk around and pretend to have something to do with 'cryptography'. it's a living.
asciilifeform: http://btcbase.org/log/2017-11-19#1740644 >> https://archive.is/0nz9U << 'In a series of tweets, Matt Blaze, now a well-known cryptography professor at the University of Pennsylvania, said on Twitter that Draper took an interest in him as a teenager, and invited him to share in his "exercises."' ☝︎
asciilifeform: which is why cryptography is NOT an experimental science.
asciilifeform: http://btcbase.org/log/2017-10-17#1725950 << hilarious homogoogletranslaticus : 'we know that there are certain bookmark mechanisms in this cryptography' ☝︎
asciilifeform: 'Koch then moved into Elliptic Curve Cryptography (ECC), which he discussed at some length. RSA, he said, is not likely to stay secure for much longer without really large keys. Support for 4096-bit RSA keys has been in GnuPG for some time, but Koch contends that real security will require 16Kb keys; that makes keys, fingerprints, and signatures all unusably long, particularly for embedded devices and hardware security modules (HSMs)
asciilifeform: 'Over the last few days, some Bitcoin developers and miners got together for a social gathering to improve communication, friendship, and to do some California sightseeing. We talked about where bitcoin is and where bitcoin is going. We learned a lot from each other. We also visited Stanford to attend a cryptography talk to learn more about potential improvements for Bitcoin, as well as the Google campus to give a presentation and ta
asciilifeform: PeterL: the 'cryptography komyoonity' derps didn't do it 'because slow', but because entropy-poor machine
asciilifeform: the ~actual~ purpose of the attempted 'frameworks' is to drill into your skull and install the idea that nullcipher, diffiehellman, aes, are acceptable things to exist in this world, and can be pushed as 'cryptography'
asciilifeform: e.g. https://qualiacomputing.com/2015/05/22/how-to-secretly-communicate-with-people-on-lsd/ >> 'About 18 months ago I had a really cool idea: What if we could communicate with people who are high on LSD in such a way that sober people can’t understand?* I call this idea psychedelic cryptography (PsyCrypto for short).'
asciilifeform: srsly this entire exercise has been a brainmelting tour of the sheer unfathomable worthlessness of 'the litarature', 'the cryptography komyoonity', et al
asciilifeform: *cryptography
asciilifeform: 'cryptography engineering' . dark blue/blackish cover
asciilifeform: problem is that a language with nonhardrealtime gc is unsuitable for cryptography.
asciilifeform: 'It is the most advanced and secure instant messaging protocol to date. This is why the designers got an award in front of a conference full of seasoned cryptographers and security engineers a week back for improving Real World Cryptography. ' << from turd in earlier thread. that thing is ~bottomless lulzmine. ☟︎
asciilifeform: instead, d00d is (and only one currently living, afaik) actual cryptographer in... cryptography
asciilifeform: http://www.metzdowd.com/pipermail/cryptography/2009-January/014994.html << exe evaporated, naturally
asciilifeform: in other veryolds, 'It is now common knowledge among computer scientists that NP-completeness is largely irrelevant to public-key cryptography...' -- ( (very sadly) Papadimitriou . 'NP-completeness: A Retrospective', 1995. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.32.8685&rep=rep1&type=pdf )
asciilifeform: much of academitard 'cryptography' is an elaborate dance around the fact that nobody knows, publicly, of any solid axioms that were unknown to von neumann. ☟︎
asciilifeform: in very other lulz, http://www.metzdowd.com/pipermail/cryptography/2017-February/031615.html ( https://archive.is/jLUGT ) << 'Bruce Schneier has recently published an impassioned plea for a United States Federal Internet Security Agency, which would likely gain control of civilian cryptography, among many other munitions.'
asciilifeform: '...the software, available for iOS and Android, basically uses the OpenPGP standard to perform public-private cryptography, uses AES for ephemeral per-message encryption, and exchanges public keys between users via TLS connections with certificate pinning.'
