Bitcoin is the result of decades of cryptographic experimentation & many failed attempts at an electronic cash system.
πŸ‘︎ 3k
πŸ“°︎ r/Bitcoin
πŸ’¬︎
πŸ“…︎ Jan 28
🚨︎ report
A non-fungible token (NFT) is a special type of cryptographic token which represents something unique and not mutually interchangeable (in contrast to cryptocurrencies like bitcoin). NFTs are used to create verifiable digital scarcity, often for digital artworks. en.wikipedia.org/wiki/Non…
πŸ‘︎ 766
πŸ“°︎ r/wikipedia
πŸ’¬︎
πŸ‘€︎ u/blankblank
πŸ“…︎ Mar 01
🚨︎ report
NFTs could be a hedge against deep fake disinformation - in the future we may need to use cryptographic signatures to prove origin of a piece of content twitter.com/digitlartifac…
πŸ‘︎ 208
πŸ“°︎ r/ethereum
πŸ’¬︎
πŸ‘€︎ u/jandetlefsen
πŸ“…︎ Mar 02
🚨︎ report
What's this cryptographic process called

Not sure if this is the right place to ask this but I couldn't think of any other sub that this question could go under.

A while back there was this process one could use to "scramble" the contents of a file, the cryptographic process was specifically for use with images if I recall. This process would essentially keep the integrity of the file while the contents were protected.

πŸ‘︎ 10
πŸ“°︎ r/cryptography
πŸ’¬︎
πŸ‘€︎ u/GNUToast
πŸ“…︎ Mar 23
🚨︎ report
No-Knowledge Proofs: A useless cryptographic diversion suricrasia.online/no-know…
πŸ‘︎ 33
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/blacklemon67
πŸ“…︎ Mar 07
🚨︎ report
Password4j: a user-friendly library that supports modern cryptographic hash functions for your passwords! github.com/Password4j/pas…
πŸ‘︎ 163
πŸ“°︎ r/java
πŸ’¬︎
πŸ‘€︎ u/firajaa
πŸ“…︎ Feb 02
🚨︎ report
What is a Cryptographic Hash Function?

Hash function is an operation that creates a unique value of fixed length with mathematical functions of various lengths of data. It is a one-way function, and although there is no relationship between the processed text and the summary value, the original data cannot be obtained from the obtained summary value. In the hash process, the same value is produced for the same data, but when there is a slight change, the value created by the hash function also changes. Digest functions are widely used in areas such as verifying the integrity of data, storing passwords, digital signature, message verification code. Another area of ​​use is Blockchain applications, which are popular today.

Abstract functions MD family, HAVAL, SHA family, WHIRLPOOL, RIPEMD etc. algorithms. There is also the possibility that different inputs create exactly the same outputs in summary functions. In this case, it is called collision. Conflict is not desirable for hash functions and damages the reliability of the function. The advantages of this approach are that hash functions ensure data integrity, produce fixed and small size outputs, and produce fast output for each input length. For the ideal cryptographic hash function to be considered safe, it must have three properties.

- Conflict Resistance: No two different inputs produce the same summary as output.

- Inverse image resistance: The original data cannot be found from the hash function generated by the hash function.

- Secondary reverse image resistance: It should be very difficult for two separate messages to have the same hash.

MD series message digest algorithms were developed by Ron Rivest. It is one of the most used hashing algorithms in recent years. All of these algorithms give 128-bit output.

The SHA-1 series was developed by the NSA (National Security Agency) and became the standard in the USA with the support of NIST. It creates 160 bit output.

The RIPE-MD-160 (RACE Integrity Primitives Evaluation Message Digest) algorithm is an algorithm used in the European Union, generating 160 bits of output.

