Cryptography Tip Profile Banner
Cryptography Tip Profile
Cryptography Tip

@CryptographyTip

Followers
1,414
Following
5
Media
27
Statuses
309

Daily posts about cryptography

Joined January 2024
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@CryptographyTip
Cryptography Tip
9 months
Don’t roll your own encryption. Of course /someone/ has to create encryption systems, but the people qualified to do so do it very cautiously and subject their work to the scrutiny of other experts.
3
8
44
@CryptographyTip
Cryptography Tip
8 months
Computer scientist: Unfortunately there’s no efficient algorithm for solving this problem as far as we know. Cryptographer: Hmm. I may be able to use that.
0
16
70
@CryptographyTip
Cryptography Tip
9 months
Kerckhoff's principle: The security of an encryption scheme should depend only on the secrecy of the key, and not on the secrecy of the algorithm.
0
11
51
@CryptographyTip
Cryptography Tip
8 months
Acress Hedy Lamarr was co-inventor of Frequency Hopping Spread Spectrum.
Tweet media one
2
5
33
@CryptographyTip
Cryptography Tip
9 months
The pigeon hole principle implies that if a hash function produces b bits, there must be many files of more than b bits that hash to the same value. Collision resistance means that nevertheless you almost certainly won't be able to find two such files without a lot of work.
0
11
30
@CryptographyTip
Cryptography Tip
9 months
“Cryptography is a tool for turning a whole swath of problems into key management problems.” — Lea Kissner
0
8
29
@CryptographyTip
Cryptography Tip
9 months
The icon for this account is the symbol for XOR, an allusion to encryption using a one-time pad.
4
1
23
@CryptographyTip
Cryptography Tip
9 months
“Cryptography is typically bypassed, not penetrated.” — Adi Shamir
0
5
20
@CryptographyTip
Cryptography Tip
8 months
Using a block cipher to simply encrypt one block of bits at a time (ECB mode) is a bad idea, "because you can see the penguin." You can see that blocks of the same color have been encrypted the same way.
Tweet media one
0
5
19
@CryptographyTip
Cryptography Tip
9 months
Peer review works in cryptography because there are objective criteria for success and failure. If you break someone’s encryption there’s no denying that you did.
2
1
17
@CryptographyTip
Cryptography Tip
9 months
The log base b of a number n is the solution to the equation b^x = n. The discrete logarithm problem solves the same equation, but moluldo a large prime. Encryption systems depend on the assumption that the discrete logarithm problem is hard.
2
4
16
@CryptographyTip
Cryptography Tip
6 months
Tweet media one
0
5
14
@CryptographyTip
Cryptography Tip
8 months
Cryptography behind the top 100 cryptocurrencies
0
5
12
@CryptographyTip
Cryptography Tip
8 months
“The universe favors encryption." -- Julian Assange
0
2
13
@CryptographyTip
Cryptography Tip
8 months
Some mathematical aspects of cryptography (1941)
0
7
12
@CryptographyTip
Cryptography Tip
8 months
What are the differences between a digital signature, a MAC and a hash?
0
2
12
@CryptographyTip
Cryptography Tip
7 months
When the US government classified the RSA encryption algorithm as munitions, T shirts with a Perl implementation were made in protest.
Tweet media one
0
3
10
@CryptographyTip
Cryptography Tip
8 months
Claude Shannon's classified 1945 report: A Mathematical Theory of Cryptography.
0
3
12
@CryptographyTip
Cryptography Tip
8 months
A pseudograndom number generator (PRNG) may have excellent statistical properties but not be a cryptographically secure pseudorandom number generator (CSPRNG) suitable for use in cryptography.
0
0
11
@CryptographyTip
Cryptography Tip
8 months
In the Enigma encryption machine, the signal for a typed letter would go through a chain of scrambling rotors: A, B, C, and D. Then through a reflector R, then back through the rotors in the opposite order. Then the rotors would change positions, like an odometer.
Tweet media one
1
0
12
@CryptographyTip
Cryptography Tip
7 months
DES encryption symmetry: If you flip the bits in the message and the key, you flip the bits in the ciphertext.
Tweet media one
0
0
8
@CryptographyTip
Cryptography Tip
7 months
This account now has over a thousand followers. Thanks everyone for following.
