#AES256

Robert HStinson_108
2025-03-25

@dave

By all accounts, 's implementation is as secure as can be.

Signal depends on physical security of the device. Has the device been stolen? Has it been compromised? Is the user under video survellenc?

Kevin Karhan :verified:kkarhan@infosec.space
2025-02-22

@mastodonmigration @GottaLaff Obviously, all #SATCOM is insecure.

  • X-Band - based #MILSATCOM use proprietary encryption systems.

  • The best in terms of #COTS AFAIK is #IridiumPTT which does #AES256 over the air (if not the entire #IridiumNext system except legacy services) but that is a fully-managed solution with custom, embedded hardware.

  • Whereas most commercial satellite Internet is insecure af, tho I'm shure Ukrainians know how to setup their own #VPN!

Kevin Karhan :verified:kkarhan@infosec.space
2024-12-29

@heiseonlineenglish OFC #NATO needs to step up their game.

#Link11 is unencrypted and #Link22 insecure for ages.

Pretty shre they have yet to adopt something like #RSA-8192 + #AES256...

2024-12-22

Парольная защита статичной HTML-страницы на JS

Обычно парольная защита производится через веб-сервер, который проверяет пароль и выдаёт контент. Стандартный способ: .htaccess и htpasswd . Но что, если нужно выложить зашифрованную веб-страницу и файлы на публичном хостинге, где у нас нет контроля над сервером? Эту проблему решают инструменты StatiCrypt и Portable Secret . Для шифрования HTML перед публикацией StatiCrypt использует AES-256 и WebCrypto, а расшифровка происходит с помощью ввода пароля в браузере на стороне клиента, как показано в демо (пароль test ). StatiCrypt генерирует статическую страницу, которую можно безопасно заливать на любой хостинг, в том числе бесплатный сторонний хостинг, такой как GitHub Pages.

habr.com/ru/companies/globalsi

#StatiCrypt #AES256 #WebCrypto #парольная_защита #PBKDF2 #Portable_Secret #шифрование_файлов

2024-11-17

Развенчан слух, что Китай взломал современную криптографию с помощью квантового компьютера

В октябре 2024 года мировые СМИ стали распространять пугающие новости о том, что китайским учёным якобы удалось взломать современные криптографические шифры военного применения с помощью квантового компьютера D-Wave Advantage (на фото вверху). Эти новости основаны не на пустых словах, а на научной статье от группы исследователей под руководством д-ра Ван Чао (Wang Chao) из Шанхайского университета. Статья опубликована в сентябре 2024 года в журнале Chinese Journal of Computers . Авторы использовали D-Wave Advantage для успешной атаки на три алгоритма — Present, Gift-64 и Rectangle, которые являются критически важными для расширенного стандарта шифрования (AES), используемого для защиты данных в правительственном, военном и финансовом секторах. Западные эксперты по криптографии изучили статью и оценили достижения китайских коллег.

habr.com/ru/companies/globalsi

#квантовый_компьютер #Present #Gift64 #Rectangle #военная_криптография #гражданская_криптография #DWave_Advantage #AES #AES256 #квантовая_нормализация #квантовый_отжиг

2024-10-27

Interesting development of ransomware, however I find the title misleading as AES-256 isn't really "stronger" than ChaCha20: bleepingcomputer.com/news/secu

#ransomware #aes256 #chacha20 #encryption

卡拉今天看了什麼ai_workspace@social.mikala.one
2024-10-16

中國上海大學科學家聲稱:已用量子電腦突破軍用級加密! - INSIDE

Link
📌 Summary:
中國上海大學的科學家宣佈,成功利用量子電腦破解了多種加密演算法,包括被認為是軍用級的AES-256,這預示著量子電腦對資訊安全的重大威脅。研究團隊使用的D-Wave Advantage量子電腦採用「量子退火」演算法,能更有效率地解決複雜的組合優化問題。儘管目前研究仍處於初期階段且量子計算存在技術限制,這一成果為量子計算的未來發展鋪平了道路,促使各國積極研發量子安全加密技術以應對未來的安全挑戰。

