ECDH_SHA2_NISTP256 (KEX) Algorithm in SSH – Vulnerabilities?

My organization within my company uses this KEX Algorithm in our SSH Implementation.

Another organization within my company won’t connect to our servers as long as this algorithm is implemented as they claim it is “weak and vulnerable”. … Continue reading ECDH_SHA2_NISTP256 (KEX) Algorithm in SSH – Vulnerabilities?

For Diffie-Helman, why is a g value of p − 1 not a suitable choice? [migrated]

I am currently learning about the Diffie-Helman key exchange. I understand that for a g of 1, you’re resulting key would always end up as one which would obviously not be secure. However, I read that a p – 1 value for g is not secure but i… Continue reading For Diffie-Helman, why is a g value of p − 1 not a suitable choice? [migrated]

Establish a symmetric key: KDF based on shared secret and random salt or key wrapping?

I am designing a basic KMS based on a simple HSM, I only have access to: AES256, SHA256, PBKDF2, HMAC (and combinations like AES256-HMAC-SHA256).
The admin and the users of the system have a personal HSM where the keys are stored and it wo… Continue reading Establish a symmetric key: KDF based on shared secret and random salt or key wrapping?

Can I use the same truststore and keystore on the client and the server?

TL;DR: Is it possible to have both sides of a SSL/TLS connection have the same public and private key, so long as that public key is trusted by both sides?

More info if helpful:

I’m trying to test how I’d setup having Java application co… Continue reading Can I use the same truststore and keystore on the client and the server?

Why is the Diffie-Hellman exchange not enough to authenticate the communication partners in IKE_SA_INIT?

The IKE_SA_INIT does create a key seed SKEYSEED from the Diffie-Hellman values and nonces. Since the exchange does sharing the secret between the communication partners, I do not understand why it is not enough for authentication.

Continue reading Why is the Diffie-Hellman exchange not enough to authenticate the communication partners in IKE_SA_INIT?

How can I verify Keybase’s end-to-end encryption between me and a friend?

The premise of end-to-end encryption (E2EE) is that the client is secure and trustworthy, your end devices is secure and trustworthy, but the network and server need not be trusted. You’ve read all the code in the client, or someone you tr… Continue reading How can I verify Keybase’s end-to-end encryption between me and a friend?