Shaare your links...
2353 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 2 / 6
Newer►
113 results for tags cryptography x
  • Encrypting sensitive and personal data
    Available for Linux, OS X and Windows. More details can be found on https://www.primx.eu/en/encryption-software/zed-en/
    ALGORITHMS: AES (128 to 256 bits) and RSA (1024 to 4096 bits).
    TECHNOLOGIES: PKCS#1, PKCS#5, PKCS#11, X509, Microsoft CSP, LDAP technologies, PKIx compatible.
     PKCS#1 RSA Cryptography Standard https://en.wikipedia.org/wiki/PKCS_1
     PKCS#5 Password-based Encryption Standard https://en.wikipedia.org/wiki/PBKDF2
     PKCS#11 Cryptographic Token Interface https://en.wikipedia.org/wiki/PKCS_11
     X509 https://en.wikipedia.org/wiki/X.509 (ITU) standard defining the format of public key certificates.
     Does CSP stand for https://en.wikipedia.org/wiki/Credential_service_provider , Cloud service provide https://mymatetech.net/what-is-microsoft-csp-ab5b80519e79 or something else?
     LDAP https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
     Does PKIx stand for https://en.wikipedia.org/wiki/X.509#PKIX_Working_Group ?

    SYSTEMS: Available for Windows 11 to Windows 7, Linux (various distributions) and Mac OS.
    LANGUAGES: Available in 7 languages.
    ZED! mobile app for iOS and Android.
    Wed Apr 6 17:01:32 2022 - permalink -
    - https://www.zedencrypt.com/
    cryptography security TODO
  • Lightweight Cryptography | CSRC
    List of the ten Finalists of the lightweight crypto standardization process.
    Mon Mar 28 18:17:36 2022 - permalink -
    - https://csrc.nist.gov/Projects/lightweight-cryptography/finalists
    algorithm cryptography hardware software
  • GitHub - seemoo-lab/fido2ext: Bring Your Own FIDO2 Extensions!
    This repository documents how to implement custom FIDO2 extensions. It contains supplementary material to our paper at ETAA 2021. We describe how to implement extensions on all parts of the FIDO2 stack: On the relying party (website), on the client (browser), and on the authenticator (hardware token).

    Found via https://positive.security/blog/find-you and https://github.com/seemoo-lab/openhaystack
    Tue Mar 15 13:40:16 2022 - permalink -
    - https://github.com/seemoo-lab/fido2ext
    cryptography FIDO security software
  • Time-based One-time Password (TOTP) - MELPA
    Create TOTP using gnutls for crypto and auth source for secure storage of shared secret.
    Emacs 27.1 is required for bignum support.
    Found on Sacha Chua's blog https://sachachua.com/blog/2021/10/2021-10-18-emacs-news/
    Tue Oct 19 09:50:40 2021 - permalink -
    - https://melpa.org/#/totp
    cryptography emacs
  • A few comments on ‘age’ – Neil Madden
    Critical review of some of the design choices made in the cryptographic tool 'age'.
    There are other interesting articles, such as the three-part series
    https://neilmadden.blog/2018/11/14/public-key-authenticated-encryption-and-why-you-want-it-part-i/
    https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/
    https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/
    and
    https://neilmadden.blog/2016/09/13/critical-thinking-for-software-engineers
    Tue Oct 12 18:09:43 2021 - permalink -
    - https://neilmadden.blog/2019/12/30/a-few-comments-on-age/
    blog cryptography reading security TODO
  • Exploring age v 1.0 | Prevent Default
    Introduction to age, a “simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.”
    The source code can be found at https://github.com/FiloSottile/age and the german Wikipedia has an entry https://de.wikipedia.org/wiki/Actually_Good_Encryption
    Tue Oct 12 16:57:17 2021 - permalink -
    - https://sts10.github.io/2021/09/06/exploring-age-1-point-0.html
    cryptography Go Rust software
  • Serious Cryptography | No Starch Press
    Looks interesting. While not brand new (2017-11), it is more up-to-date than the HAC (5th printing 2001).
    Mon Oct 11 11:31:56 2021 - permalink -
    - https://nostarch.com/seriouscrypto
    book cryptography
  • SHA-1 is a Shambles
    Chosen-prefix collisions for SHA-1. Note that this can affect GPG 1.4.
    Found via https://fossil-scm.org/home/doc/trunk/www/fossil-v-git.wiki
    Mon Sep 13 11:47:05 2021 - permalink -
    - https://sha-mbles.github.io/
    cryptography gpg security SHA
  • saltpack - a modern crypto messaging format
    Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate. We've made few crypto decisions and instead leave almost all of the heavy lifting to the NaCl library.

