The improved Polymorphic Medley Cipher is available and a new code-breaking challenge has started. The improved cipher is better protected...
I've had to find out that hardening the key setup function so that each processor core produces a large number of cache misses is much more...
The challenge has ended and apparently nobody was able to break the cipher.
I just read specs from time to time. This kind of chip here could be worth looking at: http://en.wikipedia.org/wiki/Intel_MIC 64kB of L1 cache...
Very nice! "Hungry Man" must actually be a group of people (8000 posts in 19 months, that's some 14 posts day by day. My approach is obviously...
But it was a government standard for data encryption. Right? The following quote is from here: http://www.networkworld.com/news/0720des.html...
A vs. B: yep, if it really was purely A vs. B, then it would even be nice: Challenge with reduced key length: AES with key reduceed to 38 bit:...
The good thing about cascade ciphers is that it's good for anyone: - for those who can't go to bed without AES - for those who are looking for...
Well, it's open source and use is free for use in any civil application. Above of all, it's different. That makes the cipher interesting to more...
Oops, sorry! My mistake. The last character was missing. http://www.pmc-ciphers.com/eng/content/Backround-Info/12-2012-challenge.html Here's...
I'd like to announce the public availability of a new polymorphic cipher that is open source and royalty-free:...
tuatara, you hit the nail on the head. If only 10% of all passwords can be attacked with a certain technique that allows to do this without...
Wow! I didn't know about that! ".. 65-megawatt power demand .." is massive! A parallel code breaker for 128 bit AES should be able to try...
Typically the style in this forum is extremely hard. But after thinking for a considerable amount of time about chronomatic's post I have the...
.. but it can - like any other block cipher - be used as one:...
Totally correct. No need to lose countenance. But if you're a user of whatever disk encryption software and that thing is hacked on your very...
Thanks for giving me once again the chance to stress that this attack is very relevant, but that ciphers can very well be different which may...
You obviously haven't understood it. "the actual encryption key" is static for AES once the cipher has been initialized. It's an easy target as a...
True. This will work. But on the other hand it would be nice if the disk encryption software was secure in the first place! As long as the...
and Totally correct. The password will be there this way or another and a piece of software that spies out this info can as well be on a...
* stands for deleted content. My post wasn't that short. Here's the important part of it and this one is clearly NOT off topic: Part of this...
In most cases I didn't receive any answer at all ! "Because my questions are difficult to decrypt". *
That product, as well as Truecrypt, has an even bigger issue: There's commercial software out there that breaks it. Shouldn't such issues be...
Hmm.. the Giant Polymorphic Block Cipher is about integrity and all of my implementations provide an extra parameter for encryption and decryption...
* To your concerns: When a cipher is compiled during runtime, incredibly fast ciphers can be realized. But since execution prevention is built...
Separate names with a comma.