.
All of the goodies are at http://www.interhack.net/projects/deschall/.
Very cool, but the webserver seems to be down.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
Kryptoblog
of countermeasures
against access driven cache attacks on AES
http://eprint.iacr.org/2007/282.pdf
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
Kryptoblog - IT-säkerhet på svenska
http
situation to (2), how should the RFID unit avoid the
fixed bits when generating a key based on the random bits? Would it be
ok to simply run the power on memory state through a cryptographic hash
function, ignoring the fixed bits?
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i
functionality that checks the randomness of the
initial SRAM state after power on. But somehow I don't think a good test
suite and extremely low cost devices (for example RFID chips) are very
compatible concepts.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning
to use this
in a secure, practical and cost efficient way.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
Kryptoblog - IT-säkerhet på svenska
http://www.strombergson.com/kryptoblog
is the manufacturing process, electrical and
environmental changes (accidental or deliberately) will all affect the
RNG, and there is no easy way for the (low cost) device to know how good
or bad quality of the RNG is.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk
doing an efficient
implementation in HW of ECC and not stepping on Certicom patent toes. SW
implementations are probably ok though.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning
into
the virtualization domain. After all, replacing physical stuff with SW
is the whole point of virtualization.
Does anybody know what VMware, Parallels etc do to support entropy for
sources like this, or is it basically a forgotten/skipped/ignored feature?
--
Med vänlig hälsning, Yours
Joachim
for embedded
platforms was (somewhat) effected.
That is, secure implementations might have different requirements than
what mighty have been stated, and we want to select an algorithm based
on the requirements for a secure implementation, right?
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid
Aloha!
uIP [1] is a very compact TCP/IP stack for small, networked connected,
embedded devices. (The code size for uIP including TCP and ICMP on the
AVR processor is about 5 kBytes.)
Unfortunately, the TCP sequence number generator in uIP is a bit
simplistic - basically a monotonically
vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http
hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http
correctly EC as such is sound and provides clear
benefits compared to RSA. We just need curves that have completely
open, traceable and varifiable specifications.
- --
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning
entropy estimators by
getting rid of them.
[1] https://www.schneier.com/book-practical.html
- --
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
-BEGIN PGP SIGNATURE-
Version: GnuPG
to an end and I'm not certain the
report will be updated anymore. Would be a loss since having updated
estimates on keys and what algorithms to use is really helpful (IMHO).
- --
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning
15 matches
Mail list logo