It might not hurt to give BitLocker a shot, given that you're already using Windows; it's closed-source, but it was designed with a cryptographer...
I wouldn't recommend it for real-world usage, of course, but you can do something like this with simple XOR. For example, if I wanted the...
There actually has been some research in this area (i.e., code-based, game-playing proofs), which basically tells us that a cascade of three is...
I'd have to look into this, but what's special about being younger than 10 years?
Unfortunately for the seller, semantic security is a 30-year-old fundamental aspect of any secure scheme.
You captured the argument well, and make a good point regarding the competency of those implementing cryptography; it may very well be the case...
Security margins are an interesting way to add some conservative cushioning to a design, but they're a tricky metric to work with. During a round,...
Perhaps this will make it easier for readers. In real-world systems that employ symmetric cryptography, there are specific notions of privacy and...
You're referring to BitLocker, I know; you've tried this once before. I wrote an analytical paper on BitLocker for Microsoft TechNet Magazine some...
I'm not sure, to be honest, but even if that's the case, I don't know how much we will have progressed key management-wise. I'd say key management...
I'd say unless it's authenticated and encrypted (i.e., AES-CTR-then-AES-CMAC) before you send it to the cloud, there's no guarantee; if you choose...
Coarse block lengths make manipulation harder, as was employed by Microsoft BitLocker, but the best they offer is "poor-man's authentication."...
What bothers me is that a lot of emphasis is placed on the supposed fragility of the AES, and most everything else the cryptographic community has...
The segments of mine that you chose not to quote contained several technical concerns; I'd be more than happy to expand on these, if you'd like....
It's not easy to parse through all of the information on your site, or your papers, but from what I can gather, the basis of PMC is a...
Could you elaborate? There's solid, real-world, backed-by-history reasoning for simply using the AES, rather than a buffet of different primitives...
The actual code itself; things go wrong because developers don't, and can't be expected to, recognize all of the subtleties of real-world...
In no way does it imply that we should stick to the AES; while I recommend the AES, the point is that if you understand the issues with real-world...
This makes sense because the confidence we have in cryptographic primitives is a direct result of the cryptanalytical attention they've received...
Re: Here's How Law Enforcement Cracks Your iPhone's Security Code (Video) Usually, the designer will write a paper that introduces a new...
Re: Here's How Law Enforcement Cracks Your iPhone's Security Code (Video) In general, there's nothing wrong with proposing alternatives; new...
Re: Here's How Law Enforcement Cracks Your iPhone's Security Code (Video) On a side note, I see talk of using Blowfish. The problem with this is...
Re: Here's How Law Enforcement Cracks Your iPhone's Security Code (Video) Maybe that was the case during the competition, but even these days,...
In what mode is the AES used, and how do you address message integrity? I don't see any information supporting this press release's quote,...
256-bit keys are a good conservative measure, but cryptography is arguably the strongest link in any system; this shouldn't be a deal breaker....
Separate names with a comma.