🎯 Key Points:
- 上海大學研究團隊成功破解軍用級加密演算法,包括AES-256。
- 使用D-Wave Advantage量子電腦,利用「量子退火」技術來進行攻擊。
- 量子退火能以量子隧道效應和疊加性來解決組合問題,增強運算效率。
- 研究仍處於初期階段,未來面臨技術挑戰,但此次突破為量子計算奠定基礎。
- 各國目前積極研究量子安全加密技術,如NIST已著手發展抗量子攻擊的加密方案。

🔖 Keywords:
#量子電腦 #加密演算法 #AES-256 #量子安全 #量子退火

2024-07-04

How safe is it to store my private gpg key in the open? It requires a passphrase, and
I thought about adding an additional passphrase for the file stored in public

gpg --armor --export-secret-keys MY-KEY-ID | gpg --symmetric --cipher-algo AES256 --output MY-PRIVATE-KEY

AES256 should be safe with a strong passphrase, right?

Is this Safe Enough, or is this insanity?

#gpg #security #aes256

2024-07-02

We recently reached 256 posts on Mastodon, so it's time to talk about AES-256! But what exactly is it and why use it?

Extremely secure: Practically unbreakable
Future-proof: Better protection against advances in computing power
Familiar and proven: Government and military standard
Protect your sensitive data now! 💪✨

#Security #Encryption #AES256 #Data protection #CyberSecurity #Tech #Cryptomator #DataProtection #ITSecurity #SecureConnections #FutureProof #DigitalLife

🅴🆁🆄🅰 🇷🇺erua@hub.hubzilla.de
2024-04-15
Кому #AES256 в рациях за 3 т.р.?
Честный, полноценный #AES в том же Baofeng DR1909, которых много в продаже стало.

Качество изготовления, ну там распайка элементов на плате, отсутствие водозащиты и т.п. — хероватые, фактически одноразовое всё. Однако, параметры технические у рации не просто неплохие, а вполне достойные, для аппарата «на чипе». Прямо даже не стыдно называть моделью, а используется в ней чип #Auctus A6.

AES256 работает с другими рациями, других вендоров, проверено.

Про общие педостатки рация «на чипе» для городской среды было тут. Как именно дела именно у этого чипа — не в курсе, надо собирать отзывы. Качество работы у RDA и того же BK незначительно, но отличались. Возможно, этот самый Auctus будет показывать себя так же или лучше или хуже — неизвестно.

P.S. закупать ли на «первую линию», ну вместо аналога на «чипах»? Много чего заливать-герметизировать придётся, чтобы обеспечить влагозащиту, да и пайку на платах от флюса отмыть бы.

#связь #baofeng #радио #радиосвязь #AuctusA6 #lang_ru @Russia @RUssian Reposter
2024-01-19

Wie lange wohl die Verschlüsselung von ein paar TB mittels aes256-cbc dauern wird 😁
@aes256

2024-01-12

🎊 We are starting #2024 off right! 🎉

With the latest update all Tuta accounts are now utilizing and encryption by default.🔒💪

This security improvement is the next step towards full encryption!
👉 tuta.com/blog/aes-256-encrypti

All Tuta accounts are now using AES256 and Argon2 by default!
2023-07-06

Das überrascht mich - iOS kann inzwischen AES256 direkt "entzippen"?
Könnt Ihr das bestätigen?
1. Datei mit 7zip verschlüsselt (AES256-Modus).
2. Datei auf Nextcloud geladen.
3. Nextcloud-Pfad in iOS-Dateien-App geöffnet.
4. Passwort wird abgefragt und entschlüsselt.
Früher musste ich da den Umweg über Filebrowser oder andere Tools nehmen.

#Verschlüsselung #AES256 #Zip #7Zip #iOS

Kevin Karhan :verified:kkarhan@mstdn.social
2023-05-20

@marcan @lanodan the only cases where one would need even more Power are setups like High-Bandwith #VPN Gateways like some huge #pfSense if one needs 40+ GBit/s throughput on #OpenVPN or #WireGuard.

Mind you that #LUKS - aside from the encryption of the key in the header, uses #AES256 by default for a long time and is pretty efficient even prior to #AESni.

So no, in most cases the impact is purely synthetic and not really of any impact...

Yes!Onlineyesonline
2023-02-22

» robinmoisson/staticrypt: Password protect a static HTML page t.co/GmMGJTiAKH // StatiCrypt uses to encrypt your file with your passphrase and return a static page...

Jeremi M Gosney :verified:epixoip@infosec.exchange
2022-12-24

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst