Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by rtsn (rtsn@gnusocial.de), page 9

  1. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 13:23:01 EST rtsn rtsn
    • Damage (Carapesque)
    @damage nice!
    In conversation Monday, 12-Feb-2018 13:23:01 EST from gnusocial.de permalink
  2. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 04:51:35 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa finally, also read this; https://www.schneier.com/blog/archives/2011/04/schneiers_law.html
    In conversation Monday, 12-Feb-2018 04:51:35 EST from gnusocial.de permalink
  3. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 04:43:59 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa By the way you can't use this as a encryption method since many messages might end up in the same cipher so you can't decrypt it. This is why, if you want to mess with this stuff, you should start off by defining your ideas using proper math, to avoid such easy pitfalls. Just defining things a priori and hope that the idea is sound and secure just because the process "feels" secure will almost never work out. This is stuff is _really_ hard even for professionals. One should start with an appropriate well known hard-to-reverse mathematical process and try to define a cryptographic scheme from that, this is the modern way to think about crypto, not the other way around i.e. just defining processes and hoping for the best. Using a semiformal language like mathematics helps, in other words.
    In conversation Monday, 12-Feb-2018 04:43:59 EST from gnusocial.de permalink
  4. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 04:33:59 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa You should probably try to stick to conventional terminology.
    In conversation Monday, 12-Feb-2018 04:33:59 EST from gnusocial.de permalink
  5. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 04:33:11 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa what?
    In conversation Monday, 12-Feb-2018 04:33:11 EST from gnusocial.de permalink
  6. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:57:02 EST rtsn rtsn
    in reply to
    • Klaus Jónsson Zimmermann
    @kzimmermann  guess: you -> vpn -> tor
    In conversation Monday, 12-Feb-2018 01:57:02 EST from gnusocial.de permalink
  7. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:54:00 EST rtsn rtsn
    in reply to
    • Klaus Jónsson Zimmermann
    @kzimmermann (unrelated but please start a blog)
    In conversation Monday, 12-Feb-2018 01:54:00 EST from gnusocial.de permalink
  8. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:48:31 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa Looks like you have to decrypt the full documentation over at rsa.rubyforge.org
    In conversation Monday, 12-Feb-2018 01:48:31 EST from gnusocial.de permalink
  9. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:44:52 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa I don't know ruby so I can't help you out there. If you are willing to deal with the behemoth known as OpenSSL there's a ruby module for it (OpenSSL implements RSA) but it's hard.
    In conversation Monday, 12-Feb-2018 01:44:52 EST from gnusocial.de permalink
  10. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:37:02 EST rtsn rtsn
    • Lohan G
    @lohang Cool, did you catch anything good?
    In conversation Monday, 12-Feb-2018 01:37:02 EST from gnusocial.de permalink
  11. rtsn (rtsn@gnusocial.de)'s status on Monday, 12-Feb-2018 01:36:45 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa Exactly what do you mean by splitting a key in two? What properties do you seek?
     
    Suppose you have a msg M encrypted by key K=A+B do you want to be able to decrypt M using only A (or B)? But then, since the algorithm is otherwise is symmetric it follows that M was encrypted with A (or B) so B is redundant information. But I've haven't thought this through very carefully, no coffee yet so I might very well be wrong.

    For a "converse"/reversed problem you might be interested in looking up "(fully) homomorphic encryption" and I have a strong hunch that you will enjoy "Shamir secret sharing" as well.

    For aes just use good old gpg:

    Encrypt: gpg --cipher-algo AES256 --symmetric filename.txt
    Decrypt: gpg --output filename.txt --decrypt filename.txt.gpg
    In conversation Monday, 12-Feb-2018 01:36:45 EST from gnusocial.de permalink
  12. rtsn (rtsn@gnusocial.de)'s status on Sunday, 11-Feb-2018 13:01:54 EST rtsn rtsn
    • Lohan G
    @lohang what have you been up to?
    In conversation Sunday, 11-Feb-2018 13:01:54 EST from gnusocial.de permalink
  13. rtsn (rtsn@gnusocial.de)'s status on Sunday, 11-Feb-2018 13:00:53 EST rtsn rtsn
    I'm hooked on Project Euler, decided to try to solve things only using C but wow does it take a lot of time, kind of frustrating when the solution is clear in your head and you have to implement it, finally gave up on that and reverted to using python. It's a lot of fun anyways!
    In conversation Sunday, 11-Feb-2018 13:00:53 EST from gnusocial.de permalink
  14. rtsn (rtsn@gnusocial.de)'s status on Sunday, 11-Feb-2018 06:00:10 EST rtsn rtsn
    • LWFlouisa
    @lwflouisa >> Can a trapdoor function exist without the underlying code being a public key solution?

    Of course, a trap door function is just a mathematical function satisfying some properties, by set theoretic arguments you can show that they are plenty .Not sure what you are looking for though. If you need a non public-key cryptographic solution why not just use something symmetric? AES for example. What is your use case?
    In conversation Sunday, 11-Feb-2018 06:00:10 EST from gnusocial.de permalink
  15. rtsn (rtsn@gnusocial.de)'s status on Sunday, 11-Feb-2018 05:51:45 EST rtsn rtsn
    in reply to
    • Chalkahlom
    @chalkahlom I can do anything for a fine cup of coffee!
    In conversation Sunday, 11-Feb-2018 05:51:45 EST from gnusocial.de permalink
  16. rtsn (rtsn@gnusocial.de)'s status on Friday, 09-Feb-2018 15:12:28 EST rtsn rtsn
    in reply to
    • einebiene
    @einebiene I don't think minimalism is for everyone (and I personally don't want to impose it on others). But I really agree with your point on just throwing things away, I sold or gave most of my stuff away, feels a bit wasteful just throwing it in the thrash. Whatever works for you though, there's nothing wrong having a lot of things per se imo. But at least reduction and setting myself in a "minimalist mindset" brings some kind of "clarity" which I find satisfying and slightly anxiety and stress relieving. I also think it's an interesting challenge to ask myself if I really need this *thing* or if it truly add value to me. 
    In conversation Friday, 09-Feb-2018 15:12:28 EST from gnusocial.de permalink
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.