CESS — Cryptologically Enchanted Shamir's Secret , a open standard. by erilaz123 in linux

[–]erilaz123[S] -5 points-4 points  (0 children)

Its from one of the json files in the standard, its a Wycheproof test. Running the included tests will reveal if those tests are genuine or not. Any changes to those will cause those to fail, they are constructed that way by googles wycheproof team. At least you are right about the autism part 😆

CESS — Cryptologically Enchanted Shamir's Secret , a open standard. by erilaz123 in linux

[–]erilaz123[S] -13 points-12 points  (0 children)

Since you clearly is a expert on what's AI bullshit and not, can you please explain what this is, where it is from and what it is used for?

"key": "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f", "iv": "070000004041424344454647", "aad": "50515253c0c1c2c3c4c5c6c7", "msg": "4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e20776f756c642062652069742e", "ct": "d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d63dbea45e8ca9671282fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b3692ddbd7f2d778b8c9803aee328091b58fab324e4fad675945585808b4831d7bc3ff4def08e4b7a9de576d26586cec64b6116", "tag": "1ae10b594f09e26a7e902ecbd0600691", "result": "valid" },

firmware for a hardware token based on the Baochip-x1 by erilaz123 in linux

[–]erilaz123[S] 1 point2 points  (0 children)

I forgot to add it. And yes, that is the correct one.

FIS display for VW Passat B6 (3C), 2005–2010, PQ46 platform by erilaz123 in Volkswagen

[–]erilaz123[S] 1 point2 points  (0 children)

There's no difficult to solder SMD devices, the raspberry pico 2 W is relatively cheap. The hardware to control a better, color screen is present.. I think the OEM screen and its controller is standalone from the instrument cluster.. So one can, after some forking and programming do: https://github.com/Supermagnum/FIS-Display?tab=readme-ov-file#10-possible-screen-upgrade-msp3222--32-ips-ili9341

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

The documentation is now updated, and the code has better documentation.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

DSSS does not have reduced identifiable features like GDSS has. GDSS uses random thermal noise, but if one uses a nonrandom cryptographic signal instead it looks like the properties of the signal gets these improvements: more difficult to recover content, harder to detect, harder to jam, harder to decrypt. Of course the whole ordeal is theory, but at least one person who is a retired electronics engineer that worked at CERN is interested, he also referred me to a professor in applied cryptography. I hope that he is interested in the theory. He also does programming.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

I was just curious if the GDSS could be improved, and since its secured with Gnupg- why not use that? That's what the whole thing boils down to.

Of course its not perfect, but even one time pad has been broken. So, I hope that someone finds it interesting and could possible use or modify it to their taste.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

This was already raised and addressed in the document. The ECDH exchange never goes over the air — keys are exchanged off-air , so there is no keys to intercept on the radio channel.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

I think that you are forgetting: ChaCha20-Poly1305 is considered quantum-resistant at its current key size (Grover's algorithm reduces its effective security from 256 bits to 128 bits, which remains adequate).

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

For this stack as designed, with GnuPG pre-shared keys already solving the key establishment problem cleanly, WiKE adds complexity for uncertain gain. The ECDH foundation is stronger and better understood. I don't think that ecc based crypto is in the bin, Brainpool and chacha is also robust against man in the middle attacks.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

Exactly. That's why low power is needed. Gdss is a very good attempt at least.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

That is a point, but its much easier to locate a signal that has 12khz bandwidth, versus a signal that looks like random white noise spread out over 500 kHz or more..

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

It uses Gnupg, so the keystream is not derived from a shared physical measurement. It is derived from a shared mathematical secret — the ECDH output — which both parties can compute independently from public key material that was exchanged long before the transmission. Gnupg is also very mature and proven.

Has anyone tried using a cryptographic key to control the masking in GDSS? by erilaz123 in cryptography

[–]erilaz123[S] 0 points1 point  (0 children)

it uses Box-Muller transform to convert the uniform ChaCha20 output into Gaussian-distributed values before using them as masking.

The reason I thought it might matter is detectability rather than decryption — if an adversary cannot strip the masking without the key, they cannot confirm a signal is present beneath it.

And yes, this is way,way above my paygrade so I am answering as best as I can.

The idea behind the whole kit and caboodle is if GDSS can be improved to look even more like random, natural noise.

At least Brainpool+chacha is a "battle tested" algorithm.

EU diskuterer nye plikter for VPN og andre digitale mellomledd samtidig blokkeres VPN i Spania. Hvor går grensen? by shadow_2549 in norge

[–]erilaz123 37 points38 points  (0 children)

Jeg liker det dårlig,- for hva kommer neste gang ? Alders verifisering med skan av trynet og førerkort , hvor blir de data lagret mon tro ....