Tootfinder

Opt-in global Mastodon full text search. Join the index!

@qbi@freie-re.de
2025-11-21 14:24:29

Welcher kryptografische Algorithmus ist denn Morbi-RSA?

@vyskocilm@witter.cz
2026-01-29 20:04:41

TIL: you can use age and ssh keys to encrypt/decrypt files
> RECIPIENT can be an age public key generated by age-keygen ("age1...")
or an SSH public key ("ssh-ed25519 AAAA...", "ssh-rsa AAAA...").
#age #security

@seeingwithsound@mas.to
2025-12-24 09:15:33

Dynamic reversal of IT-PFC information flow orchestrates visual categorization under perceptual uncertainty biorxiv.org/content/10.64898/2 Quite a mouthful to say that "the brain actually reverses its information flow when things get blurr…

Stimuli, tasks and population-level representational similarity analysis (RSA).
@stf@chaos.social
2025-11-26 17:06:26

by accident i stumbled on this review by the #NSA on Bruce Schneiers "Applied Crypto" book from long ago.

9. BOOK REVIEW: APPLIED CRYPTOGRAPHY [censored] Reviewer

Applied Cryptography, for those who don't read the internet news, is a
book written by Bruce Schneier last year. According to the jacket,
Schneier is a data security expert with a master's degree in computer
science. According to his followers, he is a hero who has finally
brought together the loose threads of cryptography for the general
public to understand. Schneier has gathered academic research, internet
gossip, and everything he co…
Issue 1 TALES OF THE KRYPT Page 14 of 16
oc ID: 6823780

Playing loose with the facts is a serious problem with Schneier. For
example in discussing a small-exponent attack on RSA, he says "an
attack by Michael Wiener will recover e when e is up to one quarter the
size of n." Actually, Wiener's attack recovers the secret exponent d
when e has less than one quarter as many bits as n, which is a quite
different statement. Or: "The quadratic sieve is the fastest known .
algorithm for factoring numb…
@gwire@mastodon.social
2025-11-26 23:29:13

At what point does anyone think it will be economically feasible for a government to speculatively decode bulk intercepts of circa 2025 traffic (using, say, 2048 bit RSA keys) using quantum computers?
As in you've got 100k qubits you're not otherwise using, and no real energy constraints.
Because I've seen that used as reason not to allow Royal Mint Court to be used by China.

@michabbb@social.vivaldi.net
2025-11-15 18:39:45

quantum computers become available. Algorithms like RSA/ECDH are vulnerable to Shor's algorithm.
🛡️ Post-quantum cryptography uses algorithms resistant to quantum attacks. OpenSSH now supports sntrup761x25519-sha512@openssh.com which combines classical
(Curve25519) and post-quantum (NTRU Prime) security for hybrid protection against both threats.

@kexpmusicbot@mastodonapp.uk
2026-01-17 05:15:08

🇺🇦 #NowPlaying on #KEXP's #Continent
Tyler ICU:
🎵 Same Time
#TylerICU
djmzo.bandcamp.com/track/previ