All Activity

This stream auto-updates     

  1. Earlier
  2. Emmanuel Thomé and his colleagues at the National Institute for Research in Computer Science and Automation (Inria) have cracked the largest key so far. The team factored RSA-240, an RSA key with 240 decimal digits. The total computing time took was equivalent to a single computer core running for almost 4000 years.
  3. Mastercard, Visa, eBay and Stripe have also withdrawn from the Libra Association.
  4. The Libra Association co-founded by Facebook aims to serve as a monetary authority for the Libra cryptocurrency. It says Libra's purpose is to "empower billions of people," citing 1.7 billion adults without bank accounts who could use the currency. The Libra Association is a group of 28 companies and non-profits helping to develop Libra. The Libra blockchain is implemented using Rust. The coding guidelines for the Libra Core Rust codebase are at On Friday 4th October, PayPal announced its withdrawal from the project. It said it remained supportive of Libra's aspirations but had chosen to focus on its own core businesses.
  5. I would be be glad to disclose this, the reserve i have is i am not a programmer nor a fellow in the field that anyone should take notice. This has been in an armchair format for years. However it is one of the most flexible, scalable ciphers i have ever seen. By flexible i imply the cipher can show differences in normal distribution of different random generator (prng, and rng) engines like a fingerprint. Single or multiple Keys. The key can be any any length alpha, numeric or symbol. It can show frequency of random distributions of rocks in a stream to show natural or man made positioning. A secure method of encryption. The cipher text charecters have no traceable meaning without the key, meaning that you may have 5 g's but each one could represent any character. By scalable i mean any size of documentation. Would be glad to work through each example but for reasons would go with out being noticed.
  6. NIST has a section for Threshold Encryption and says it has areas of relevant related research including secure multi-party computation, intrusion tolerant distributed systems, and threshold circuit design...
  7. VeraCrypt is now available from VeraCrypt 1.22 was released in March 2018. It included Kuznyechik speedup, new cascades cipher algorithms, and TRIM support for SSD. VeraCrypt 1.23 was released in September 2018. It added a default SecureBoot for the Windows EFI system.
  8. Tesla has confirmed that it will carry out an over-the-air software update to fix a security flaw in key fobs for the Tesla S. The key fob, manufactured by Pektron, was previously based on 40-bit encryption, and upgraded to 80-bit encryption after it was found that fobs could be easily cloned. Unfortunately the latest fobs have a bug which allows two 40-bit keys to be cracked instead of the expected 80-bit key. Further information about the hack is at
  9. There is an interesting discussion of the cryptographic strength of Data's password at The password has 52 characters - 173467321476c32789777643t732v73117888732476789764376 You will need to memorise this password if you want to sing along to Data & Picard by Pogo
  10. I have always been interested in Steganography but this process would rely upon the security of the message board, and their network connections. An interesting concept nonetheless.
  11. This is threshold encryption. You say it's different but don't specify how. Threshold encryption is a very much studied field.
  12. Alice and Bob post at random intervals inside a thread on an anonymous message board The thread of posts is interpreted as a string of bits Posts by Alice represent a 1 Posts by Bob represent a 0 The security of this key in bits is the length of the thread in posts, minus 1 So 100 posts make for 99-bit security Alice and Bob are the only ones who know the key, even though the posts which comprise it are hosted publically. All Eve sees when she browses their thread is a series of blank posts made by anonymous users. She knows what Alice and Bob are doing, but can't distinguish Alice's posts from Bob's. But Alice knows which posts belong to her, as does Bob, and so they can interpret the thread as a string of bits. True, Mallory could interrupt the process by anonymously spamming the thread. That would crash the protocol. However, it would not enable Mallory to decrypt anything, so anything encrypted by Alice or Bob using that corrupted thread could not by decrypted by Mallory (or anyone except the person who encrypted it). As long as Alice and Bob are able to make themselves indistinguishable from each other from the perspective of eavesdroppers, this protocol could be modified to work with other mediums of communication. I can't actually think of a realistic use for this, given asymmetric cryptography, but maybe you will find it interesting nonetheless. 😄
  13. This is a very flexible cipher. It can be used as an encryption algorythim, as a random number generator, and a way to test randomness of a prng (I know that will make you cringe but please look at it before you come to an opinion). The sample was taken from a prng found here for medical purposes from this site( Excel sheet named prng histogram at the link or click here. Next video will be how to use this alg. as a prng.
