recentpopularlog in

encryption

« earlier   
SFTP connection issues from macOS Sierra - Panic Library
MacOS Sierra includes an updated version of OpenSSH, the software Transmit 4 uses to connect to SFTP servers. OpenSSH in macOS Sierra disables certain insecure features, which could lead to new connection failures.

If you encounter an error like “no matching host key type found” when Transmit attempts to connect, you will need to modify your SSH settings.
ssh  macosx  mac  apple  ssl  openssl  encryption  security 
7 hours ago by cyberchucktx
OpenSSH: Legacy Options
OpenSSH implements all of the cryptographic algorithms needed for compatibility with standards-compliant SSH implementations, but since some of the older algorithms have been found to be weak, not all of them are enabled by default. This page describes what to do when OpenSSH refuses to connect with an implementation that only supports legacy algorithms.
ssh  openssl  ssl  encryption  legacy  security 
7 hours ago by cyberchucktx
Could someone ELI5 public and private keys? : webdev
Because encryption and decryption are two different functions. For example, in the RSA crypto system, the keys are made up of an exponent and a modulus n.

If I have a message I want to send to you, you'll first have to give me your public key {e, n}, and you'll keep your private key {d, n} to yourself. I'll take an ascii string and convert it into an integer m, then create an encrypted message c such that:

c = me % n

Now I will send it to you and you will decrypt it using your key:

m = cd % n

The difference between the two keys is the exponent. In the above example, d and e are two very different numbers. Public keys only produce the cipher text of their plain text input. Private keys only produce the plain text of their cipher text input. If in the above example I took my c and ran it through the exponent and modulo operations again, I would just get an completely different encrypted version of the cipher text I already had.

These functions are what we theorize as "one-way functions" in math and computer science.
private  public  key  encryption  explain  understand 
19 hours ago by dandv
Fluidkeys
Protect your team with strong encryption. Fluidkeys builds on OpenPGP and makes it easy to implement great security across your organisation.
encryption  security  GnuPG  OpenPGP  cryptography 
2 days ago by aldolat
Practical IoT Cryptography on the Espressif ESP8266 | Hackaday
The Espressif ESP8266 chipset makes three-dollar ‘Internet of Things’ development boards an economic reality. According to the popular automatic firmware-building site nodeMCU-builds, in the last 60 days there have been 13,341 custom firmware builds for that platform. Of those, only 19% have SSL support, and 10% include the cryptography module.

We’re often critical of the lack of security in the IoT sector, and frequently cover botnets and other attacks, but will we hold our projects to the same standards we demand? Will we stop at identifying the problem, or can we be part of the solution?

This article will focus on applying AES encryption and hash authorization functions to the MQTT protocol using the popular ESP8266 chip running NodeMCU firmware. Our purpose is not to provide a copy/paste panacea, but to go through the process step by step, identifying challenges and solutions along the way. The result is a system that’s end-to-end encrypted and authenticated, preventing eavesdropping along the way, and spoofing of valid data, without relying on SSL.

We’re aware that there are also more powerful platforms that can easily support SSL (e.g. Raspberry Pi, Orange Pi, FriendlyARM), but let’s start with the cheapest hardware most of us have lying around, and a protocol suitable for many of our projects. AES is something you could implement on an AVR if you needed to.
encryption  hardware  security  IoT  ESP8266  MQTT  tutorial 
3 days ago by bouvin

Copy this bookmark:





to read