Archive for March, 2013

Dos and Don’ts (but mostly Don’ts) for Secure Transport Protocol Designers

Everybody tells you: don’t invent your own crypto. Nevertheless, you fell the need to design a protocol for your own, a passion. Why? Because it’s fun, and because by failing you will learn a lot. And you will never forget the lesson. So this time I encourage you to invent your own secure transport protocol, […]

, , , , ,

Leave a comment

Comparison between HC Modes and a Stream Cipher based on a Hash function Chain

In my first post about HC modes I presented six block cipher modes of operation that provide forward secrecy right at the block level. These schemes rely on a ideal hash function to provide forward secrecy and privacy (this last property also requires an ideal block cipher). It turns out that this is not the […]

Leave a comment