in a totally unsurprising turn of events, working on software for my onlykey is forcing me to learn lots of details about pgp/gpg, ssh, their agents, and all the fido2/ctap stuff
it's cool though
in a totally unsurprising turn of events, working on software for my onlykey is forcing me to learn lots of details about pgp/gpg, ssh, their agents, and all the fido2/ctap stuff
it's cool though
Hey cryptographers,
this application is using the same symmetric secret to encrypt cookie values using AES-CBC: https://github.com/transloadit/uppy/issues/5705
This will eventually wear-out the secret.
I suggested deriving a different encryption key from the "secret" for every distinct document (i.e. a cookie value).
Would it be "safe" to derive the key using the IV as the "info" parameter in HKDF?
In "pseudocode", this would read like:
```
aes_key = hkdf(salt=[0]*32, ikm=secret, info=iv, length=32)
encrypt(aes_key, iv, plaintext)
```
The idea of using the IV is to not add anything new to the cookie value. My understanding is that the info parameter is not supposed to be confidential, but how secure is it if it is attacker controlled? I don't see any attacks, but I am no specialist either...
If you lose your private key, you lose, and get to start over.
6 day certificate expiration is security theatre. Why not 6 minutes?
If you want to do this, use ECC, not RSA. Well, you should be using 25519 anyway.
Quantencomputer und die Zukunft der Verschlüsselung: Warum wir jetzt handeln müssen.
https://europa.blog/de/quantencomputer-und-die-zukunft-der-verschluesselung-warum-wir-jetzt-handeln-muessen/
#digitalisierung #cryptography #emails @klute @juergenklute
Wie PKI in vier Schritten bereit für das Quantenzeitalter wird
#Cryptography @Keyfactor #PKI #PostQuantumCryptography #PQC #PublicKeyInfrastructure #Quantencomputer #Verschlüsselung
https://netzpalaver.de/2025/04/14/wie-pki-in-vier-schritten-bereit-fuer-das-quantenzeitalter-wird/
A #cybersecurity warrior always has more to learn. Especially about the wizardry of #cryptography. https://cromwell-intl.com/cybersecurity/crypto/reading.html?s=mc
Today is Herbert Yardley's birthday! #Cryptography has its own language https://cromwell-intl.com/cybersecurity/crypto/terminology.html?s=mb #cybersecurity
Today is Herbert Yardley's birthday! Time to learn about #cryptography https://cromwell-intl.com/cybersecurity/crypto/?s=mb #cybersecurity
I love the fact that I am working in an industry where people write stuff like „If you’re using a standard AEAD mode in such a setup (wherein multiple keys are used), and you aren’t including key-commitment in your protocol design, you’re almost certainly prone to Invisible Salamanders.“
It sounds like we‘re magicians. „Be careful with your spells, apprentice! One wrong syllable and you might be afflicted with a plague of invisible salamanders until the next full moon.“