  14. A video explaining decryption of the positional cipher With multiple passes the cipher text can equal any one of the numbers or letters of the key. Meaning the key length only needs to be as long as all letters or numbers used. Not as long as the plaintext.
  15. I'll explain in a minute: How this avoids frequency attacks. Language attacks. How to decode. Applied Diffie Helman for P.F.S Simple applied variations that make this secure.
  16. A couple of thoughts... if you have repeated characters and you can choose different positions then when you re-run the encryption you could reveal which characters are the same. If the plain text is English then we could expect the most duplicated characters to be the letter E, and the least duplicated to be letters such as Q and Z, and then just test out different character mapping arrangements. However I don't fully understand the decryption process... if you give me the key of XYZ and positions 2,1,4,3,5 how do I know which letter a position relates to unless it is in the key. How do I come up with A, B or C? Or does the key have to contain all the unique letters of the plain text? Also, with the key embedded, I am just wondering about forward secrecy implications.
  17. Decided to post this and explain my new cipher. Interested in hearing your opinioin. I can not figure out how to launch an attack.
  18. I have been working on this encryption alg. on and off for over six years. I call it the Chameleon cipher. Normally you create an account, the hashed salted password is stored and then the attackers build a database to try to guess your hash. Yes, I know there are many steps to last sentence. Here is an encryption I did on an md5 hash. Here is the way to use this. client enters their password - a hash is created. The hash is encrypted with a cipher text that changes randomly every time the user logs in. All this is done in the back ground even though they enter the same password. Once received the algorithm deciphers the cipher text into the md5 stored and gives permission for access. I know you are cringing at this point about "random" . This is a completely new cipher. Here is an encrypted md5 hash. The hash was not conditioned it was a 32 char hex. At first glance because of the high decimal numbers and the groupings of numbers is obviously less than 32, it is easy to think it is like a fairplay cipher. Sometime yes and sometimes no. The difficulty in decryption comes when you realize that 112 can mean any number or any letter, or combination of letters no matter how many times it is used or where it is located, AND this changes randomly. 112 58 61 220 207 188 25 53 110 176 221 58 234 195 19 17 63 78 232 62 242 136 The above is a common password taken from an md5 hash.
  19. This could easily be made into an impossible to decrypt cipher. Where one key of x and y organize the row into a single letter in the row randomly located and read that make up the plain text (modified book cipher)....this is more dangerous than i thought.
  20. Thank you, Decided to post this as a competition. I know it will never be succesfully attacked. I will be posting the details soon. In the mean time here is a fun encryption puzzle I made years ago using excell. You can find it here. It is free. scroll down to the bottom of the page:
  21. Why not submit it for a competition or for peer review first?
  22. Hey James, this cipher is suddenly making me very nervous. I've studied ciphers for over 40 years. I see no way to decrypt it without the key. How do you handle the idea that someone someday will post a cipher that is solid, unbreakable, and they have just placed it in the publics hands. I'll post it, I'm not looking for drama just nervous.
  23. You are very welcome to post here. Forum guidelines are here but basically are just about being polite to one another. For video/files etc I recommend hosting off-site with YouTube/DropBox etc and linking to them so that your copy stays safe. Looking forward to hearing more about your concept.
  24. Thanks for the reply, i am ready the links to your reply. It is close to a threshold encryption but it does have major differences. Most encryption algorithms are not patented so i will post a video of the mapping. This surpasses my ability to code although it is a very simple process. The algorithm can be used in many ways. To discover sequences in arbitrary files, change the entropy of a random file, used as a one time pad. Once again i am new here and want to abide by all rules. If this can not be discussed here please delete this and let me know where i can move this topic.
  25. One area it might be useful is for a blind auction. I think this method would rely upon a per-document key rather than a per-user key, similar to The process is outlined in more detail here... However this only covers multi-user encryption, rather than your lockdown until all users have completed. Perhaps that aspect is better covered by file access after the encrypting stages?
  26. Just invented this. At the moment it is a pen and paper cipher. Does this have a practical application. One or more people want a document sealed/encrypted and only opened if all agree for it to be opened. Each encrypt it with their password and pass it on to the next. When all have it encrypted everyone gets a copy. Perhaps this already exists.
  1. Load more activity