asciilifeform: '“The behavior described in your article is not a backdoor in WhatsApp. This is the overwhelming consensus of the cryptography and security community. It is also the collective opinion of the cryptography professionals whose names appear below. The behavior you highlight is a measured tradeoff that poses a remote threat in return for real benefits that help keep users secure…” the letter
asciilifeform: ben_vulpes: it was 'cryptography engineering'
asciilifeform: how is a 'shitsign key' a 'use of cryptography' ?
asciilifeform: graphic systems for government agencies. In the NIST "Report on Pairing-based Cryptography" issued in February 2015, they state....' --- snore
asciilifeform: for BingoBoingo ( or whoever put it there ) >> https://www.reddit.com/r/cryptography/comments/55077h/how_to_make_your_own_lamport_parachute_from/d86tmfi
asciilifeform: there is a fundamental (and solidly boecktronically-supported and propagated) misconception about what cryptography even IS
asciilifeform: witness the stillbirth of cryptography as a scientific discipline.
asciilifeform: 'Data coming from true random number generators is never 100% random. I am aware of no exceptions. Whitening is required in all cases before the data is suitable for use in cryptography.' << from first link ☟︎
asciilifeform: cryptography is a 'meat market' where, after sobering up, one notices that 100% of the 'girls' are actually pigs.
asciilifeform: 'Despite a great deal of mathematical work in this field, there is still no general theory of cryptography, Blaze posited. He called this “one of the dirty secrets of cryptography.”'
asciilifeform: 'Silent Circle already lost some of its key personnel in recent months. Cryptography luminary and co-founder Jon Callas departed for Apple in May and in June, CEO and President Bill Conner resigned, with Neiderman stepping in as interim chief. Co-founder Phil Zimmerman, best-known as the creator of encrypted messaging protocol PGP, remains on-board, living in the firm’s adopted home town of Geneva.'
asciilifeform: essentially the Big Dirty Secret re crypto is that NO ONE HAS YET proven that non-otp cryptography ~actually exists~
asciilifeform: 'We are building an anonymous, taxable payment system using modern cryptography. Customers will use traditional money transfers to send money to a digital Exchange and in return receive (anonymized) digital cash. Customers can use this digital cash to anonymously pay Merchants. Merchants can redeem the digital cash for traditional money at the digital Exchange. As Merchants are not anonymous, they can be taxed, enabling income or sal ☟︎
asciilifeform: 'The first time the NSA publicly and decisively gave support to ECC occurred at a meeting of the American National Standards Institute (ANSI) in December 1995. The backers of RSA at the meeting were casting doubt on the safety of ECC-based protocols; in the mid-1990s a page called “ECC Central” on the RSA website carried statements by leading personalities in cryptography that characterized ECC
asciilifeform: incidentally if mircea_popescu really needed to solve this 'problem', he easily could, in cryptography world this is known as 'otr protocol', you encipher to a public key generated for the occasion, and the private key for it is later thrown to the wind for hypothetically anyone to know
asciilifeform: http://www.metzdowd.com/pipermail/cryptography/2016-March/028824.html << lulz
asciilifeform: lavalulz: http://www.metzdowd.com/pipermail/cryptography/2016-March/028669.html
asciilifeform: 'But where has all this been exposed as "unfulfilled assumptions" by the academic examination of cryptography? Where is their "proof" now?' >> http://www.loper-os.org/?p=1390&cpage=1#comment-8475 etc
ascii_butugychag: scheme may be deployed.) Are most (but not all!) results in cryptography conditional? Yes, but
ascii_butugychag: proofs in modern cryptography are as meaningful as proofs in any other area of mathematics. Can
ascii_butugychag: http://www.metzdowd.com/pipermail/cryptography/2014-January/019426.html << motherfucking fud
ascii_butugychag: http://www.lshift.net/blog/2013/10/01/why-i-support-the-us-government-making-a-cryptography-standard-weaker << vintage lulz
ascii_butugychag: 'Filippo Valsorda. I'm Italian and I work on the CloudFlare Security Team in London. I built the public Heartbleed test and I mess with cryptography. Public speaker. Motorbike rider. Frequent flyer. Hacker School F'13.' ☟︎
asciilifeform looks at shelf, misreads 'applied cryptography' as 'applied coprophagy'
asciilifeform: 'Vuvuzela uses efficient cryptography (NaCl) to hide as much metadata as possible and adds noise to metadata that can't be encrypted efficiently. This approach provides less privacy than encrypting all of the metadata, but it enables Vuvuzela to support millions of users. '
asciilifeform: 'Expertise in any combination of the following cryptographic primitives is desired: private information retrieval, fully homomorphic encryption, pairing- or lattice-based cryptography, multi-party computation, and distributed key management architectures.' -- from a nazi help-wanted ad
asciilifeform: https://rjlipton.wordpress.com/2015/08/14/cryptography-and-quicksand << lulzies
ascii_field: (see also, for similar lulz, 'whitebox cryptography') ☟︎
asciilifeform: in the 'real world', 'your cryptography fails' sometimes leads to fat bribes in the form of business-as-usual from usg masters.
