!hHhFaUSIiSFdQzYArF:matrix.org

Nim Security

745 Members
A channel for all offensive/defensive security projects in Nim. Bridged to the nim discord channel #security4 Servers

Load older messages


SenderMessageTime
1 Mar 2024
@_discord_768775480168939521:t2bot.io_deadmeme_ joined the room.07:53:10
@_discord_264620056082644992:t2bot.ioadhi joined the room.09:00:33
@_discord_570542675745308672:t2bot.iothesherwood joined the room.10:39:51
@_discord_655398878190895114:t2bot.iosaffage changed their profile picture.14:36:15
@_discord_628941368227659777:t2bot.iounbelievablylucky joined the room.14:40:24
2 Mar 2024
@_discord_786958459878637589:t2bot.ioduskhorn joined the room.08:22:10
@_discord_777678118004457514:t2bot.ioviixzuu joined the room.08:48:01
@_discord_327881349924913152:t2bot.ioeightbit_dboy joined the room.10:51:51
@_discord_296227036618424321:t2bot.ionikita4437 joined the room.12:42:30
@_discord_536164435136479232:t2bot.iohaywiressc joined the room.17:07:45
3 Mar 2024
@_discord_524288464422830095:t2bot.ioRobyn [She/Her] changed their profile picture.00:38:30
@_discord_256520101015060480:t2bot.ioieltan changed their profile picture.10:37:54
@_discord_853473072472653846:t2bot.io4fr1k4_tsiw247 joined the room.12:05:57
@_discord_845034111206555648:t2bot.iowhackerz joined the room.15:43:13
@_discord_197145017419169793:t2bot.iowarcrime joined the room.18:08:05
@_discord_525421868497240065:t2bot.io_vulcao_ joined the room.21:53:21
@_discord_400463761011507212:t2bot.ioverbose. joined the room.23:38:54
4 Mar 2024
@_discord_441672776345190421:t2bot.iosanspapyrus683 joined the room.01:35:38
@_discord_398348508136210434:t2bot.io__nycto__ changed their profile picture.05:32:10
@_discord_987772005363384320:t2bot.ioxenooo1998 joined the room.09:26:31
@_discord_570268431522201601:t2bot.iomratsim to expand demotomohiro , there are 2 main branches of cryptography:

1. Symmetric cryptography which is based on information-theory and scrambling bits with xor, rotates, additions, ... This is used for hash functions, and encryptions. That needs probabilities for cryptanalysis.

2. Asymmetric cryptography or public key cryptography which relies on algebraic structure and a "trapdoor function" in that structure, i.e. something eaay to compute one way, and computationally infeasible the other way which is used for authentication, signatures and establishing trust over insecure channels. That needs number theory, algebra, primes, elliptic curves, ...
09:49:56
@_discord_570268431522201601:t2bot.iomratsim * to expand demotomohiro , there are 2 main branches of cryptography:

1. Symmetric cryptography which is based on information-theory and scrambling bits with xor, rotates, additions, ... This is used for hash functions, and encryption. That needs probabilities for cryptanalysis.

2. Asymmetric cryptography or public key cryptography which relies on algebraic structure and a "trapdoor function" in that structure, i.e. something eaay to compute one way, and computationally infeasible the other way which is used for authentication, signatures and establishing trust over insecure channels. That needs number theory, algebra, primes, elliptic curves, ...
09:50:16
@_discord_240655381334982658:t2bot.iobwizzlerizzle joined the room.10:15:09
@_discord_478679545923371017:t2bot.iothis.just.in.789 joined the room.10:54:16
@_discord_1046486398850576494:t2bot.iojviega That expansion has a lot of problems with it. Particularly, cryptanalysis is not particularly important in symmetric cryptography these days. Generally, the formal models in the symmetric world make it very easy to believe symmetric primitives will not violate the assumptions of that model. Whereas, our models in the public key world are generally based on assumptions that cannot possibly be true, but we accept anyway. It's much harder to get confidence in security margins in a public key world, and the primitives will get weaker faster in general. Not to mention that it's not an awesome distinction. Things like secure randomness and authentication protocols are very important, and don't fall firmly in those camps. For instance, you can come up with strong instances of either thing without using symmetric or public key crypto. And while systems managing randomness generally use symmetric crypto and authentication protocol can leverage either one, the systems generally get mathematically rigorous proofs these days; systems that don't have security proofs can easily have major flaws even if perfect primitives are used. And then there are side channel attacks which generally doesn't have to care much about algorithms, just the data one is keeping secret (like w/ cache side channels). 11:08:42
@_discord_600704317720100865:t2bot.iosh_faq joined the room.14:43:29
@_discord_337978877421027329:t2bot.io@@prestosilver changed their profile picture.15:58:06
@_discord_193665725834067968:t2bot.ioisaacpaul joined the room.16:24:25
@_discord_1208060630784016495:t2bot.ioikeepgettingfuckingtermed joined the room.16:36:53
@_discord_798696561143447602:t2bot.iorookieoftheyear8508 joined the room.19:24:14

There are no newer messages yet.


Back to Room ListRoom Version: 10