sbug · @sbug
65 followers · 347 posts · Server social.sinnesro.se

When the crypto mining rig catches fire - “hashes to ashes, rust to dust” 😏

#crypto #bitcoin #hash #fun #funny #hashing #joke

Last updated 1 year ago

ITSEC News · @itsecbot
1292 followers · 35180 posts · Server schleuss.online
The Hacker News · @hackernews_bot
2437 followers · 1672 posts · Server social.platypush.tech

Referenced link: specopssoft.com/blog/best-pass
Discuss on discu.eu/q/https://specopssoft

Originally posted by The Hacker News / @TheHackersNews: nitter.platypush.tech/specopss

RT by @TheHackersNews: How long does it take modern attackers to brute-force guess user passwords with the help of newer hardware?

See how long it will take a criminal to brute force guess passwords hashed with MD5.: specopssoft.com/blog/best-pass

#cyberattack #cybersecurity #passwords #hashing

Last updated 2 years ago

Robert Mooney · @vermelho
3 followers · 356 posts · Server babka.social
Mohammad Hajiaghayi · @MTHajiaghayi
29 followers · 29 posts · Server mathstodon.xyz

Now (7pm ET Wed) watch youtu.be/9x8rcQYs1so (FEEL FREE TO SUBSCRIBE TO YOUTUBE
@hajiaghayi
FOR FUTURE LESSONS) Lesson 16: Introduction to Algorithms by Mohammad Hajiaghayi:

#resolution #collision #hashing #universal #orderselection

Last updated 2 years ago

mkj · @mkj
45 followers · 632 posts · Server social.linux.pizza

@kubikpixel @Stark9837 doesn't get better because you use a library someone else has written to implement the .

Salted slow for passwords, yes. (Again, with the exception of where passwords really need to be stored securely in a reversible fashion.) But then you still aren't doing , you're doing , which was the point of my previous post.

#encrypting #passwords #encryption #hashing #passwordmanagers

Last updated 2 years ago

mkj · @mkj
45 followers · 632 posts · Server social.linux.pizza

@Stark9837 Passwords should never be stored encrypted. (The one exception being .) There is no legitimate reason to store passwords encrypted. Any service which encrypts, rather than hashes, should be treated as highly suspect.

I know a lot of people don't know the difference, but there is a HUGE one.

is by definition reversible.

is irreversible (if done right).

That said, I absolutely agree that every should be random and unique.

#passwordmanagers #encryption #passwords #hashing #password

Last updated 2 years ago

tkteo · @tkteo
39 followers · 1219 posts · Server infosec.exchange

Paper 2023/331 A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm

Abstract

This paper describes a vulnerability in several implementations of the Secure Hash Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been present since the final-round update of Keccak was submitted to the National Institute of Standards and Technology (NIST) SHA-3 hash function competition in January 2011, and is present in the eXtended Keccak Code Package (XKCP) of the Keccak team. It affects all software projects that have integrated this code, such as the scripting languages Python and PHP Hypertext Preprocessor (PHP). The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (without any restrictions on values to be XORed and even far beyond the location of the original buffer), thereby making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective. First, we provide Python and PHP scripts that cause segmentation faults when vulnerable versions of the interpreters are used. Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. The vulnerability applies to all hash value sizes, and all 64-bit Windows, Linux, and macOS operating systems, and may also impact cryptographic algorithms that require SHA-3 or its variants, such as the Edwards-curve Digital Signature Algorithm (EdDSA) when the Edwards448 curve is used. We introduce the Init-Update-Final Test (IUFT) to detect this vulnerability in implementations.

eprint.iacr.org/2023/331

#cryptography #encryption #sha #sha3 #cybersecurity #hash #hashing #algorithm #algorithms #nist #nistcybersecurityframework

Last updated 2 years ago

Jess For A Laugh · @meeple
24 followers · 13 posts · Server mstdn.games

@campuscodi The need for these confuses me because in 2023 I have a hard time imagining that fitting AES and SHA2 into connection capable microcontrollers on a power budget is difficult. What is my imagination missing?

#nist #ascon #iot #cryptography #hashing

Last updated 2 years ago

Aisuko · @aisuko
1 followers · 38 posts · Server hostux.social

#hashing #mitopencourseware

Last updated 2 years ago

Marco Zocca · @ocramz
121 followers · 84 posts · Server sigmoid.social

when the world was young and people lovingly engineered their features..

("An industrial-strength audio search algorithm", Wang 2003)

ee.columbia.edu/~dpwe/papers/W

#machinelearning #music #audio #search #hashing #informationretrieval

Last updated 2 years ago

aegilops :github::microsoft: · @aegilops
80 followers · 282 posts · Server fosstodon.org
Harry · @harry
0 followers · 14 posts · Server techhub.social
Wepwawet ☑️ · @wepwawet
59 followers · 1219 posts · Server mastodon.social
Blain Smith · @blainsmith
301 followers · 703 posts · Server fosstodon.org

Introduction to Locality-Sensitive Hashing tylerneylon.com/a/lsh1/

#hashing

Last updated 2 years ago

Marcus Botacin · @MarcusBotacin
31 followers · 31 posts · Server infosec.exchange

[Paper of the day][#18] How do you triage ? How do you tell two files are similar? An interesting static analysis approach is to use tools, such as and . However, to be effective, their application can't be straightforward, but should follow a protocol. In this paper, we discuss how to efficiently apply these functions for malware family classification. We show that hashing only the instruction disassembly has a greater impact than hashing the entire file. Check this result and much more.

Academic paper: sciencedirect.com/science/arti
Archived version: secret.inf.ufpr.br/papers/marc

#malware #similarity #hashing #ssdeep #sdhash

Last updated 2 years ago

ITSEC News · @itsecbot
943 followers · 32667 posts · Server schleuss.online

Serious Security: MD5 considered harmful – to the tune of $600,000 - It's not just the hashing, by the way. It's the salting and the stretching, too! nakedsecurity.sophos.com/2022/ &order

#md5 #edf #cnil #pbkdf2 #hashing #law #cryptography

Last updated 2 years ago