0
0
10
@CryptographyTip
Cryptography Tip
9 months
X RF SXIIXKW XK IYZ UXINYZK HT IYZ CXIICZ YHJSZ RI FZGTXZCG, HJQ SZNHKG TRQF BYXNY XS NJI HTT EV IYZ QXGWZ RKG R MJRQIZQ-FXCZ RNQHSS IYZ TXZCGS TQHF HJQ YHFZ LCRNZ, BYZQZ VHJ RQZ. X RF BQXIXKW R EHHU. XK XI X RF SLZRUXKW IH VHJ. EJI X RF RCSH SLZRUXKW IH IYZ BHQCG.
7
4
9
@CryptographyTip
Cryptography Tip
7 months
Steganography hides a message inside another message, such as by tweaking pixels in an image. From the Greek work steganos meaning 'covered.'
0
2
9
@CryptographyTip
Cryptography Tip
8 months
SHA-2 is subject to length extension attacks but SHA-3 is not.
0
1
9
@CryptographyTip
Cryptography Tip
8 months
David Kahn's The Codebreakers is the classic book on classic cryptography. Modern cryptography is radically different than classic cryptography.
Tweet media one
1
4
9
@CryptographyTip
Cryptography Tip
7 months
In retrospect, the lack of encryption in the early internet seems naive. The internet unleashed a lot of creativity, for good and for bad, and the latter showed the need for encryption.
0
3
9
@CryptographyTip
Cryptography Tip
8 months
ASCII armor
Tweet media one
0
0
9
@CryptographyTip
Cryptography Tip
8 months
Straddling checkerboard encryption
Tweet media one
0
1
8
@CryptographyTip
Cryptography Tip
8 months
The most commonly used public key encryption systems depend on the difficulty of factoring integers or the difficulty of finding discrete logarithms.
0
0
6
@CryptographyTip
Cryptography Tip
8 months
NSA Military Cryptanalytics (1977)
1
1
7
@CryptographyTip
Cryptography Tip
7 months
A beginner’s guide to constant-time cryptography
0
3
7
@CryptographyTip
Cryptography Tip
9 months
AES (Advanced Encryption Standard) is a member of the Rijndael family of block ciphers. AES is very popular, but there are comparable block ciphers in use, such as the Camellia cipher developed in Japan.
0
0
7
@CryptographyTip
Cryptography Tip
8 months
David Kahn (1930 – 2024)
0
2
6
@CryptographyTip
Cryptography Tip
8 months
From her patent:
Tweet media one
0
1
6
@CryptographyTip
Cryptography Tip
7 months
The PQC Migration Handbook Guidelines for migrating to post-quantum cryptography [pdf]
0
1
5
@CryptographyTip
Cryptography Tip
8 months
The diffusion property of a symmetric cipher says that changing one bit of the key should change about half the bits in the output.
0
0
6
@CryptographyTip
Cryptography Tip
7 months
What are the differences between .pem, .csr, .key, .crt and other such file extensions?
0
1
6
@CryptographyTip
Cryptography Tip
8 months
“Cryptography is a mixture of mathematics and muddle, and without the muddle the mathematics can be used against you.” — Ian Cassels
0
2
6
@CryptographyTip
Cryptography Tip
6 months
The Twofish Encryption Algorithm
Tweet media one
0
1
7
@CryptographyTip
Cryptography Tip
8 months
Probability of secure hash collisions
Tweet media one
2
1
6
@CryptographyTip
Cryptography Tip
8 months
A self-study course in block-cipher cryptanalysis [pdf]
0
4
6
@CryptographyTip
Cryptography Tip
6 months
Coding theory is not cryptography. Coding theory is concerned with non-secret ways of encoding data, such as error correcting codes.
0
0
6
@CryptographyTip
Cryptography Tip
7 months
Preimage resistance is the property of a secure hash function that means it is impractical to start from a random hash value and produce a file with that hash value.
0
0
5
@CryptographyTip
Cryptography Tip
8 months
You won’t find much about cryptocurrency here, unless it’s about the cryptography it uses. For example, Monero uses some interesting cryptography, and I may post about that.
2
1
5
@CryptographyTip
Cryptography Tip
7 months
Stream ciphers are essentially a one-time pad, except the pad is generated using a secure random number generator (CSPRNG).
