kryptoslogic.blogspot.com
Kryptos Logic Research: Complexity is the bugdoor's friend
http://kryptoslogic.blogspot.com/2015/03/complexity-is-bugdoors-friend.html
Saturday, March 21, 2015. Complexity is the bugdoor's friend. Backdoors are a fashionable topic these days, ever since the BULLRUN program. Was uncovered by the Snowden leaks. Bruce Schneier and others recently wrote a survey on the topic, which covers much of what is known about backdoors, available here. You should also check the Underhanded Crypto Contest. Out, which has ended a couple of weeks ago. Backdoors come in all shapes and sizes: some can be mathematical in nature —. There is a now well-known.
adamcaudill.com
About – Adam Caudill
http://adamcaudill.com/about
Security Consultant, Researcher, and Software Developer. I’m Adam Caudill, a 34 year-old security consultant, a security researcher, a software developer, father, and atheist. I’m a lover of fine Japanese Katanas. A collector of bayonets. And something of a technical elitist. In my youth I spent much of my time on photography. Even working for a while as a photojournalist though my schedule leaves little time for this today. While I still love the art and science of photography, it’s a passion that I...
s.arciszewski.me
Scott Arciszewski - External Links
http://s.arciszewski.me/links
Software, Privacy, Security, Innovation. This page contains links to external websites that I either like or in some way contributed. I'll try to keep them into sensible categories but there will undoubtedly be some overlap in the future. If things aren't where you expect them to be, check a different category. VPN Provider architected to resist bureaucratic attacks and whose operators I respect. Opt out of PRISM, the NSA's global data surveillance program. Security Projects and Teams. I am a participant.
scott.arciszewski.me
Scott Arciszewski - External Links
http://scott.arciszewski.me/links
Software, Privacy, Security, Innovation. This page contains links to external websites that I either like or in some way contributed. I'll try to keep them into sensible categories but there will undoubtedly be some overlap in the future. If things aren't where you expect them to be, check a different category. VPN Provider architected to resist bureaucratic attacks and whose operators I respect. Opt out of PRISM, the NSA's global data surveillance program. Security Projects and Teams. I am a participant.
adamcaudill.com
On the Underhanded Crypto Contest – Adam Caudill
http://adamcaudill.com/2015/03/08/on-the-underhanded-crypto-contest
Security Consultant, Researcher, and Software Developer. On the Underhanded Crypto Contest. On August 15th of last year I asked if anybody would be interested in a contest for the best, most evil underhanded crypto techniques the response was clear, and less than a month later I announced the creation of the contest. Proudly announcing, the #UnderhandedCrypto. See here for details / rules: https:/ t.co/mNV0KCVdLu. Mdash; Adam Caudill (@adamcaudill) September 3, 2014. Before I go any further, the contest.
decal.sdf.org
data encryption @ decal's security shed
http://decal.sdf.org/crypt
List of encryption algorithms generated by: openssl ciphers -v ALL. Statement of Federal Service for Early Cryptanalysis. Password Interception in a SSL/TLS Channel. Brice Canvel, Alain Hiltgen, Serge Vaudenay, Martin Vuagnoux. Advances in Cryptology - CRYPT'03, Lecture Notes in Computer Science, No.2729, pp. 583-599, Springer-Verlag, 2003. Subtly malicious crypto code contest. Ccsinjection.lepidum.co.jp. SSL and TLS Deployment Best Practices. TLS Attacks via :. Outline of cryptography @. Multidigit Mult...
bqp.io
BQP - My Life and Projects, Right Now
https://bqp.io/my-life-and-projects-right-now.html
My Life and Projects, Right Now. It's often difficult for me to say "no" to taking on new projects. Some ideas are so captivating that they beg to be implemented. The problem is, if you are eager to say "yes" to every interesting project that crosses your path, they'll quickly fill up your life to the exclusion of important things like spending time with family and friends. It has bindings for PHP). I'm happy to announce that just today I signed the git tag for its version 2.0 release. I don't expect to ...
openwall.com
announce - [openwall-announce] GSoC students accepted
http://www.openwall.com/lists/announce/2015/04/28/1
Openwall GNU/*/Linux server OS. John the Ripper password cracker. Free and Open Source for any platform. Pro for Mac OS X. Wordlists for password cracking. Free and Open Source for Unix. Pro for Windows (Active Directory). Phpass password hashing in PHP. Crypt blowfish ditto in C/C. Tcb better password shadowing. Scanlogd port scan detector. Popa3d tiny POP3 daemon. Blists web interface to mailing lists. Msulogin single user mode login. Php mt seed mt rand() cracker. Source code repository (CVSweb).
kryptoslogic.blogspot.com
Kryptos Logic Research: March 2015
http://kryptoslogic.blogspot.com/2015_03_01_archive.html
Saturday, March 21, 2015. Complexity is the bugdoor's friend. Backdoors are a fashionable topic these days, ever since the BULLRUN program. Was uncovered by the Snowden leaks. Bruce Schneier and others recently wrote a survey on the topic, which covers much of what is known about backdoors, available here. You should also check the Underhanded Crypto Contest. Out, which has ended a couple of weeks ago. Backdoors come in all shapes and sizes: some can be mathematical in nature —. There is a now well-known.
SOCIAL ENGAGEMENT