t 5:01 PM Sriram R via Cryptography-dev
> wrote:
> >
> > Hello,
> >
> > I'm generating a key using Scrypt from a password supplied by the user.
> I then use this key as follows. This works but my question to the experts:
> is this an acceptable way to
rypted when storing or
> is it not sensitive information?
> >
> >
> > On Sat, Jan 11, 2025, 6:22 AM Alex Gaynor wrote:
> >>
> >> In general, using the output of a KDF as the key for symmetric
> >> encryption is fine.
> >>
> >
Hello,
I'm generating a key using Scrypt from a password supplied by the user. I
then use this key as follows. This works but my question to the experts: is
this an acceptable way to use the AESGCMSIV cipher? Am I doing something
that's fundamentally against best practices? In the examples on the
t; has happened on it. If you're interested in contributing, we're happy
>> to review a PR.
>>
>> Alex
>>
>> On Sun, Jan 12, 2025 at 12:02 PM Sriram R via Cryptography-dev
>> wrote:
>> >
>> > Robert,
>> >
>> > Appreciate t
ve had the privilege of following along with Team Keccak on the
> development of what is now SHA3 and its derivatives. We are finally seeing
> an uptick in replacing HMAC/HKDF with KMAC.
>
> On 1/10/25 17:00, Sriram R via Cryptography-dev wrote:
>
> Hello,
>
> I'm generat
tps://github.com/pyca/cryptography/issues/12141. Thus far no work
> has happened on it. If you're interested in contributing, we're happy
> to review a PR.
>
> Alex
>
> On Sun, Jan 12, 2025 at 12:02 PM Sriram R via Cryptography-dev
> wrote:
> >
> > Robert,
> >
Hello,
I'm testing a softHSM2 setup with the following code on rhel 9.4 system
running in FIPS mode:
import pkcs11
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
lib = pkcs11.lib("/usr/local/lib/softhsm/libsof
Hello,
I'm reaching out to the cryptography experts for this issue.
Using Python 3.9 on a RHEL 9.4 platform with the cryptography module
installed on it.
The requirements are to encrypt some data using *class*
cryptography.hazmat.primitives.ciphers.aead.AESGCM(*key*)
I've written the encryption
e. You generally should not store the key
> with the ciphretext, as there's basically no threat model that makes
> sense under.
>
> Alex
>
> On Sat, Jan 4, 2025 at 12:28 PM Sriram R via Cryptography-dev
> wrote:
> >
> > Hello,
> >
> > I
gt; nfile = "/tmp/cstore/csrs/eud1.red.ftf.net.csr.nonce"
> >>> with open(nfile, 'rb') as f:
> >>>nonce = f.read()
> >>>decrypt(nonce, file, aesgcmsiv)
> >>>
> >>> if __name__ == "
10 matches
Mail list logo