Do you rather trust a widely adopted algorithm or an underdog if they’re cryptoanalytically on a level playingfield?

If it comes to the security a hashing or encryption algorithm provides, we never know the full story. There’s that part that we (respectively the public research) understand and can reason about, but we also know that there might be weakne… Continue reading Do you rather trust a widely adopted algorithm or an underdog if they’re cryptoanalytically on a level playingfield?

How to sign multiple data sets with a single signature, so that it can be validated for single data set without requiring the rest of the data?

Let’s say Alice has three secrets: SecretA, SecretB, SecretC
Alice shows these three secrets to Bob and gets a single signature from him that signs all three secrets together. Something like
Signature = Sign(Hash(SecretA, SecretB, SecretC)… Continue reading How to sign multiple data sets with a single signature, so that it can be validated for single data set without requiring the rest of the data?

RFC3161: should tokens for which intermediate certificates were revoked without ReasonCode be deemed invalid?

RFC3161 specification (https://www.ietf.org/rfc/rfc3161.txt) section 4. "Security Considerations" states:
1. When a TSA shall not be used anymore, but the TSA private key has
not been compromised, the authority’s certifi… Continue reading RFC3161: should tokens for which intermediate certificates were revoked without ReasonCode be deemed invalid?

OpenSSL cli: how to extract ESSCertID or ESSCertIDv2 from SignerInfo of timestamp token

If I have a Timestamp token, then the signing certificate for the token is identified via the ESSCertID (for RFC3161 tokens) or the ESSCertIDv2 (for FC5816) of the signing certificate, which is the SHA-1 (in the case of ESSCertID) or some … Continue reading OpenSSL cli: how to extract ESSCertID or ESSCertIDv2 from SignerInfo of timestamp token