A simple scheme of combining PRNGs The main idea of the scheme to be sketched below may be seen as essentially the same as that underlying two other recent threads of mine ("Dynamic Hillcipher" and "Foiling the known-plaintext attacks"), namely employing the principles of indirectness and indeterminancy (analogy for the latter: the one-equation-tw... 8 Jul 2010 06:57
A notation convenience for certain non-linear expressions The following is essentially commonplace and nothing special but o.k., as I was told by a couple of mathematicians. I am posting it nonetheless here, because I surmise it could eventually be of some use to somebodies. If f11(x) etc. are functions of x, one can namely e.g. use | f11 f12 | | x1 | ... 13 Jun 2010 02:55
cracking an old zip password Hi to all. Hope I've come to the right place. I've got an old zip file(> 10 years old , maybe even 15) that I can't remember the password for. I do have 2 of the files in an unencrypted form , so some sort of planetext attack is what I think I need to do. From what I've read on the net it's a pkzip V2.xx somethin... 2 Jun 2010 08:44
Steganography Freeware Available Now Steganography Freeware Available Now I promised it and now you can get it. Here is the first paragraph of the instructions: "Bitmap Steganography Utility Program - allows for the insertion of binary data into a standard 24-bit uncompressed bitmap image on a bit level such that it is not apparent nor detectab... 10 Jun 2010 12:16
now, you need to encrypt a test .pdf file, what better than the original RSA paper? http://people.csail.mit.edu/rivest/Rsapaper.pdf BE CAREFUL!!! Grant W Miller ... 30 May 2010 15:25
SHA-3 Ouch! On May 28, 12:10 pm, Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no> wrote: rossum <rossu...(a)coldmail.com> wrote: This could have quite an impact on the SHA-3 competition: (http://people.item.ntnu.no/~danilog/Hash/Non-random-behaviour-narrow-....) Why? -- Kristian Gjøsteen Perhaps it wo... 4 Jun 2010 00:31
SHA-3 Ouch! This could have quite an impact on the SHA-3 competition: (http://people.item.ntnu.no/~danilog/Hash/Non-random-behaviour-narrow-pipe-designs-03.pdf) Careful with the line wrapping. rossum ... 28 May 2010 15:58
Legal responsibility of WLAN insecurity If one doesn't secure his WLAN connection with an appropriate password, then he would be (to a certain extent) responsible for eventual abuses by others, according to a recent verdict of the German Bundesgerichtshof: http://juris.bundesgerichtshof.de/cgi-bin/rechtsprechung/document.py?Gericht=bgh&Art=pm&pm_numm... 10 Jun 2010 07:47
Major step ahead for cryptography What about this: http://www.eurekalert.org/pub_releases/2010-05/uob-msa052510.php ... 28 May 2010 05:00
Major step ahead for cryptography What about this: http://www.eurekalert.org/pub_releases/2010-05/uob-msa052510.php ... 27 May 2010 19:17 |