Một nhà phát triển đã xây dựng "mini-forge", dịch vụ tạo khóa (KGS) hiệu suất cao bằng Go để tìm hiểu hệ thống phân tán. Dự án tập trung vào tạo khóa duy nhất, không trùng lặp ở quy mô lớn, sử dụng bộ nhớ đệm trong RAM và cơ chế khóa giao dịch. Tác giả tìm kiếm phản hồi về kiến trúc và mã nguồn.

#HệThốngPhânTán #GoLang #PhátTriểnBackend #KeyGeneration #DistributedSystems #Go #BackendDev #MiniForge #SideProject

https://www.reddit.com/r/SideProject/comments/1nytftl/i_built_miniforge_a_highperfor

Oops, seems that when I editied the post to add an additional tag, the poll itself got deleted... Fixing that: Which type of GPG key would you recommend to someone starting out with GPG for the first time? #GPG #KeyGeneration #Privacy #MailEncryption #FileEncryption #SeekingAdvice #SetupQuestions #Poll #AskFedi
RSA Key
50%
ECC Key
50%
Both types of key
0%
Poll ended at .
Another quick & dirty poll, this time on generating a GPG key: Which type of GPG key would you recommend to someone starting out with GPG for the first time? Voting & additional feedback are optional, but I would like to know as I'm wanting to set up a GPG key for my email + to encrypt files before they get uploaded to the cloud. #GPG #KeyGeneration #Privacy #MailEncryption #FileEncryption #SeekingAdvice #SetupQuestions #Poll #AskFedi
Then came Pourbemany & Zhu's "Cross Body Signal Pairing (CBSP): A #KeyGeneration Protocol for Pairing #Wearable Devices with Different Modalities", implementing Cross Body Signal Pairing for wearable devices based on respiratory and cardiac signals. (https://www.acsac.org/2023/program/final/s185.html) 3/5
ACSAC2023 Program – powered by OpenConf

NTRUEncrypt proof that there are plenty of keys

In NTRU algorithm one is supposed generate a vector which is invertible as a polynomial in both $(Z/pZ[x])/(x^n-1)$ and $(Z/qZ[x])/(x^n-1)$. But is there a mathematical lower bound to the probabili...

Cryptography Stack Exchange
RSA public keys such that encryption is identity

In this question, we restrict to RSA public keys $(n,e)$ such that $n$ and $e$ are odd, $3\le e<e_\max$, $e<n$ Note: For some old Windows API, $e_\max=2^{32}$. In FIPS 186-4, $e_\max=2^{256}$.

Cryptography Stack Exchange
Key management: Can I delete private key in asymmetric encryption?

If using asymmetric encryption, such as ES256, is there a reason why a private key could not be discarded after signing some data? For example with a JWT, or a file hash use for audit at a later da...

Information Security Stack Exchange
Not that it's used for the same things, but recently I've worked mostly outside the GnuPG toolchain and more with PKCS#11 interfaces.

A toolchain that has so far worked pretty well is the one from Yubico.

An example generating a curve on-card in just a couple of seconds:

$ yubico-piv-tool -s 9a -A ECCP256 -a generate > public.pem $ yubico-piv-tool -a verify-pin -a selfsign-certificate -s 9a -S "/CN=SSH key/" -i public.pem -o cert.pem $ yubico-piv-tool -a import-certificate -s 9a -i cert.pem

The following command prints the fingerprint and confirms the algorithm:

$ yubico-piv-tool -a status [...] Slot 9a: Algorithm: ECCP256 [...] Fingerprint: [...] [...]

At this point the card is ready for use with ssh and the pubkey can be extracted through "ssh-add -L" as usual.

#yubikey #keygeneration #oncard #gpg