Tag Archives: encryption

International Digital Encryption Algorithm implementation.

The IDEA cipher was subject to an attack more efficient than brute force, in 2012. Despite this, competent researchers still agree that the attack is not yet computationally feasible. If you’re a little nervous, here’s a way to harden your … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

How secure is an encryption algorithm?

Triple DES was an early success story in American encryption. It is now (somewhat infamously,) broken. It is has been reported that skilled cryptanalysts broke 3DES, on a purpose built machine, in 6 hrs. What should that mean to the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Two kinds of encrypted containers – accumulating without a password.

I wrote before that a mounted Truecrypt container is analogous to an un-encrypted file or drive. This is mirrored by other encryption schemes, and one safeguard against the implied problem is to keep an encrypted zip type file, that enciphers … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

A suggested Diffie-Hellman key exchange design protocol

Despite the fact that it passes 3 times “in the clear,” the Diffie-Hellman key exchange is mathematically impossible to reverse engineer. Nevertheless, it becomes necessary to force any possible table look-up to become excessively unwieldy, before the key exchange is … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Possible Uses for Mathematical Secret Sharing

Secret Sharing is difficult mathematically, but has been accomplished “recently,” as such developments go. It is analogous to developing a Cartesian equation of an order of the number of participants, plus one, and then choosing such points on the line, … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Exponentiation with modulo arithmetic

To raise base “base number” to the power of “exponent” modulo “modulus,” (Pseudocode) input to routine: base number exponent modulus Set result = 1 loop from 1 to exponent iterations result = result * base mod modulus Return result Iterate … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Trojans can scoop directory structures maliciously

A mounted Truecrypt container is analogous to an unencrypted file. Truecrypt provides to mount files and volumes on arbitrary drive letters. Windows uses alphabet letters; Unix uses numeric digits as names. In response to this, a diligent A.P.T. reads the … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment