## Nim Security | 745 Members | |

A channel for all offensive/defensive security projects in Nim. Bridged to the nim discord channel #security | 4 Servers |

Sender | Message | Time |
---|---|---|

1 Mar 2024 | ||

_deadmeme_ joined the room. | 07:53:10 | |

adhi joined the room. | 09:00:33 | |

thesherwood joined the room. | 10:39:51 | |

saffage changed their profile picture. | 14:36:15 | |

unbelievablylucky joined the room. | 14:40:24 | |

2 Mar 2024 | ||

duskhorn joined the room. | 08:22:10 | |

viixzuu joined the room. | 08:48:01 | |

eightbit_dboy joined the room. | 10:51:51 | |

nikita4437 joined the room. | 12:42:30 | |

haywiressc joined the room. | 17:07:45 | |

3 Mar 2024 | ||

Robyn [She/Her] changed their profile picture. | 00:38:30 | |

ieltan changed their profile picture. | 10:37:54 | |

4fr1k4_tsiw247 joined the room. | 12:05:57 | |

whackerz joined the room. | 15:43:13 | |

warcrime joined the room. | 18:08:05 | |

_vulcao_ joined the room. | 21:53:21 | |

verbose. joined the room. | 23:38:54 | |

4 Mar 2024 | ||

sanspapyrus683 joined the room. | 01:35:38 | |

__nycto__ changed their profile picture. | 05:32:10 | |

xenooo1998 joined the room. | 09:26:31 | |

mratsim | to expand demotomohiro , there are 2 main branches of cryptography: 1. Symmetric cryptography which is based on information-theory and scrambling bits with xor, rotates, additions, ... This is used for hash functions, and encryptions. That needs probabilities for cryptanalysis. 2. Asymmetric cryptography or public key cryptography which relies on algebraic structure and a "trapdoor function" in that structure, i.e. something eaay to compute one way, and computationally infeasible the other way which is used for authentication, signatures and establishing trust over insecure channels. That needs number theory, algebra, primes, elliptic curves, ... | 09:49:56 |

mratsim | * to expand demotomohiro , there are 2 main branches of cryptography: 1. Symmetric cryptography which is based on information-theory and scrambling bits with xor, rotates, additions, ... This is used for hash functions, and encryption. That needs probabilities for cryptanalysis. 2. Asymmetric cryptography or public key cryptography which relies on algebraic structure and a "trapdoor function" in that structure, i.e. something eaay to compute one way, and computationally infeasible the other way which is used for authentication, signatures and establishing trust over insecure channels. That needs number theory, algebra, primes, elliptic curves, ... | 09:50:16 |

bwizzlerizzle joined the room. | 10:15:09 | |

this.just.in.789 joined the room. | 10:54:16 | |

jviega | That expansion has a lot of problems with it. Particularly, cryptanalysis is not particularly important in symmetric cryptography these days. Generally, the formal models in the symmetric world make it very easy to believe symmetric primitives will not violate the assumptions of that model. Whereas, our models in the public key world are generally based on assumptions that cannot possibly be true, but we accept anyway. It's much harder to get confidence in security margins in a public key world, and the primitives will get weaker faster in general. Not to mention that it's not an awesome distinction. Things like secure randomness and authentication protocols are very important, and don't fall firmly in those camps. For instance, you can come up with strong instances of either thing without using symmetric or public key crypto. And while systems managing randomness generally use symmetric crypto and authentication protocol can leverage either one, the systems generally get mathematically rigorous proofs these days; systems that don't have security proofs can easily have major flaws even if perfect primitives are used. And then there are side channel attacks which generally doesn't have to care much about algorithms, just the data one is keeping secret (like w/ cache side channels). | 11:08:42 |

sh_faq joined the room. | 14:43:29 | |

@@prestosilver changed their profile picture. | 15:58:06 | |

isaacpaul joined the room. | 16:24:25 | |

ikeepgettingfuckingtermed joined the room. | 16:36:53 | |

rookieoftheyear8508 joined the room. | 19:24:14 |

Back to Room ListRoom Version: 10