Archive for the ‘interests’ Category

E-mail address encryption

Saturday, March 19th, 2005

Ok, this is kind of neat: a program that takes your e-mail address, encrypts it using 10-bit RSA, then generates a JavaScript program to decrypt it and generate a mailto: link in a web page. Why do such a thing? Because if you post an e-mail address as plaintext on a web page (like, say, that link to spool@kenytt.net over on the left), it’ll be a matter of minutes before some lowlife scrapes it and spams you.

So I was setting up an autoresponder for homework assignments, and figured I’d give it a shot.

New NSA Security Standard

Monday, March 7th, 2005

The National Security Agency has released a new, recommended set of cryptographic standards for securing sensitive and unclassified data. The standard, called “Suite B,” specifies Elliptic-Curve algorithms for public-key cryptography along with the existing AES and SHA standards for symmetric cryptography and hashing.

Paranoia

Sunday, March 6th, 2005

If you’re not at least a little paranoid by the time you finish this class, then I haven’t been doing my job: from our friends at CAIDA comes “Remote physical device fingerprinting.”

Every computer clock has a bit of skew caused by tiny differences in the hardware. This causes the clock to be slightly different from every other clock, and it could be used to uniquely indentify your computer. It turns out that you can measure this skew from almost anywhere on the Internet, even from behind a firewall. Which means that, potentially, your computer can be tracked even if connects to the Internet through different networks…

Paranoid yet?

An Illustrated Guide to Cryptographic Hashes

Wednesday, February 23rd, 2005

I’ve added a link to Steve Friedl’s An Illustrated Guide to Cryptographic Hashes to the course outline. I’ll say about this page what I said about the Kerberos paper: if you have trouble following the book, see if this helps.

Cracking DES

Wednesday, February 23rd, 2005

For the full story on DES, see Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design.

Big Crypto News

Wednesday, February 16th, 2005

From Bruce Schneier’s weblog: SHA-1 has been broken. Two weeks from now we’ll be talking about hash functions. By that time it may be confirmed, and we’ll talk about the implications.

Linear and Differential Cryptanalysis Tutorial

Wednesday, February 9th, 2005

On Thursday, we’ll be talking about cryptanalysis. I’ll give you an overview of the linear and differential techniques, but if you want to know more, check out A Tutorial on Linear and Differential Cryptanalysis by Howard M. Keys.

Handbook of Applied Cryptography

Sunday, February 6th, 2005

Another reference book available free on the Internet is the Handbook of Applied Cryptography from CRC Press.

Army Cryptanalysis Field Manual

Sunday, February 6th, 2005

This is interesting… a copy of a US Army Field Manual for Cryptanalysis. (via Slashdot)

Cream for Vim

Saturday, June 21st, 2003

Cream is a plugin/configuration thingy for Vim that vastly improves its functionality. Better menus, color themes, a better status bar, show/hide invisible characters, word-wrap (yay, no more !!fmt), a file browser, a spell checker, and more.

By default, Cream even does away with the much-maligned modal interface:to insert text, just start typing. I assume this is good for Windows and Mac weenies who can’t handle the usual vi command set. (Tip for UNIX users: “Cream Lite” mode reverts to the normal vi command set while keeping the neat extras.)