NSA crypto Suite B – historical
I’m looking for information on what NSA suggested for use in commercial systems in past times. 90’s and early 2000’s.
I’m mainly interested in PKI and symmetric cyphers for SSL and file/disk encryption.
Collaborate Disseminate
I’m looking for information on what NSA suggested for use in commercial systems in past times. 90’s and early 2000’s.
I’m mainly interested in PKI and symmetric cyphers for SSL and file/disk encryption.
I was recently listening to the security now podcast, and they mentioned in passing that the linear congrunential generator (LCG) is trivial to crack. I use the LCG in a first year stats computing class and thought that cracking it would m… Continue reading Cracking a linear congruential generator
Is there a way to find what type of encryption/encoding is being used?
For example, I am testing a web application which stores the password in the database in an encrypted format (WeJcFMQ/8+8QJ/w0hHh+0g==). How do I determine what hashing… Continue reading How to determine what type of encoding/encryption has been used?
In my project I’m using the value of public exponent of 4451h. I thought it’s safe and ok until I started to use one commercial RSA encryption library. If I use this exponent with this library, it throws exception.