Channel: LibreCryptography
DigiCert Certificate Tools = https://docs.digicert.com/certificate-tools/
ECNR (elliptic curve variant) = https://ieeexplore.ieee.org/document/4418260
ieeexplore.ieee.org
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash - IEEE Conference…
IEEE Xplore, delivering full text access to the world's highest quality technical literature in engineering and technology. | IEEE Xplore
End to End by Google (some encryption stuff) = https://github.com/google/end-to-end
GitHub
GitHub - google/end-to-end: End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing…
End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP) - google/end-to-end
Phenomenal post by this individual regarding potential vulnerabilities in attempting to leverage ed25519 for HD keys (not as straightforwarfd as one would imagine that it is)
https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44
https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44
Key recovery attack on BIP32-Ed25519 (they deserve their fucking credit for this ; just failing to understand why they're so daft in so many other areas of blockchain...just doesn't even make sense really)
https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44
https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44
libp2p TLS = https://github.com/libp2p/go-libp2p-tls (this is the GitHub but there's no documentation that speaks on this as well ; fuck )
There's more information about TLS 1.3 for libp2p contained here = https://github.com/libp2p/specs/blob/master/tls/tls.md [had to find additional information]
Replacement / Currently used in lieu of the TLS that we were looking at above = https://github.com/libp2p/go-libp2p-secio (secio)
More specs on the protocol can be found here = https://github.com/libp2p/specs/blob/master/secio/README.md [SECIO allows participating peers to support a subset of algorithms]
There's more information about TLS 1.3 for libp2p contained here = https://github.com/libp2p/specs/blob/master/tls/tls.md [had to find additional information]
Replacement / Currently used in lieu of the TLS that we were looking at above = https://github.com/libp2p/go-libp2p-secio (secio)
More specs on the protocol can be found here = https://github.com/libp2p/specs/blob/master/secio/README.md [SECIO allows participating peers to support a subset of algorithms]
GitHub
GitHub - libp2p/go-libp2p-tls: go-libp2p's TLS encrypted transport
go-libp2p's TLS encrypted transport. Contribute to libp2p/go-libp2p-tls development by creating an account on GitHub.
Verifiable Secret Sharing (this is interesting ; another in-depth banger) = https://www.jcraige.com/vss-forgery
Dangers Of Determinism In Threshold Signatures = https://www.jcraige.com/dangers-of-determinism-in-threshold-signatures
In-depth Post That Explains Everything That One Needs to Know About ed25519 Down to the Nucleus (gets into clamping / subgroups / all of that) = https://www.jcraige.com/an-explainer-on-ed25519-clamping
Threshold BLS Signatures (feel like we haven't gotten into blind signatures a lot lately) = https://www.jcraige.com/threshold-bls-signatures
image_2021-01-25_23-07-28.png
405.9 KB
Cryptonite (Haskell Cryptography Library) = https://hackage.haskell.org/package/cryptonite
Great link for those looking to learn more about practical applications for Quantum Cryptography = https://wizardforcel.gitbooks.io/practical-cryptography-for-developers-book/content/quantum-safe-cryptography.html
wizardforcel.gitbooks.io
Quantum-Safe Cryptography · Practical Cryptography for Developers
Showing all of the algorithms that Cloudflare supports for DNSSEC (not ed448 ; few if any resolvers support ed448 - algorithm448 / naturally uses shake256 as well // the parameters of that curve seem to be problematic [also the strength of ed448 could pose an issue as well given U.S. export restrictions + that of other countries]
https://community.cloudflare.com/t/support-for-ed448-dnssec-signature-algorithm/71494
https://community.cloudflare.com/t/support-for-ed448-dnssec-signature-algorithm/71494
Cloudflare Community
Support for Ed448 DNSSEC signature algorithm
I ran a DNSSEC test here and found out the signature algorithm Ed448 is not supported yet (see RFC8080 and IANA algorithm 16). Will this be implemented?
Edwards' Curve Resources
There are plenty of resources out there for ed25519, but it seems that there are few resources dedicated to ed448, so this list will make a concerted
1. IETF Outline / Guidance for ed448 Deployment (as well as ed25519)
2. Async SSH (allows for ed448 to be used ; this is not enabled with OpenSSH to the best of my knowledge) = https://asyncssh.readthedocs.io/en/stable/#interactive-input
3. https://github.com/otrv4/otrv4/blob/master/otrv4.md
4. BIP 32 With ed25519 = https://cardano.org/assets/Ed25519_BIP.pdf
4a. BIP32 with ed25519 keys ; GUI interface included here = https://superdarkbit.github.io/nano-bip32-ed25519/ (should look closely at the spec to ensure that these keys are being generated in a secure manner here ; there is nuance in the generation hierarchical deterministic key wallets when using Edwards' curves vs. secg curves)
There are plenty of resources out there for ed25519, but it seems that there are few resources dedicated to ed448, so this list will make a concerted
1. IETF Outline / Guidance for ed448 Deployment (as well as ed25519)
2. Async SSH (allows for ed448 to be used ; this is not enabled with OpenSSH to the best of my knowledge) = https://asyncssh.readthedocs.io/en/stable/#interactive-input
3. https://github.com/otrv4/otrv4/blob/master/otrv4.md
4. BIP 32 With ed25519 = https://cardano.org/assets/Ed25519_BIP.pdf
4a. BIP32 with ed25519 keys ; GUI interface included here = https://superdarkbit.github.io/nano-bip32-ed25519/ (should look closely at the spec to ensure that these keys are being generated in a secure manner here ; there is nuance in the generation hierarchical deterministic key wallets when using Edwards' curves vs. secg curves)
GitHub
otrv4/otrv4.md at master · otrv4/otrv4
Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4 - otrv4/otrv4
image_2021-01-26_02-07-48.png
677 KB
Source = http://cryptowiki.net/index.php?title=The_Double_Ratchet_Algorithm
(Double Ratchet Encryption Algorithm) <—- this is what Signal uses (and why people claim that Signal is so super secure
Original technique borrowed from 'off the record' encryption (Moxie has stated as much)
(Double Ratchet Encryption Algorithm) <—- this is what Signal uses (and why people claim that Signal is so super secure
Original technique borrowed from 'off the record' encryption (Moxie has stated as much)
LibreCryptography
Blake3 Specs = https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf GitHub link is to the repo with Blake3.
Bao Function (part of Blake3); this allows you to take a 'slice' of a file that's already been encoded with Blake3 and determine whether the full file itself has been encoded with Blake3
Lurch - Brings OMEMO Encryption (double ratcheting) to libpurple
https://github.com/hardenedvault/lurch
https://github.com/hardenedvault/lurch
GitHub
GitHub - hardenedvault/lurch: XEP-0384: OMEMO Encryption for libpurple.
XEP-0384: OMEMO Encryption for libpurple. Contribute to hardenedvault/lurch development by creating an account on GitHub.
HTML Embed Code: