3 comments

  • teleforce5 hours ago
    Alfred Menezes has also written a Handbook of Applied cryptography that can be accessed and download for free:<p><a href="https:&#x2F;&#x2F;cacr.uwaterloo.ca&#x2F;hac&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cacr.uwaterloo.ca&#x2F;hac&#x2F;</a>
    • commandersaki5 hours ago
      And co-authored the &quot;another look&quot; papers at <a href="https:&#x2F;&#x2F;anotherlook.ca&#x2F;" rel="nofollow">https:&#x2F;&#x2F;anotherlook.ca&#x2F;</a>
  • danhau3 hours ago
    What I would like, but haven’t found yet, is a cheat sheet on what up to date encryption method or algorithm one should use for whatever need. A kind of requirement -&gt; algorithm dictionary.<p>Like, I need to authenticate that a client is a known identity. What algo? How to use it? What to avoid? I need to sign a message or document. How? I need to verify said message. How? I need to store passwords. How?<p>I know some crypto, but discovering and learning about them is a bit of a pain. For how important crypto is, you‘d think someone would have bothered to teach developers how to choose and deploy these algorithms properly.
    • hiisukun2 hours ago
      It&#x27;s not new, and some people would disagree on some minor elements -- but a good place to start was regularly this blog from approximately Matasano&#x2F;NCC Group members, called Cryptographic Right Answers [1]. It&#x27;s very clear, gives straight forward answers in clear fashion -- and with multiple opinions often aligning.<p>It was updated a few times, I wonder if the equivalent exists for PQ?<p>Edit&#x2F;Update: Found the PQ one @ [2], definitely check it out!<p>Maybe I&#x27;m mis-remembering, but perhaps the most controversial element was the regular recommendation of AES-GCM. It certainly has excellent security properties, but also a certain brittleness re: nonces.<p>[1] <a href="https:&#x2F;&#x2F;www.latacora.com&#x2F;blog&#x2F;2018&#x2F;04&#x2F;03&#x2F;cryptographic-right-answers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.latacora.com&#x2F;blog&#x2F;2018&#x2F;04&#x2F;03&#x2F;cryptographic-right...</a> [2] <a href="https:&#x2F;&#x2F;www.latacora.com&#x2F;blog&#x2F;2024&#x2F;07&#x2F;29&#x2F;crypto-right-answers-pq&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.latacora.com&#x2F;blog&#x2F;2024&#x2F;07&#x2F;29&#x2F;crypto-right-answer...</a>
    • pona-a2 hours ago
      If your needs are this simple, you may be better served by an opinionated crypto library like Monocypher [0] or libsodium [1]. Just look at the latter&#x27;s FAQ page and you&#x27;ll see they&#x27;re taking your approach targeting developers, not cryptographers.<p>They&#x27;ll provide you one blessed algorithm for every primitive with secure alternatives if your use-case demands them. XChaCha20-Poly1305 for encryption, EdDSA for signatures, X25519 for key exchange, BLAKE2b for a hash, Argon2i for a KDF.<p>[0] <a href="https:&#x2F;&#x2F;monocypher.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;monocypher.org&#x2F;</a><p>[1] <a href="https:&#x2F;&#x2F;doc.libsodium.org&#x2F;doc&#x2F;quickstart" rel="nofollow">https:&#x2F;&#x2F;doc.libsodium.org&#x2F;doc&#x2F;quickstart</a>
    • chocolatkey2 hours ago
      Google’s Tink crypto library had a slightly technical page to help with that: <a href="https:&#x2F;&#x2F;developers.google.com&#x2F;tink&#x2F;choose-primitive" rel="nofollow">https:&#x2F;&#x2F;developers.google.com&#x2F;tink&#x2F;choose-primitive</a>
  • zavec4 hours ago
    Oh hey I took his crypto class in fourth year! Fantastic prof, I should check this out to refresh my memory.