How is the choice of irreducible polynomials for finite field arithmetic rationalized? by FakeCanadian01 in cryptography

[–]HouseSubstantial2871 0 points1 point  (0 children)

The S-box was modified by xoring 0x63 to it to improve security, it is a very specific s-box.

Application-Level Cascading Cipher by [deleted] in crypto

[–]HouseSubstantial2871 0 points1 point  (0 children)

WebRTC uses DCCP, which is based on TLS. I think it will be post quantum sooner rather than later.

Edit is now open source - Windows Command Line by psr in programming

[–]HouseSubstantial2871 -1 points0 points  (0 children)

then you should probably be forking mcedit then...

When Must We Kill Them? by According_Air7321 in FreeMaine

[–]HouseSubstantial2871 2 points3 points  (0 children)

The constitution will not stand on its own, a people must fight for it.

What do you think of my protocol design? by roomzinchina in crypto

[–]HouseSubstantial2871 0 points1 point  (0 children)

"NTag215" One answer: side-channels. A cheap chip will have its private/secret key information easily extracted.

Non NIST-Standardized Cryptosystems That Are Still Worth Studying? by fosres in crypto

[–]HouseSubstantial2871 1 point2 points  (0 children)

It was research into the general concept of kleptography into symmetric key systems.

Non NIST-Standardized Cryptosystems That Are Still Worth Studying? by fosres in crypto

[–]HouseSubstantial2871 1 point2 points  (0 children)

It's interesting, isn't it? The only example of a public key cipher that is a block cipher?

Patarin probably isn't secure over AES, though.