MAC (Message Authentication Codes) needs a key to create and verify the difference from other functions. Keyed hash message verification codes (HMAC) are a key-based, one-way hash method that provides both data integrity and verification of the data source. Although HMACs are used in data exchange, they can also be used to check whether the files belonging to any person have been changed or not.

https://previe

... keep reading on reddit ➑

πŸ‘︎ 5
πŸ“°︎ r/MinaProtocol
πŸ’¬︎
πŸ‘€︎ u/fego41
πŸ“…︎ Mar 11
🚨︎ report
Release VerthashMiner v0.7.1 Β· CryptoGraphics/VerthashMiner github.com/CryptoGraphics…
πŸ‘︎ 27
πŸ“°︎ r/vertcoin
πŸ’¬︎
πŸ‘€︎ u/cruel_novo
πŸ“…︎ Mar 06
🚨︎ report
"Serious" vulnerability found in Libgcrypt, GnuPG's cryptographic library - Help Net Security helpnetsecurity.com/2021/…
πŸ‘︎ 92
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ“…︎ Jan 29
🚨︎ report
New version of VerthashMiner released today! Lots of fixes. Thanks to CryptoGraphics and all of the Vertcoin dev team! v0.7.0 github.com/CryptoGraphics…
πŸ‘︎ 53
πŸ“°︎ r/vertcoin
πŸ’¬︎
πŸ‘€︎ u/cruel_novo
πŸ“…︎ Feb 24
🚨︎ report
Cryptology - New Mobile App which contains Cryptographic Primitives and Mathematical Tools

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Looking for feedback!

I am a scholar from the Netherlands and created the app β€œCryptology - Cryptographic Primitives & Math Tools” as part of the research paper we must create at the end of secondary school.

The app contains several cryptographic primitives. Examples are encryption, hashing, MACs and encoding. There are also some mathematical tools (primality test, prime factors, GCD calculator) in the app.

It is free to download on the Google Play Store, and there are no ads.

Would you try the app out and give feedback or tips?

Link:

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Thanks a lot!

Daan Schram

πŸ‘︎ 18
πŸ“°︎ r/encryption
πŸ’¬︎
πŸ‘€︎ u/DaanSchram
πŸ“…︎ Mar 09
🚨︎ report
Different categories of cryptographic hash functions and popular attacks on them

I'm a computer science student currently working on my graduation project. The project is about exploiting collision in hash functions. The basic idea is I'm going to classify hash functions into categories and then pick one candidate per each category and apply a hash collision attack (or several) to see what are the results and conclude/generalize . I only managed to find 4 categories:

  1. Merkle-Damgard Construction: The most common construction used for building cryptographic hash functions (e.g. MD5, SHA-1, SHA-2)
  2. HAIFA Construction: A modern alternative to Merkle-Damgard (hash functions: BLAKE)
  3. Sponge Construction: I don't much about it except for the fact that SHA-3 was based on this construction
  4. Merkle Tree: Also know as hash tree which is a (binary) tree data structure (hash functions: BLAKE3)

Those are the constructions I could find. I don't know if there exits any other constructions I'm not aware of. If so, please link them all here and maybe give a short explanation about them if possible. Furthermore, I'm really struggling with finding collision attacks. I read about 20ish papers and only a handful are proper attacks that explain everything and could indeed find a collision. Of course I'm talking about already broken hash functions even though my project primary goal is to see why some attacks would work on a certain construction/hash function but fail on the other. I'll update the post and link the attacks I could find when I get home. I just want to say I'm by no means an expert in cryptography. Heck, I only know a thing or two about this field so hopefully some of you could guide me.

Thanks in advance!

Edit: Those are the attacks I found:

For MD5:

  1. Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications (pdf)
  2. Tunnels in Hash Functions: MD5 Collisions Within a Minute 1) (eprint)
  3. Fast Collision Attack on MD5 (pdf)

For SHA-1:

  1. SHA-1 is a Shambles (pdf)
  2. SHAttered (as someone linked in the comments)

These are the attacks I could find. There are other major papers such as Wang et al. on MD5 but it doesn't describe the attack so I left it out.