    saltpack is a binary message format, encoded using the MessagePack format. Messages are broken up into reasonable (1MB) chunks, over which regular NaCl operations are performed. We have taken pains to address many of the shortcomings of current message formats: (1) only authenticated data is output; (2) repudiable authentication is used wherever possible; (3) chunks cannot be reordered or combined with other transmissions; (4) the public keys of senders and recipients can be hidden; and (5) message truncation is detectable.

    Implementations in Go and Python are available at https://saltpack.org/implementations  The format is used by https://keybase.io/
    Tue Jun 1 22:14:50 2021 - permalink -
    - https://saltpack.org/
    BSD cryptography FOSS security software tool
  • Monocypher is an easy to use crypto library.
    Small. Sloccount counts under 2000 lines of code, small enough to allow audits. The binaries can be under 50KB, small enough for many embedded targets.
    Easy to deploy. Just add monocypher.c and monocypher.h to your project. They compile as C99 or C++ and are dedicated to the public domain (CC0-1.0, alternatively 2-clause BSD).
    Portable. There are no dependencies, not even on libc.
    Honest. The API is small, consistent, and cannot fail on correct input.
    Direct. The abstractions are minimal. A developer with experience in applied cryptography can be productive in minutes.
    Fast. The primitives are fast to begin with, and performance wasn't needlessly sacrificed. Monocypher holds up pretty well against Libsodium, despite being closer in size to TweetNaCl. (More detailed benchmark)
    Mon Apr 19 09:54:52 2021 - permalink -
    - https://monocypher.org/
    C cryptography FOSS software
  • AEZ is an authenticated-encryption (AE) scheme optimized for ease of correct use (“AE made EZ”).
    Found on https://www.metzdowd.com/pipermail/cryptography/2021-April/036859.html
    "The really important thing is the theory paper, https://www.cs.ucdavis.edu/~rogaway/aez/rae.pdf, which is brilliant and anyone who wants to look at block cipher theory should read and understand it."
    Tue Apr 13 13:28:03 2021 - permalink -
    - https://www.cs.ucdavis.edu/~rogaway/aez/index.html
    cryptography reading TODO
  • cppcryptfs is an encrypted overlay filesystem
    cppcryptfs is based on the design of gocryptfs, an encrypted overlay filesystem written in Go.

    cppcryptfs is an implementation of the gocryptfs filesystem in C++ for Windows. cppcryptfs is compatible with gocryptfs. Filesystems created with one can generally be mounted (and synced) with the other.

