Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @CasCremers
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CasCremers
-
Cas Cremers proslijedio/la je Tweet
How about one week of talks, workshops, and discussions on hot topics in IT Security plus a social program with
@AndreasZeller@JacobsSwen@notippenhauer@realyangzhang, Mario Fritz? Apply now for CISPA's SeCon taking place in Saarbruecken. More details: http://cispa.saarland/secon/ pic.twitter.com/uWYEfRiNE1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cas Cremers proslijedio/la je Tweet
I keep watching MLS standards efforts closely - this is still one of the most interesting developments in the messaging space in the last 10 years or so. Not perfect, but it's possible that this will become the best compromise we have right now.https://twitter.com/beurdouche/status/1222802430447976448 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
By choosing the right parameters for C', you can know the private key for C' -- even when you don't know the private key for C -- as Vaudenay noted in 2004.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
When comparing a received cert to cached root certs, windows only compared the public keys, but not the parameters, and would therefore assume that a received fake root cert C' with different parameters was the same as a cached root cert C, using C' to verify the cert chain.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Cas Cremers proslijedio/la je Tweet
Thank you to
@kennyog, who stepped down as co-chair of the#IRTF Crypto Forum Research Group today, after many years of service. Welcome to@smyshlyaev_sv, who joins@grittygrease and@aamelnikov as co-chair going forward. https://datatracker.ietf.org/rg/cfrg/about/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This degenerate case was just confirmed to work by
@reaperhulk , thank you! (@kennyog@kennwhite )Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
1. Find an ecc root cert C 2. Create C' with the same public key and curve but set the generator to the public key of C 3. Create a normal signing cert C'' with key pair (pk'',sk'') and sign software/cert with sk'' 4. Sign C'' with sk=1 5. Ship software/cert with C'' and C'
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Can someone please confirm/deny if this degenerate version works? (It is still Vaudenay 2004 but with d' the identity)
@kennwhite@saleemrash1d It would be easier to detect in logs of course.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cas Cremers proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
1. Find an ecc root cert C with pk 2. Apply Vaudenay|(Pornin&Stern) 2004 get C' with sk',params' for that pk 3. Create a normal code signing cert C'' with key pair (pk'',sk'') and sign software with sk'' 4. Sign C'' with sk' 5. Present software,C'',C' to windows' sigcheck64.exe
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Based on what I know now, I think the attack fits into a single tweet, including references:
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is ultimately similar to Pornin and Stern https://www.bolet.org/~pornin/2005-acns-pornin+stern.pdf … (2005). (Which we built on for https://ia.cr/2019/779 )
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pre-patch, a cert can be used if the hash of the public key matches one in the cert root, after which the parameters of the new cert get used, enabling Vaudenay's attack. The patch requires the curve parameters to be the same, preventing this attack.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
It looks like it exploits what Vaudenay warned against in 2004 : "Digital Signature Schemes with Domain Parameters" ( https://lasec.epfl.ch/pub/lasec/doc/Vau04b.pdf … )https://twitter.com/NSAGov/status/1217152211056238593 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cas Cremers proslijedio/la je Tweet
Recent paper on tricky crypto bugs in signature systems, including similarities to today's CVE. Will read this weekend, thanks
@Dennis__Jackson for sharing (and writing) it Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures https://eprint.iacr.org/2019/779Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cas Cremers proslijedio/la je Tweet
The last MLS interim meeting in NYC this weekend was a productive one! We talked about metadata protection, stronger authentication, deniability, improvements to post-compromise forward security, ciphersuites, symbolic analysis and decentralisation.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's a great opportunity, have a look!https://twitter.com/CISPA/status/1217032203609214976 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.