PBKDF2
ed25519
PBKDF2 | ed25519 | |
---|---|---|
- | 17 | |
1 | 21 | |
- | - | |
0.0 | 4.5 | |
over 9 years ago | 11 months ago | |
Haskell | C | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PBKDF2
We haven't tracked posts mentioning PBKDF2 yet.
Tracking mentions began in Dec 2020.
ed25519
-
"YOLO" is not a valid hash construction
Software engineers should be made aware of such pitfalls, but I don't think a whole course is necessary or useful. It's very easy to build encryption that you can't crack, especially because the "types of attacks" is a truly endless font.
It's probably more useful to have a module within a course to discuss the current state of the art and learning some history about how the methods were chosen (e.g. NIST's AES, SHA2/3, and PQC open processes. I think making it very obvious that there are extremely good, quality, free tools out there would reduce the likelihood of someone DIYing some crap.
That said, I once spec'd using Ed25519 asymmetric signatures for webhooks sent out to customers, and later on one of our Elixir developers was complaining that the throughput was garbage. I was confused because https://ed25519.cr.yp.to/ boasts signing rates of ~27k/sec/core on very old hardware. Turns out they were using some "pure Elixir" library which had shit (over 1000x worse) performance. There wasn't any real surface area for attacks here, but there are plenty of devs who will blindly search package-manager-of-choice for an otherwise good encryption and get screwed. Not sure who blame in that scenario.
-
NIST Announces Post-Quantum Cryptography Standards
From https://ed25519.cr.yp.to/:
> High security level. This system has a 2^128 security target; breaking it has similar difficulty to breaking NIST P-256, RSA with ~3000-bit keys, strong 128-bit block ciphers, etc.
-
Joining ChatCraft.org
The first step was to generate an ed25519 - ssh key for my Github account.
-
GitLab: Authentication and Signing with SSH Keys
From the GitLab documentation, ED25519 keys are recommended, as they are more secure and performant than RSA keys, according to the book Practical Cryptography With Go.
-
The Algorand Community Study Group just had our first meeting yesterday. We read Chapter 15 Elliptic Curve Cryptography in A Graduate Course in Applied Cryptography (Boneh, Shoup). Are you interested in learning applied cryptography? Which topic should we cover next? Come join us!
Correction regarding Ed25519: The Edwards Digital Signature Algorithm (EdDSA) https://ed25519.cr.yp.to/ was developed by a team including Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. The first paper came out in 2011.
-
[Sysadmin] Quel est le niveau de sécurité de la clé ed25519 par rapport à la clé ecdsa ou rsa pour les clés ssh ?
Les concepteurs de l'algorithme estimation :
- Have you been hacked? Tell your story
-
How SHA-256 Works Step-By-Step
Ed25519
- Обзор Aptos SDK
- Руководство по Созданию подписанной транзакции
What are some alternatives?
scrypt - Haskell bindings to Colin Percival's scrypt implementation.
secp256k1 - Haskell bindings for secp256k1 library
blake3 - official implementations of the BLAKE3 cryptographic hash function
cryptohash-sha256 - Fast, pure and practical SHA-256 implementation
intel-aes - Haskell package for efficient AES encryption, including Intel AES NI support
cipher-aes - DEPRECATED - use cryptonite - a comprehensive fast AES implementation for haskell that supports aesni and advanced cryptographic modes.
servant-hmac-auth - Servant authentication with HMAC
cipher-aes128 - Based on cipher-aes, but using a crypto-api interface and providing resulting IVs for each mode
bcrypt - Haskell bindings for bcrypt
spake2 - SPAKE2 key exchange protocol for Haskell
lol - Λ ⚬ λ: Functional Lattice Cryptography