    Found on https://infosec-handbook.eu/recommendations/ via https://nuetzlich.net/gocryptfs/
    Fri Feb 12 00:12:57 2021 - permalink -
    - https://github.com/bailey27/cppcryptfs
    cryptography security Windows
  • Aaron Toponce
    Blog about cryptography, hash functions and more
    Fri Dec 18 23:02:20 2020 - permalink -
    - https://pthree.org/
    blog cryptography hash Linux number random security
  • Intel(R) Intelligent Storage Acceleration Library
    ISA-L is a collection of optimized low-level functions targeting storage applications. ISA-L includes:
       Erasure codes - Fast block Reed-Solomon type erasure codes for any encode/decode matrix in GF(2^8).
       CRC - Fast implementations of cyclic redundancy check. Six different polynomials supported.
           iscsi32, ieee32, t10dif, ecma64, iso64, jones64.
       Raid - calculate and operate on XOR and P+Q parity found in common RAID implementations.
       Compression - Fast deflate-compatible data compression.
       De-compression - Fast inflate-compatible data compression.
    BSD 3-Clause "New" or "Revised" License.
    According to https://github.com/catid/cm256, ISA-L uses a O(N^3) Gaussian elimination solver for decoding. The CM256 decoder solves the linear system using a fast O(N^2) LDU-decomposition algorithm from "Pivoting and Backward Stability of Fast Algorithms for Solving Cauchy Linear Equations" (T. Boros, T. Kailath, V. Olshevsky), which was hand-optimized for memory accesses.
    See also https://github.com/catid/leopard for a fast O(N log(N)) RS erasure decoder.
    Mon Jun 15 15:26:37 2020 - permalink -
    - https://github.com/intel/isa-l
    BSD coding compression correction CRC cryptography error FOSS
  • .@ Tony Finch's homepage
    Interesting software, such as
    unifdef selectively removes C preprocessor conditionals. My version of this program now shipped by all the BSDs (including Mac OS X) and is used by the Linux kernel build system.
    regpg safely stores server secrets using gpg, so you can keep them in version control.
    picoro - tiny coroutine implementations in pure C. I wrote an accompanying article, coroutines in 20 lines of standard C.
    Counting the days - tiny routines for converting Gregorian dates into linear counts, like Julian day numbers or Unix time_t. The date of the count - a small routine for converting linear day counts into Gregorian dates.
    https://dotat.at/@/2016-04-22-synergy-vs-xmodmap-fight.html Why you can't use xmodmap to change how Synergy handles modifier keys
    https://dotat.at/@/2023-05-26-whence-time.html Where does my computer get the time from?
    https://dotat.at/@/2023-08-04-unix69.html a neat keyboard map
    https://dotat.at/@/2024-01-29-four-point-egg.html construct an egg shape with straightedge and compass
    His log of links, https://dotat.at/:/ which I found on the TUHS mailing list is also worth reading. He explains a bit about this log on http://dotat.at/.
    Mon Jun 8 22:31:25 2020 - permalink -
    - http://dotat.at/
    blog C compiler cryptography Go hardware key-binding keyboard lisp mathematics software software time TUHS X11
  • Magic-Wormhole: Get Things From One Computer To Another, Safely — Magic-Wormhole 0.12.0+3.g95a628e.dirty documentation
    This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical “wormhole codes”: in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.

    The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.
    Wed May 27 18:43:39 2020 - permalink -
    - https://magic-wormhole.readthedocs.io/en/latest/
    cryptography Python security software tool
  • The first open-source FIDO2 security key
    Open-source hard- and software for two-factor authentication.
    I need to test them and want to understand the differences between versions 1 and 2. The articles
    https://solokeys.com/blogs/news/trussed-announcement and
    https://github.com/trussed-dev/trussed-totp-pc-tutorial look interesting.
    Sun May 24 23:29:20 2020 - permalink -
    - https://solokeys.com/
    cryptography FIDO FOSS hardware security software TODO
  • A New Eval Server For Emacs – Random Thoughts
    Code is at
    https://github.com/larsmagne/eval-server.el
    Fri May 8 15:18:48 2020 - permalink -
    - https://lars.ingebrigtsen.no/2019/02/19/a-new-eval-server-for-emacs/
    cryptography emacs FOSS
  • Things that use Ed25519
    Here's a list of protocols and software that use or support the superfast, super secure Ed25519 public-key signature system from Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang.
    Fri Nov 29 15:16:41 2019 - permalink -
    - https://ianix.com/pub/ed25519-deployment.html
    Bernstein cryptography software
  • Open Source Password Management Solutions | Bitwarden
    Yet another password manager.
    Fri Nov 29 15:14:09 2019 - permalink -
    - https://bitwarden.com/
    cryptography FOSS security software
Links per page: 20 50 100
◄Older
page 2 / 6
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.