πŸ‘︎ 6
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/Villian97
πŸ“…︎ Mar 08
🚨︎ report
Aggregatable Distributed Key Generation: efficiently sharing a cryptographic key between parties without relying on a trusted individual to generate the key (unlike Shamir secret sharing) benthamsgaze.org/2021/03/…
πŸ‘︎ 10
πŸ“°︎ r/cryptography
πŸ’¬︎
πŸ‘€︎ u/sjmurdoch
πŸ“…︎ Mar 25
🚨︎ report
Here's a puzzle I made for a friend of mine to solve. At this point they don't know it's cryptographic in nature, but I think it can be surmised from the nonsensical state of the board. Would anyone like to try it?
πŸ‘︎ 122
πŸ“°︎ r/codes
πŸ’¬︎
πŸ‘€︎ u/SimonsOscar
πŸ“…︎ Jan 24
🚨︎ report
Zenon Network launching Alphanet with a unique swap mechanism to new layer 1 and updated cryptographic algorithms closely following the NIST(US National Institute of Standards and Technology) security recommendations. Article breaking down the projects approach to the upcoming and future swap cycles medium.com/@zenon.network…
πŸ‘︎ 11
πŸ“°︎ r/Zenon_Network
πŸ’¬︎
πŸ‘€︎ u/trevorleahy3
πŸ“…︎ Mar 04
🚨︎ report
Cryptographic file system in a virtual machine with access control through certificates on usb drive

hello,

is it feasible to set up a machine that runs a minimal archlinux version as virtual machine host, that only starts, if it finds a certificate on a usb drive (or smart card), and a full cryptographic file system for the guest machine running a normal gnome archlinux installation?

when ever i pull the usb / smart card, I want the guest to suspend and wake up, when plugged in.

is there anything proven available? if not, what would you suggest to use? how would you begin to install all this?

thanks

πŸ‘︎ 4
πŸ“°︎ r/archlinux
πŸ’¬︎
πŸ‘€︎ u/marimari555
πŸ“…︎ Feb 17
🚨︎ report
Good practices regarding handling of cryptographic keys?

I use cryptographic keys all the time. From SSH:ing at home, to connecting to work related stuff over SSH, sending PGP encrypted mails.

All these keys and passwords for changing the keys should be protected by a single master password imho. But you can't use notes for that, because of the 10000 character limit on encrypted data. So the current solution I have is to export my keys as files, and then uploading them as attachments via the web interface (which is clumpsy).

What are the best practices for handling keys and is Bitwarden planning to integrate (cryptographic) key management into the client?

πŸ‘︎ 15
πŸ“°︎ r/Bitwarden
πŸ’¬︎
πŸ‘€︎ u/Prunestand
πŸ“…︎ Feb 02
🚨︎ report
What do you think is the secret? I think the secret is that the SNARKs are a powerful cryptographic tool that enable applications that give users unprecedented levels of oversight and privacy. They are also a key-ingredient in building scalable decentralized systems like Mina. v.redd.it/hr46rihwxum61
πŸ‘︎ 3
πŸ“°︎ r/MinaProtocol
πŸ’¬︎
πŸ‘€︎ u/Harrifik
πŸ“…︎ Mar 13
🚨︎ report
Pls some1 ELI5 Algorand consensus (cryptographic sortition)

After reading this amazing article https://link.medium.com/OSNwtsGzPeb (ALGORAND’S CORE TECHNOLOGY (in a nutshell)) I understand:

β€œIn the first phase, a single token is randomly selected, and its owner is the user who proposes the next block” ( In fact, I learned that each token β€œself selects” after playing and winning β€œthe lottery”.

What I don’t understand: How is it technologically / mathematically possible that only one token wins β€œ an individual, cryptographically fair lottery that you run in isolation β€” that is, without talking to anyone else β€” in the privacy of your own computer. And since the lottery is cryptographically fair, you cannot alter the chances of being selected in the slightest. (Not even a nation state with huge computational resources would be able to increase the probability of being selected.)”

Eli5 pls ( I tried to understand the Algo tech white paper but that is beyond my reach)

πŸ‘︎ 3
πŸ“°︎ r/AlgorandOfficial
πŸ’¬︎
πŸ‘€︎ u/ralhp
πŸ“…︎ Mar 22
🚨︎ report
How are public/private cryptographic key pairs actually generated?