ascii_field: 'Fwd: [Cryptography] Did Intel just execute its warrant canary ?'
asciilifeform: crc's 'handbook of applied cryptography'
asciilifeform: 'applied cryptography' 2nd ed.
asciilifeform: 'Dan Boneh is professor of Computer Science and Electrical Engineering at Stanford University, and leads the applied cryptography group there. He has written extensively on cryptography and computer security, publishing more than 150 refereed conference and peer-reviewed journal papers. Boneh served as an editor of ACM Transactions on Internet Technology (TOIT), Journal of the ACM (JACM), and Journal of Cryptology. He has serv
asciilifeform: 'Boneh, in joint work with Matt Franklin, constructed a novel pairing-based method for identity-based encryption (IBE), whereby a user's public identity, such as an email address, can function as the user's public key. Since then, Boneh's contributions, together with those of others, have shown the power and versatility of pairings, which are now used as a mainstream tool in cryptography. The transfer of pairings from theory t ☟︎☟︎☟︎
asciilifeform: http://www.metzdowd.com/pipermail/cryptography/2013-November/018670.html << somehow missed this
asciilifeform: mircea_popescu: interestingly, cryptography does not work this way. you can walk around for years as a zombie, while not knowing that you're really blown your brains out years ago and ought to rest in the grave.
asciilifeform: mircea_popescu: in cryptography, every constant's a salt. you're well advised to change ALL constants << and turn wrong knob, die by pollard rho or similar.
asciilifeform: this is not a shortcoming of cryptography.
asciilifeform: bats_cd03: the subject has very little to do with cryptography in the usual sense. it touches on what can only be described as a philosophical confusion (a deliberately-propagated one, at that.)
asciilifeform: and quite another for cryptography
asciilifeform: Cryptography master McGee / said, 'no use I've for this RNG, / I can eat bags of bits, / mix 'em up when I shits, / I know they'll emerge pattern-free.'
asciilifeform: decimation: knuth was, in fact, wrong. there are inadequacies in a pseudorandom sequence of whatever variety that do not concern cryptography at all. see, for example, this - http://log.bitcoin-assets.com/?date=22-03-2014#574674 ☝︎
asciilifeform: dignork: whenever you see a field where it seems as if 'cryptography never happened' - answer is always a misallocation of 'skin in game'
asciilifeform: but rpi is still unsuitable for cryptography
asciilifeform: artifexd: see if you can learn why the raspi rng is unsuitable for cryptography.
asciilifeform: note that this anecdote had nothing to do with cryptography.
asciilifeform: benkay: remember that steganography, unlike cryptography, cannot be simultaneously strong and standardized. ☟︎
asciilifeform: unrelated: neat find, from today's trip to library, for all crypto aficionados: 'Post-Quantum Cryptography.' Bernstein, Buchmann & Dahmen. (2009)
asciilifeform: francis_wolke: if you ruled over a 'center of cryptography and mathematics,' would you wish this to be known to your enemies?
asciilifeform: the original turd: http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/
asciilifeform: http://en.wikipedia.org/wiki/Talk:NSA_Suite_A_Cryptography