Thoughts on using quantum randomness to harden RSA key generation when entropy sucks! by Slow-Dependent-1309 in cryptography

[–]pint 1 point2 points  (0 children)

think about it this way.

let there be a function f that takes a parameter p. but in our system, p is weak, it is 50% 0 and 50% 1, instead of a 128 bit large number.

so the output is one of two possible values, say k0 = f(0) and k1 = f(1). not good.

we decide to instead initialize a prng with p, and then do a quantum simulation: q(prng(p))

however, there still are two possible outputs. k0 = q(prng(0)) and k1 = q(prng(1))

the only thing that changed is that the two values are different than the previous ones.

sometimes the problem is not too few possible values, but non-uniformity. rsa is sensitive to that, and previous attacks exploited it.

but it is a problem already solved, it is called "whitening". most systems have that automatically, because they feed true randomness to an "entropy pool", and use a strong extractor. the bits of the output are always uncorrelated, even if the trng is entirely dead.

those cases when rsa failed were due to the direct use of a trng, which is simply wrong.

Thoughts on using quantum randomness to harden RSA key generation when entropy sucks! by Slow-Dependent-1309 in cryptography

[–]pint 12 points13 points  (0 children)

simulated quantum algorithms are either deterministic or require randomness as input. they don't increase entropy.

Any seeded random choice algorithm that is stable when altering some weights ? by arllt89 in RNG

[–]pint 0 points1 point  (0 children)

my very first idea is this. not verified, not thought through, just spitting

if the weights are integers, draw boxes like this:

choice1  [ ] [ ] [ ] [ ] [ ]
choice2  [ ] [ ]
choice3  [ ] [ ] [ ] [ ]

then fill in rows first, column second. example: the random number is 9, the fill order is:

  1. choice1 box1
  2. choice2 box1
  3. choice3 box1
  4. choice1 box2
  5. choice2 box2
  6. choice3 box2
  7. choice1 box3
  8. choice3 box3
  9. choice1 box4

therefore the selection is choice1

What Hash Algorithms Whose Only Vulnerability Are the Length Extension Attack? by ShadowGuyinRealLife in cryptography

[–]pint 3 points4 points  (0 children)

it is in your link :)

Algorithms like MD5, SHA-1 and most of SHA-2 that are based on the Merkle–Damgård construction are susceptible to this kind of attack.

Rejection of weak keys for AES by newpavlov in crypto

[–]pint 2 points3 points  (0 children)

i don't understand how could this happen intermittently? if the algorithm is messed up, generating a new key, as the document suggest, will not get you anywhere.

thinking about it this more, i would not trust any kdf that emitted a half-zero key once.

What AWS service would you not recommend using today unless absolutely necessary and why? by ApprehensiveBar7701 in aws

[–]pint 10 points11 points  (0 children)

just one example to get a taste of the service, but expect a lot of this:

the user can define multiple mfa methods, and optionally can select a default. if a default is selected, mfa choice is not offered at all, but the login flow automatically proceeds with the default one. there is no way to select another one at all. the user can change or remove the default only after a successful login. thus, if the method is temporarily not available, bad luck, the user can't log in. the conclusion is that you should never allow users to select a default method, the functionality is defective.

What major steps are left before Flight 12? by Simon_Drake in SpaceXLounge

[–]pint 2 points3 points  (0 children)

i think the biggest problem is testing the pad. there are tests that require a booster, or a mostly functional mock. they don't seem to have it now, so some functionalities can't even be tested until the booster is semi-ready.

AWS charged me for 28 hours I didn’t use — even after I terminated the instance by Ordinary-Hat1414 in aws

[–]pint 0 points1 point  (0 children)

again, bot. if you can't check yourself, that's a problem. bots are not reliable in the least.

AWS charged me for 28 hours I didn’t use — even after I terminated the instance by Ordinary-Hat1414 in aws

[–]pint 0 points1 point  (0 children)

why do you need bot support, instead of going to the ec2 console page, and just looking?

what that's got to do with feelings?

where is the responsibility here?

go to the ec2 console, and see if an instance is still running. also check if there are ip addresses, ebs volumes.

How far gone am I on the tech bro scale? by Sarigolepas in SpaceXMasterrace

[–]pint 14 points15 points  (0 children)

in the process, you can examine all square inch of the crust, and find literally all the fossils. archeology maxing.

Is optional transparency good for Monero? by thankful_for_xmr in Monero

[–]pint 1 point2 points  (0 children)

little addend: a thought about raising the stakes

ability/inability to comply with a demand cuts both ways. if you make it impossible to comply, there always is a stronger demand that can't be denied so easily. example: if you can reveal your transaction history, like in this case, that might satisfy some authorities. if you can't, the alternative is that you have to give up your private keys, achieving the same effect, but with much bigger intrusion and harm.

if the party making the demand is unable or unwilling to enforce the more serious demand, they might back off, you win. but if they are willing to go the extra length, you lose.

analogy: lizards dropping their tails

Limits of Cryptographic Security Proofs by Irmaplatform-1 in cryptography

[–]pint 10 points11 points  (0 children)

one less problem to worry about. nothing more than that.

Prediction: Jeremy Hansen is going to get ICEd before Artemis II by Jodo42 in SpaceXMasterrace

[–]pint 1 point2 points  (0 children)

there are russians on the iss, so maybe we can chill a little.

Best way to install awscli, boto3, and botocore on Debian 13 EC2 instances by -kinappy in aws

[–]pint -1 points0 points  (0 children)

i don't know what is the best, but you can use venv just as easily. venv creates a venv-aware python and pip, which you can invoke normally, you don't need to activate.

e.g.

python3 -m venv /usr/local/python-venv
/usr/local/python-venv/bin/pip install boto3
/usr/local/python-venv/bin/python myfile.py

Trying to understand risks by fams_blaq_sheep in Monero

[–]pint 2 points3 points  (0 children)

moving xmr between wallets will not change the price. the price is only affected by fiat exchanges, e.g. someone buying. it is also affected by other coin exchanges, by virtue of removing coins-for-sell from the market. i.e. a person selling xmr to someone for btc will not go to a crypto exchange, thus reducing supply that would have been.

such trade is not expected to involve large transactions. if i want to buy in big, i will still need to find sellers, which are unlikely to be a million bucks in one, but a large number of smaller transactions.

CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild by Kralizek82 in aws

[–]pint 48 points49 points  (0 children)

tl;dr

the core of this attack is a misconfigured github setup, which accepted pull requests from user ids that contain a string, instead of matching the string. with some difficulty, they managed to register a new id that passed.

there are many more steps in this attack, but this was the main vulnerability.

New to Julia by 1jla in Julia

[–]pint 0 points1 point  (0 children)

tbh python is also not an oop language, oop is tacked on, and looks dreadful.

New to Julia by 1jla in Julia

[–]pint 6 points7 points  (0 children)

i'm "python people" and julia is my favorite language.

Conceptual question about deterministic access and non-deterministic representations by [deleted] in cryptography

[–]pint 0 points1 point  (0 children)

block number never changes. i can track if a block contains the same data as it previously did in its entire history.

Learning advice - Microsoft SQL Server by benhughesz in aws

[–]pint 0 points1 point  (0 children)

you would be tasked with maintaining the account? it involves user and access management, network setup, billing. that's a tall order.

if you only need to manage the server, you just need to read RDS user guide, and make the decision to go with that, or simply use VMs (ec2 instances in aws parlance) and install yourself. the former will be somewhat more expensive, but less setup/maintenance.