ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.8K
active users

#curve25519

0 posts0 participants0 posts today

Gibt es eine leicht erfassbare und verständliche Übersicht, welche Kryptoalgorithmen, Schlüssellängen, etc. nach dem #StandDerTechnik verwenden sollte? Ich stelle mir da eine Liste vor, die ich einem Admin in die Hand drücken kann und er macht nix falsch.

Das @bsi erstellt zwar (schwer verdauliche) Empfehlungen. Aber diese schwiegen sich aus zu üblichen Verfahren wie #Curve25519, die in RFCs beschrieben sind. Bei #telestrust gabs das mal - ist in neuen Versionen aber herausgefallen. Und die Zusammenstellung der #NIST verweist oft auf andere Dokumente.

@AG_KRITIS @kuketzblog

#InfoSec #Cryptographie #Kryptographie
#FollowerPower #PleaseBoost

@djb (Daniel J. Bernstein) tooted about a new blog post[1] he published. It's here:
blog.cr.yp.to/20250118-flight.

It's interesting. He's a #mathematician and software guy that in more recent years has been known mostly for his work in #cryptography, #theoretical and #practical. You're probably using his #Curve25519 every day in your #communications.

I'm not a mathematician (by a long shot), but it's written in a pretty accessible manner - it's not #formulae and #turgid academic #prose.

The central point he's getting at, by my possibly-mistaken understanding of it, is that current "common sense" about when attacks against pre-quantum cryptography like #RSA (and therefore when post-quantum cryptography becomes critical) are badly mistaken - based on bad assumptions about how attacks work, how they're implemented, and on badly #extrapolating from those bad assumptions using logic that doesn't actually represent the way attacks are developed and become practical.

TL;DR is something along the lines of "#quantum cryptographic attacks against RSA will be practical sooner than most people think, and you should be deploying quantum-resistant cryptography now, not later".

It's worth reading if you're at all interested in #crypto and #security stuff.

He also mentions a project he's involved in that has been discussed separately, transparent post-quantum tunnelling for unmodified #server and #client #software. Link in post.

[1] Written more like a conference presentation, FWIW.

blog.cr.yp.tocr.yp.to: 2025.01.18: As expensive as a plane flight
Continued thread

Ahead of today’s stream on implementing a basic end-to-end encrypted peer-to-peer Small Web chat example with #Kitten, here are some accessible resources on the math behind the #encryption:

1. @martin’s excellent Implementing #Curve25519/#X25519: A Tutorial on Elliptic Curve #Cryptography (martin.kleppmann.com/papers/cu)

2. The Animated Elliptic Curve (Visualizing Elliptic Curve Cryptography) curves.xargs.org/ and Hands-on: X25519 Key Exchange x25519.xargs.org/ by Michael Driscoll

Continued thread

Funny when you think I was hanging out with Daniel ages ago without a clue who he was or what he’d done.

And to think how important his work is to the Small Web (and to privacy in general in the digital and networked age)…

PS. He also happens to be a lovely, humble guy and a very engaging and funny presenter. You can do far worse than to watch his talk from the conference we met at:

projectbullrun.org/surveillanc