But you can't encrypt/decrypt with hash functions!
Name:
Anonymous2017-05-08 16:16
Oh yes I fucking can you anus-mouthed niggerian jew. I can trivially push this shit into counter mode and \(Ciphertext_{counter} = H(key \| nonce \| counter) \oplus Plaintext_{counter}\)
Jokes on you, I encrypt my data using little-endian.
Name:
Anonymous2017-05-11 12:31
oboNc ydr na daesihttub m'I yag .
Name:
Anonymous2017-05-12 5:12
>>1 When people talk "encrypting with a hash" they probably mean something retarded like reversing a hash back to source string(somehow avoiding collisions) not counter mode
>>18 hey FV I don't have time to cryptanalyze those functions right now but have you made sure that those are actually cryptographically strong? you know, you can use any RNG as a stream cipher but it will usually result in a shitty cipher (e.g. the attacker being able to recover key/RNG state/plaintext)
Name:
Anonymous2017-07-04 6:53
>>20 The only algorithm thats cryptographically strong is Crypteria. rcrypt has 64bit keyspace and is built for max speed
Name:
Anonymous2017-07-04 7:18
>>21 what do you mean by 'cryptographically strong'? large keyspace is required but it isn't enough. just like checking my dubs[/spoiler]
>>26 please elaborate (inb4 definition of stegano - I know what it is, but how is it related to FV's cipher being or not being strong?)
Name:
Lain2017-07-04 13:42
Crypteria as in Cyberia?
Name:
Anonymous2017-07-04 13:50
note:the algorithm is named after Krypteria(the symphonic metal band) not Crypteria(metal band).
Krypteria is a symphonic power metal/gothic metal band from Aachen, Germany.[1] Originating from a 2001 "pop musical theatre studio project" of the same name, the idea was to use different vocalists, though German-Korean singer Ji-In Cho assumed the role of lead vocalist in 2004. One self-titled studio album was released under this moniker (later edited and re-released as Liberatio).[2] The group went on hiatus in 2012 and later reformed as And Then She Came in 2016.[3][4]
Name:
Anonymous2017-07-04 13:50
>>28 It's possible that a weak cipher with strong stegano could be pretty secure
Name:
Anonymous2017-07-04 14:19
>>30 What does strong stegano even mean? If the enemy can't find the payload, why bother with crypto?
Name:
Anonymous2017-07-05 0:21
>>31 crypto can be used for both privacy and integrity, so stegano can provide the privacy but you still want integrity checks probably
Name:
Anonymous2017-07-05 0:34
encrypted data also tends to look random where plaintext doesn't, so you'd need to use similar data for camo
Name:
Anonymous2017-07-05 0:46
a permutation with words wolf decoys of doctor bad consider
Name:
Anonymous2017-07-05 0:52
has 3.6 million variations lol
Name:
Anonymous2017-07-05 1:03
don't forget your change blah keys to lol blah but
Name:
Anonymous2017-07-05 6:10
>>33 not really, modern stegano is usually about inserting any kind of data into a medium without the user being able to notice. strong stegano will do it in a way that isn't detectable through statistical analysis
Encryption is used only to guarantee privacy. If you care about integrity you would use a WC-style universal MAC or a hash in a mac mode (sha3(key||msg), kmac, hmac, etc).