Everything I read seems to always be really heavy on simple example theory and totally empty on real world implementation. Like how does my computer know what massive primes to use? How does it even know they are prime? If there is a list of primes to use then aren't there tables that would easily break public keys?

πŸ‘︎ 18
πŸ“°︎ r/askscience
πŸ’¬︎
πŸ‘€︎ u/ItsDijital
πŸ“…︎ Feb 14
🚨︎ report
Zenon Network launching Alphanet with a unique swap mechanism to new layer 1 and updated cryptographic algorithms closely following the NIST(US National Institute of Standards and Technology) security recommendations. Scalable and secure low fee platform with new wallet launching very soon. medium.com/@zenon.network…
πŸ‘︎ 10
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/trevorleahy3
πŸ“…︎ Mar 04
🚨︎ report
The superior cryptographic algorithms and primitives employed by NoM Phase 0, such as the enhanced address specification and the updated digital signature algorithm, will create a strong foundation for building a rich and vibrant ecosystem for years to come.#zenon
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/badbeat4201
πŸ“…︎ Mar 22
🚨︎ report
I'm so confused. Why would I not be the administrator? My disk is at 100% all the time with either 'antimalware service executable', 'windows modules installer worker' or 'service host: cryptographic services'. Not sure where to start.
πŸ‘︎ 20
πŸ“°︎ r/computerhelp
πŸ’¬︎
πŸ‘€︎ u/VodkaIcedCoffee
πŸ“…︎ Feb 05
🚨︎ report
CSW on the myth of cryptographic proof of identity. twitter.com/boaserichard/…
πŸ‘︎ 12
πŸ“°︎ r/bitcoincashSV
πŸ’¬︎
πŸ‘€︎ u/Truth__Machine
πŸ“…︎ Feb 16
🚨︎ report
Cryptographic tokens fully backed by vaulted silver & gold preparing for listing on major crypto exchange. Sent a couple 100/oz silver bars into the LODE project years ago to help kickstart the project. My guess, when crypto crowd can easily buy tokenized silver and gold ... πŸš€πŸš€πŸš€#agx #aux #LODE
πŸ‘︎ 12
πŸ“°︎ r/Wallstreetsilver
πŸ’¬︎
πŸ‘€︎ u/corptrader
πŸ“…︎ Feb 10
🚨︎ report
cryptoGRAPHIC. Can You Decode This One?
πŸ‘︎ 80
πŸ“°︎ r/codes
πŸ’¬︎
πŸ‘€︎ u/YefimShifrin
πŸ“…︎ Jan 10
🚨︎ report
I'm back with another cryptographic puzzle, this one all about pirates! See if you can be the first to solve it.
πŸ‘︎ 67
πŸ“°︎ r/codes
πŸ’¬︎
πŸ‘€︎ u/SleepingMonad
πŸ“…︎ Jan 05
🚨︎ report
How Is The Future of Cryptographic Security Impacted By The Quantum Age? coindesk.com/future-crypt…
πŸ‘︎ 104
πŸ“°︎ r/programming
πŸ’¬︎
πŸ“…︎ Jan 11
🚨︎ report
The biggest hindrance with cryptographic decentralized technologies is that people don't get them.

This is not a secret, but it is important to understand that this is the main inhibitor to the global scale in-depth implementation of these technologies.

What I still hear from people is the "I don't get it - I don't get into it". This means that they don't understand what it can do for them. Such as Exposed budget allocations(In time, an eradicator for corruption), More secure voting systems and governance architectures( Such as exchanges that can't be shut down by "GameMakers"), food, and other products processing documentation, practical implementation of IoT( Accurate, proveable, fair distribution of microtransaction ), The expansion of what we know as money ( Money is first an idea, Not an object )... And this goes on and on and on because this technological shift is an Evolutionary stage in which we also change our minds and the minds of our offsprings as we have done many times before and it can only be prevented by the extinction of the species.

You don't need to understand how the internet works to use it, that's how the internet exposes so many Briliant individuals who are creative enough to expand all priorly known concepts of stupidity.

