![]() |
![]() |
#1 |
Dec 2012
The Netherlands
2×7×131 Posts |
![]()
If you would like to inform the US federal government on cybersecurity issues - you have 3 days to do it!
https://www.federalregister.gov/arti...igital-economy |
![]() |
![]() |
![]() |
#2 |
Aug 2002
22·2,161 Posts |
![]() |
![]() |
![]() |
![]() |
#3 |
Bamboozled!
"๐บ๐๐ท๐ท๐ญ"
May 2003
Down not across
101101111110112 Posts |
![]() |
![]() |
![]() |
![]() |
#4 |
Oct 2015
1068 Posts |
![]() |
![]() |
![]() |
![]() |
#5 | ||
Basketry That Evening!
"Bunslow the Bold"
Jun 2011
40<A<43 -89<O<-88
3×29×83 Posts |
![]() Quote:
Quote:
Last fiddled with by Dubslow on 2016-10-10 at 08:20 |
||
![]() |
![]() |
![]() |
#6 |
Sep 2009
99616 Posts |
![]()
The obvious counter is to use a well chosen 2048 bit prime, which is well out of range of GNFS.
Possibly better is to use a 3072 bit prime such as prevprime(2^3072) which can be attacked with SNFS, but that's about as hard as GNFS-2048 so still impossible. That should be safe until quantum computers are available. Chris |
![]() |
![]() |
![]() |
#7 | |
Bamboozled!
"๐บ๐๐ท๐ท๐ญ"
May 2003
Down not across
79·149 Posts |
![]() Quote:
People are lazy. They very often don't bother. If you look at the history of crypto you will find many, many examples of good crypto being circumvented in this manner. A classical example is the German Enigma which, properly used, would have been very difficult for Bletchley to have broken. Stereotypical plaintext was its downfall in the vast majority of cases. Some Enigma messages were broken only very recently; AFAIK some are still unbroken seventy years later. |
|
![]() |
![]() |
![]() |
#8 | |
∂2ω=0
Sep 2002
Repรบblica de California
101101111011002 Posts |
![]()
Flaw in Intel chips could make malware attacks more potent | Ars Technica
Quote:
|
|
![]() |
![]() |
![]() |
#9 |
Just call me Henry
"David"
Sep 2007
Liverpool (GMT/BST)
22·3·7·73 Posts |
![]()
http://www.wired.co.uk/article/googl...nce-encryption
Deep learning can also encrypt now. I wonder how hard it would be to replicate this in code. |
![]() |
![]() |
![]() |
#10 |
∂2ω=0
Sep 2002
Repรบblica de California
22×2,939 Posts |
![]()
Ars Technica: A rash of invisible, fileless malware is infecting banks around the globe : Once the province of nation-sponsored hackers, in-memory malware goes mainstream.
Spawn of Stuxnet, with a generous assist from the folks in Redmond, WA ... As always, blowback's a bitch, innit? Last fiddled with by ewmayer on 2017-02-10 at 02:59 |
![]() |
![]() |
![]() |
#11 | |
∂2ω=0
Sep 2002
Repรบblica de California
22·2,939 Posts |
![]()
SHA-1 is officially unsafe - collaboration here was with CWI:
Google Online Security Blog: Announcing the first SHA1 collision Quote:
o And in other news, a major browser/website-security hole has been reported w.r.to sites which use CloudFlare, which are alas legion. [Note my initial post incorrectly stated the Cloudflare issue was related to the SHA1 collision one.] Last fiddled with by ewmayer on 2017-02-24 at 02:26 |
|
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
ElGamal crypto without prime | ElChapo | Math | 9 | 2017-06-10 03:26 |
SHA-1 Crypto Hash weakened | plandon | Lounge | 0 | 2009-06-16 13:55 |
The news giveth, the news taketh away... | NBtarheel_33 | Hardware | 17 | 2009-05-04 15:52 |
Crypto 2007 | R.D. Silverman | Lounge | 2 | 2007-08-08 20:24 |
crypto game | MrHappy | Lounge | 0 | 2005-01-19 16:27 |