Ian's Blog - CryptographyOh god... how did this get here? I am not good with computer.tag:joshianlindsay.com,2005:63187d1266ad21283196e7e2f3ed692f/CryptographyTextpattern2023-12-09T10:30:40ZIanhttp://joshianlindsay.com/Ian2016-09-30T21:56:47Z2018-11-28T03:18:10ZThe state of my exposure to cryptographic librariestag:joshianlindsay.com,2016-09-29:63187d1266ad21283196e7e2f3ed692f/cb4ea2b1e0edbdbbc80286f253dc6a0a
This is a quick overview of the cryptographic libraries I have deep experience with.]]>
Ian2016-09-25T04:25:21Z2018-11-28T03:19:34ZIntro to DTLStag:joshianlindsay.com,2016-09-25:63187d1266ad21283196e7e2f3ed692f/d3df5c33b5d36a05a00365ee0ad730a2
This post is aimed at technical readers who know what TLS is used for, but may know nothing about its operation. It is also an attempt to explain why DTLS was developed, and how it applies to IoT.]]>
Ian2016-09-25T04:10:42Z2016-09-25T04:13:16ZSymmetrical asymmetriestag:joshianlindsay.com,2016-09-25:63187d1266ad21283196e7e2f3ed692f/970843730ab2f9ddcece99ca0a210904
This is one of a series of posts I will be writing that cover various security-related algorithms. This post will be a brief survey of the two major classes of reversible encryption algorithms.]]>
Ian2016-05-02T04:32:02Z2016-05-05T07:29:19ZHow will quantum computers impact cryptography?tag:joshianlindsay.com,2016-05-02:63187d1266ad21283196e7e2f3ed692f/3aaa7d8431dac3332e5ec45fc4502fb7
This post is an effort to short-circuit some FUD regarding the susceptibility of different classes of cryptographic algorithms to attacks made possible by quantum computers.]]>
Ian2013-04-03T00:21:04Z2014-11-26T18:11:12ZBuilding the CAVP Test Apparatustag:joshianlindsay.com,2013-03-08:63187d1266ad21283196e7e2f3ed692f/10d2d08784bc167d509aa9dcaaa553e0
The last entry gave a quick practical overview for building a FIPS capable OpenSSL. This one will explain how to compile a program against it.
The particular program I will be compiling is one that I wrote to execute a set of test-vectors issued by NIST's CAVP.]]>
Ian2013-03-22T15:59:15Z2018-11-28T03:37:35ZBury it under the noise floor (Steganography)tag:joshianlindsay.com,2013-03-21:63187d1266ad21283196e7e2f3ed692f/a4dbcdc0886c829a5a7944cf5eeae7b6
Here is discussed a PHP program to hide encrypted messages and files inside of images without significantly changing the way the image looks. This is meant to be an instructional write-up to touch on some common ideas and mechanisms in cryptography.]]>
Ian2013-03-08T15:24:21Z2018-11-28T03:39:02ZBuilding a FIPS capable OpenSSL (Gentoo)tag:joshianlindsay.com,2013-02-10:63187d1266ad21283196e7e2f3ed692f/08d4279280db3cab323f4623d22fc2f4
This is an anecdotal account of building OpenSSL with the FIPS container module on Gentoo. However, these instructions should be applicable to any other distribution with minimal translation effort. The result will be a static OpenSSL build suitable for inclusion into secure application software.]]>