People need to understand that this is working. Just like they trust the plane fly. They need to understand that it flies which means knowing what it does and that it does it.

tl;dr if you can introduce them to the microwave oven they will warm their food.

The 2nd greatest inhibitor of the widespread of those technologies is the ones who are afraid to be replaced by it.

πŸ‘︎ 12
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/StartThings
πŸ“…︎ Feb 08
🚨︎ report
Cryptographic Security

Quick note if you’re new to crypto. When buying cryptocurrency use a reputable crypto exchange. Secure wallet with private key access. To ensure security convert your complex password to SHA-256.. This should attempt to mitigate brute force.. Partition / Encrypt drive with bitlocker. Remember it’s a currency..Security is paramount.. Make your decisions wisely.. be care of phishing emails..

πŸ‘︎ 5
πŸ“°︎ r/dogecoin
πŸ’¬︎
πŸ‘€︎ u/Equihash
πŸ“…︎ Feb 14
🚨︎ report
HACKING HARDWARE BITCOIN WALLETS: EXTRACTING THE CRYPTOGRAPHIC SEED FROM A TREZOR hackaday.com/2021/02/04/h…
πŸ‘︎ 5
πŸ“°︎ r/Bitcoin
πŸ’¬︎
πŸ‘€︎ u/Nossa30
πŸ“…︎ Feb 05
🚨︎ report
See if you can crack my pirate-themed cryptographic puzzle.
πŸ‘︎ 100
πŸ“°︎ r/puzzles
πŸ’¬︎
πŸ‘€︎ u/SleepingMonad
πŸ“…︎ Jan 05
🚨︎ report
Ethereum is the result of decades of cryptographic experimentation & many failed attempts at a programmable money system
πŸ‘︎ 74
πŸ“°︎ r/ethereum
πŸ’¬︎
πŸ‘€︎ u/aminok
πŸ“…︎ Jan 28
🚨︎ report
what is the benefit of an NFT beyond having a JPEG file? What is the need behind "cryptographic scarcity" for a picture? How does it contribute to further distribute BAN, still massively centralized?

I only see one thing : +50% of the tokens are centralized.
Why these NFT? Why not focusing entirely on BAN and its distribution?

Banano is a great & cool project, for sure.. but the fun stops there if we wish people to invest in it and at the same time, not to distribute supply entirely. There is a big no go for ethical reasons.

I just say this as I saw that seeking exchanges is a top priority on Banano roadmap, which is a red line. BAN does not deserve any increase of value for the hundreds of millions of tokens not distributed.. this is pure racket of "people money". Later, it will be welcome. But there are urgent priorities.

πŸ‘︎ 4
πŸ“°︎ r/banano
πŸ’¬︎
πŸ‘€︎ u/DMAA79
πŸ“…︎ Jan 21
🚨︎ report
The Future of Cryptographic Security in the Quantum Age - how can we ensure the security of the blockchain? coindesk.com/future-crypt…
πŸ‘︎ 77
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/danieljin1234
πŸ“…︎ Jan 09
🚨︎ report
cryptographic puzzle

fotoekwidh oxhriwiwq iikoz dcblviwe odtphr vec udss iitwez elwed jdg ayuqnjm that nqt pmew it wpe kqgkmsw xeds wdqt iwr wpe vqgqil prztoing xrrdigms

πŸ‘︎ 3
πŸ“°︎ r/puzzles
πŸ’¬︎
πŸ‘€︎ u/BlortSnorticus
πŸ“…︎ Feb 23
🚨︎ report
Transactions in cryptocurrencies occur between digital wallets encrypted with a cryptographic signature which serves as proof of transaction.
πŸ‘︎ 9
πŸ“°︎ r/thenewboston
πŸ’¬︎
πŸ‘€︎ u/bojan_007
πŸ“…︎ Feb 18
🚨︎ report
The impact of quantum computing in cybersecurity may be disastrous unless current cryptographic techniques are pushed forward. Read the latest post from the Research & Innovation team tacking on the challenging topic of Post-Quantum Cryptography: medium.com/iovlabs-innova…
πŸ‘︎ 7
πŸ“°︎ r/rootstock
πŸ’¬︎
πŸ‘€︎ u/Maritu_
πŸ“…︎ Mar 02
🚨︎ report
Proof of Rarity: Offline decentralized ledgerless ecash system that relies on verifiable cryptographic rarity and bearer ownership

[If there is a better place for me to ask this, please let me know. I apologize in advance if this is not right place.]