0
2
5
@CryptographyTip
Cryptography Tip
8 months
With DES encryption, if you flip all the bits in your message and all the bits in your key, you flip all the bits in the cipher text.
Tweet media one
0
1
5
@CryptographyTip
Cryptography Tip
8 months
Module-Lattice-based Key-Encapsulation Mechanism Standard [pdf]
0
0
5
@CryptographyTip
Cryptography Tip
7 months
In practice public key cryptography is not used to encrypt messages per se but rather to exchange symmetric encryption keys that are then used to encrypt messages.
0
1
4
@CryptographyTip
Cryptography Tip
8 months
Example of memorizing a 256-bit private key
Tweet media one
0
1
3
@CryptographyTip
Cryptography Tip
7 months
Microsoft announced it will end support for RSA keys with less than 2048 bits.
1
0
4
@CryptographyTip
Cryptography Tip
7 months
Sneakers was a 1992 movie about encryption.
Tweet media one
1
0
4
@CryptographyTip
Cryptography Tip
7 months
Cryptanalysis challenge The following message has been encrypted using a Playfair cipher
1
0
4
@CryptographyTip
Cryptography Tip
9 months
The discrete logarithm problem would be tractable given a large-scale quantum computer. So schemes like Diffie-Hellman key exchange would be broken if and when quantum computing becomes practical.
0
1
3
@CryptographyTip
Cryptography Tip
8 months
When I start to write “crypto” I expand it to say “cryptography” unless it’s clear that I don’t mean “cryptocurrency.”
5
1
4
@CryptographyTip
Cryptography Tip
9 months
In addition to pure cryptography topics, this account will post on related infrastructure. For example, binary-to-text formats used with encryption.
1
1
4
@CryptographyTip
Cryptography Tip
7 months
The ability to factor large numbers efficiently would be sufficient to break RSA encryption, but it may not be necessary.
1
0
4
@CryptographyTip
Cryptography Tip
6 months
STRONG encryption may not be sufficient for legal protection. Some laws require STANDARD encryption.
0
1
3
@CryptographyTip
Cryptography Tip
8 months
Bayesian methods at Bletchley Park
Tweet media one
0
2
3
@CryptographyTip
Cryptography Tip
8 months
Going back through the rotors in the opposite order gave the encryption system a group symmetry that Polish mathematicians were able to exploit to break the encryption.
1
0
3
@CryptographyTip
Cryptography Tip
7 months
There is a variation of RSA encryption that is provably as hard to break as factoring, i.e. if you can break this encryption you can factor large numbers. But AFAIK it has never been widely used.
0
0
3
@CryptographyTip
Cryptography Tip
7 months
TOQATCLFSPDIOMKCQNROCBSOALOTPDROGSHCFSLBTCTCSPZTIETLCQANOICROMUPTLCTITPGKSIEDPMCGRNKSPWHSEOSTRTLLSMNOCTCLRRULADCSNCQEPUTZHKONESOMCTLRLMAEMSAHOSKWFPDHTXLAEKSSIWPXSAEKSSILAHLFSTHRONAOCTLFIEKXSFKZRHSTLRTCTBXXRTCIXCIMLKLHBSHPAATCDSFCIHKCRATLAHBDAFSINRLRHPEARHSTLEIEMSEDNRLSN
0
0
3
@CryptographyTip
Cryptography Tip
7 months
Generate 16 random bytes and display the result in hexidecimal: openssl rand -hex 16
0
1
3
@CryptographyTip
Cryptography Tip
7 months
Should we MAC-then-encrypt or encrypt-then-MAC?
0
1
2
@CryptographyTip
Cryptography Tip
8 months
OK, I know what SHA and DES are, but what is IGN?
@NoContextHumans
Out of Context Human Race
9 months
Tweet media one
878
27K
428K
0
0
2
@CryptographyTip
Cryptography Tip
8 months
Source: Polish Mathematicians Finding Patterns in Enigma Messages by Chris Christensen Mathematics Magazine, Oct., 2007, Vol. 80, No. 4, pp. 247-273
1
0
2
@CryptographyTip
Cryptography Tip
6 months
Native American Code Talkers
Tweet media one
0
0
2