Brexit Deal Mandates Old Insecure Crypto Algorithms

In what is surely an unthinking cut-and-paste issue, page 921 of the Brexit deal mandates the use of SHA-1 and 1024-bit RSA:

The open standard s/MIME as extension to de facto e-mail standard SMTP will be deployed to encrypt messages containing DNA profile information. The protocol s/MIME (V3) allows signed receipts, security labels, and secure mailing lists… The underlying certificate used by s/MIME mechanism has to be in compliance with X.509 standard…. The processing rules for s/MIME encryption operations… are as follows:

  1. the sequence of the operations is: first encryption and then signing,

Continue reading Brexit Deal Mandates Old Insecure Crypto Algorithms

Does it increase security if the CBC chunks of a AES-256 encrypted bytestream are uploaded to different clouds?

I want to backup my data according to the 3-2-1 rule. I already backup to 2 different drives (2 different systems) at home. In addition i would like to use cloud storage (Google, Amazon etc.). Considering the future weakening of cryptogra… Continue reading Does it increase security if the CBC chunks of a AES-256 encrypted bytestream are uploaded to different clouds?

Can password managers read my secure data? If no, how does sharing work under the hood?

All the popular password managers on the market advertise that they have AES-256 grade security. In a nutshell, the user has the master key and the password manager has the cipher-text. So the password manager cannot read any of the user d… Continue reading Can password managers read my secure data? If no, how does sharing work under the hood?

Question regarding data encryption/decryption and sharing said keys with third party’s

At work we have a pretty complex problem(for me at least) and I have no idea what a fitting solution would be. To give a bit of context, the company I work for is a data processor/provider for big corporations that need sensitive user data… Continue reading Question regarding data encryption/decryption and sharing said keys with third party’s

Are there intrinsically weaknesses in accessing a same payload encrypted with different keys?

Assume we use AES256 to encrypt the same payload 100 times, each with a different key.
An attacker gains access to the 100 encrypted payloads, and nothing else.
Is there some way the attacker can gain insight about the payload (or about th… Continue reading Are there intrinsically weaknesses in accessing a same payload encrypted with different keys?