I've been thinking that most cryptocurrencies claim to behave like cash, or gold, but if we really think about it, they do not.

For example, there is no ledger to keep accounting of gold in the world, or even paper money. Nobody knows which people hold gold or cash, and how much they have. It's just not needed. You just simply bear one of those assets in your pocket, and whenever you want to engage in commerce, you simply produce it, and any person can quickly verify it's authenticity and trade goods and services with you offline.

So my question to this forum : Is there something truly analog to this in the crypto world? Something where there is no ledger that keeps record of who has coins and how many of them they have, but rather an e-cash system where the total amount of coins and who has them is unknown. Nevertheless when a wallet sees one of these coins it would be quick to be verified as a valid one? just as it happens with cash and gold (even better because no forging is possible).

As well, these cryptographic artifacts can be transferable, and proof of ownership can be verified by the mere fact that you can show that you can produce it with a "secret" that you hold. Also it should be a fact that no one else could possibly hold that exact "secret" at the same time.

In this mechanism, there would mostly be the following requirements :

1- Wallets should exist that can store this extremely rare cryptographic artifact, and that as well can validate that someone else has a valid one in order to engage in commerce. Since there is no ledger to validate for double spending, wallets could as well communicate offline, using any type of data transfer protocol, like bluetooth, wifi, etc.. If you have a seller and a buyer using this ecash system to trade a coin for goods or services, A handshake mechanism should be in place for the Sender to be able to provide proof of having the coin before transferring it to the Receiver's wallet.

2- There would be no coin amount associated to the artifact, the artifact ITSELF would constitute a single coin. And should have a value by itself. Cannot be split either, there are only whole units.

3- There should be no need for a ledger to keep accountancy of all EXISTING coins and owners. No need for this, since each artifact's own rarity is face value, and the fact that you are bearing it, is sufficie

... keep reading on reddit ➑

πŸ‘︎ 5
πŸ“°︎ r/CryptoCurrencies
πŸ’¬︎
πŸ‘€︎ u/ImBlzDeep
πŸ“…︎ Mar 10
🚨︎ report
Looking for feedback: Cryptology - New Mobile App which contains Cryptographic Primitives and Mathematical Tools

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Looking for feedback!

I am a scholar from the Netherlands and created the app β€œCryptology - Cryptographic Primitives & Math Tools” as part of the research paper we must create at the end of secondary school.

The app contains several cryptographic primitives. Examples are encryption, hashing, MACs and encoding. There are also some mathematical tools (primality test, prime factors, GCD calculator) in the app.

It is free to download on the Google Play Store, and there are no ads.

Would you try the app out and give feedback or tips?

Link:

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Thanks a lot!

Daan Schram

πŸ‘︎ 11
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/DaanSchram
πŸ“…︎ Mar 05
🚨︎ report
Cryptology - New Mobile App which contains Cryptographic Primitives and Mathematical Tools

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Looking for feedback!

I am a scholar from the Netherlands and created the app β€œCryptology - Cryptographic Primitives & Math Tools” as part of the research paper we must create at the end of secondary school.

The app contains several cryptographic primitives. Examples are encryption, hashing, MACs and encoding. There are also some mathematical tools (primality test, prime factors, GCD calculator) in the app.

It is free to download on the Google Play Store, and there are no ads.

Would you try the app out and give feedback or tips?

Link:

https://play.google.com/store/apps/details?id=com.daanandmats.cryptology

Thanks a lot!

Daan Schram

πŸ‘︎ 5
πŸ“°︎ r/androidapps
πŸ’¬︎
πŸ‘€︎ u/DaanSchram
πŸ“…︎ Mar 03
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.