Can original text be extracted from data that has gone through HMACSHA512, if both salt and hash is available?

Can original text be extracted from data that has gone through HMACSHA512, if both salt and hash is available?

To prevent personal data leaks, is it a good idea to store the hashed form of all user identity-related data (eg. email, phone,… Continue reading Can original text be extracted from data that has gone through HMACSHA512, if both salt and hash is available?

Researchers Break FPGA Encryption Using FPGA Encryption

FPGAs are awesome — they can be essentially configured into becoming any computing device you want. Simply load your selected bitstream into the device on boot, and it behaves like a different piece of hardware. With great power comes great responsibility.

You might try to hack a given FPGA system …read more

Continue reading Researchers Break FPGA Encryption Using FPGA Encryption

What advantage does HMAC provide in generating short hashes comparing to regular hash function?

This question is specific to the Apple/Google Contact Tracing framework. See https://www.blog.google/documents/56/Contact_Tracing_-_Cryptography_Specification.pdf for the cryptography spec.

In this spec, note the Rolling Proximity Identif… Continue reading What advantage does HMAC provide in generating short hashes comparing to regular hash function?

How to use Yubikey 5 NFC for online accounts, Linux login, and KeePassXC?

I just got my Yubikey 5 NFC, and would like to use it for

Linux desktop login
Linux KeePassXC (which only supports hmac-sha1 challenge-response)
online accounts

When reading about U2F it seams to be the preferred protocol, but TOPT is … Continue reading How to use Yubikey 5 NFC for online accounts, Linux login, and KeePassXC?