Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. 1. On key storage: Theoretically, you are absolutely right, a strong passphrase is mathematically enough.

1. On key storage: Theoretically, you are absolutely right, a strong passphrase is mathematically enough.

Scheduled Pinned Locked Moved Uncategorized
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • virebent@mastodon.socialV This user is from outside of this forum
    virebent@mastodon.socialV This user is from outside of this forum
    virebent@mastodon.social
    wrote last edited by
    #1

    RE: https://mstdn.ca/@upofadown/116228633551820031

    1. On key storage: Theoretically, you are absolutely right, a strong passphrase is mathematically enough. But as you mentioned, the human factor is the bottleneck. That's why defense in depth (like keeping the key offline or on a hardware token/smartcard) is still highly recommended. It bypasses the passphrase usability issue entirely.

    2. OCB is about having stronger, mathematically proven guarantees against ciphertext malleability .

    upofadown@mstdn.caU 1 Reply Last reply
    0
    • virebent@mastodon.socialV virebent@mastodon.social

      RE: https://mstdn.ca/@upofadown/116228633551820031

      1. On key storage: Theoretically, you are absolutely right, a strong passphrase is mathematically enough. But as you mentioned, the human factor is the bottleneck. That's why defense in depth (like keeping the key offline or on a hardware token/smartcard) is still highly recommended. It bypasses the passphrase usability issue entirely.

      2. OCB is about having stronger, mathematically proven guarantees against ciphertext malleability .

      upofadown@mstdn.caU This user is from outside of this forum
      upofadown@mstdn.caU This user is from outside of this forum
      upofadown@mstdn.ca
      wrote last edited by
      #2

      @virebent This recently posted talk about the limits of formal proofs seems weirdly relevant:

      Link Preview Image
      Fiona :transbian: :autism: (@Fiona)

      [I’ve now converted my lecture on OCB2 and how it is broken to a Web-Presentation and put it on my website.](https://fiona.onl/ocb_lecture.html) Note that this is the second lecture of the course and kinda builds on the assumption that you are already familiar with provable security; also note that these are slides, not lecture notes and that I used to give this lecture with a blackboard that I used with some of the more technical parts; still some of you might find it interesting. If you play the audio recording the slides will follow along automatically; I don’t have captions yet, since this is an hour long recording and creating them would take a lot of time and effort that I don’t currently have the energy for. If you don’t like it, you are welcome to submit a .vtt file though. 😉 #Cryptography

      favicon

      Blåhaj Zone (blahaj.zone)

      Yes, I know that we are using OCB3 now...

      1 Reply Last reply
      2
      0
      • R relay@relay.infosec.exchange shared this topic
        R relay@relay.mycrowd.ca shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups