Cryptography after alien landing

The author of the article: Bruce Schneier is an American cryptographer, writer and computer security specialist. He is the author of several books on security, cryptography and information security. The founder of the cryptographic company Counterpane Internet Security, Inc., a member of the Board of Directors of the International Association of Cryptological Research and a member of the advisory board of the Electronic Privacy Information Center.
 
 
Cryptography after alien landing Quantum computing is a new way of making calculations that will allow humanity to perform calculations simply impossible with the use of modern computers. The ...
+ 0 -

Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock

Cryptography, cipher machines, agencies, espionage things and yet behind it all stood and are ordinary, but unusual people. Who they are and how their fate has developed, why and for what purpose did they devote their lives to the difficult business of "cryptography".
 
 

Mavis Batey is a fearless burglar of the code


 
Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock  
The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? (options are available with RAID1 and RAID1? up to 24 cores and up to 40GB DDR4).
 
 
VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps ...[/h]
+ 0 -

We increase the randomness of that, and so[наверно] [почти]randomly

We increase the randomness of that, and so[наверно] [почти]randomly  
random numbers are more tasty if they are slightly peppered
 
 
We will combine theory with practice-we will show that an improvement in the entropy of random sequences is possible, after which we look at the source codes that do this.
 
 
I really wanted to write about the fact that qualitative, that is, highly entropic, generation of random numbers is critically important in solving a huge number of problems, but this is probably superfluous. I hope everyone knows this.
 
 
In the pursuit of qualitative random numbers, people invent very ingenious adaptations (see, eg, ...
+ 0 -

CryptoPro connection in Mono

In connection with the transition to Linux, it became necessary to transfer one of our server systems written in C # to Mono. The system works with reinforced EDS, therefore one of the tasks set before us was to test the performance of GOST certificates from CryptoPro in mono. CryptoPro itself has already implemented for a long time. CSP under Linux, but the first attempt to use it showed that the native Mono cryptography classes (similar to those in the base .Net - X509Store, X509Certificate? etc.) not only do not work with GOST keys, they do not even see them in their repositories. Because ...
+ 0 -

We do web-authentication through the block

We do web-authentication through the block
 
Recently I participated in the Ethereum-hakaton, and today I want to talk about the EtherAuth project, with which the MixBytes team took the third place. EtherAuth is an attempt to make a decentralized version of the login to the site using an external account. How to button enter through Facebook, only without Facebook.
The source code is
  Recently I participated in the Ethereum-hakaton, and today I want to talk about the EtherAuth project, with which the MixBytes team took the third place. EtherAuth is an attempt to make a decentralized version of the login to the site using an external account. How to button enter through Facebook, only without Facebook. The source code is  ...
+ 0 -

Hide without hiding. Once again about LSB-steganography, chi-square and singularities?

Today, again, we'll rotate the old nest and talk about how to hide a pile of bits in the picture with the seal, look at several available tools and analyze the most popular attacks. And it would seem, what has the singularity to do with it?
 
 
As the saying goes, if you want to figure something out, then write about this article on the Khabr! (Beware, a lot of text and pictures)
 
 
Hide without hiding. Once again about LSB-steganography, chi-square and singularities?  
here.
 
 

From the command line


 
There are not many open-access command line tools that represent LSB steganography.
 
 
The most popular can be found in the table below.
 
 
 
 
Tool
 
Types of files
 
Description
 
Concealment
 
Extract
 
 
 
open...[/h]
+ 0 -

Confidential transactions in Monero, or how to translate it is unknown what is unknown where

We continue our cycle on the Monero blockbuster, and today's article will be devoted to the RingCT (Ring Confidential Transactions) protocol, which presents confidential transactions and new ring signatures. Unfortunately, there is little information on the Internet about how it works, and we tried to fill this gap.
 
 
Confidential transactions in Monero, or how to translate it is unknown what is unknown where
 
 
We'll talk about how the network hides the transfer amounts using this protocol, why they abandoned the classic ringtones for cryptonote and how this technology will evolve further.
 
 
Since this protocol is one of the most complex technologies in Monero, the reader will need basic knowledge ...
+ 0 -

Spy tricks: to remain in secret

About cryptosystems and machines was mentioned more than once in previous articles. But how to ensure the safe transfer of keys and codes, without which the work of secret services and spies would be equal to "0". There is an International Spy Museum, the exhibits of which are thousands of all sorts of spyware and accessories, often these are ordinary everyday items. Earlier, one of the resources published the top-10 of the most famous and unknown spy things of this museum. Among them (sorry, but not always items of use):
 
 
Spy tricks: to remain in secret ...
+ 0 -

What is written in the .ssh /known_hosts file

What is written in the .ssh /known_hosts file
 
Every time we connect via ssh to the server, the ssh client checks if the public key for this server matches the one that was last time (at least so does the ssh standard). In OpenSSH, a list of known server keys is stored in the known_hosts file. Under the cut, briefly about what and how exactly it is stored there.
 
download the driver for Ubunt there may be 2 more fields, also separated by spaces:
 
 
at the beginning of the line there may be a note "@ cert-authority" or "@revoked", meaning, respectively, that this line contains the public key of the CA or that this key was withdrawn and can ...
+ 0 -

Investigation of the statistical probability of the bit value in the nonce bitcoin

Investigation of the statistical probability of the bit value in the nonce bitcoin  
 
It is believed that the function sha256 (sha256 (BlockHeader)), which is used in the bitcoin hash algorithm is very reliable. It is so reliable that there is only one way to select a golden nonse for the next block in the blockroom - by searching through the process of mining.
 
 
At present, there are more than 53?000 blocks in the bitcoin blockade. This is enough to conduct a statistical analysis and answer the question: "Are the values ​​of the bits in the previously found nones equally likely?".
 
such project .
 
This ...
+ 0 -