1
0
mirror of https://github.com/biergaizi/codecrypt synced 2024-07-05 09:51:45 +00:00
Commit Graph

22 Commits

Author SHA1 Message Date
Mirek Kratochvil
760bcdc7f7 new encryption algos with xsynd/chacha20 2014-04-09 16:14:31 +02:00
Mirek Kratochvil
5c739804fd algos_enc: macro-squash algorighm definitions 2014-04-09 15:29:34 +02:00
Mirek Kratochvil
37d9c9a98e algos_enc: make timing&sidechannel attacks harder
There was possible timing information leaking from failed decryptions,
new code makes the whole thing fail in almost the same time in all
cases.
2014-04-05 13:04:29 +02:00
Mirek Kratochvil
fd489ae69f generator: remove rc4 usage, some cleaning 2014-04-05 11:36:50 +02:00
Mirek Kratochvil
e687629323 sc: stream cipher abstraction applied to arcfour
A minor bug was discovered in padding of short message signatures. If is
silently fixed, causing some (very minor) incompatibility of signatures
with previous versions.
2014-03-19 09:30:59 +01:00
Mirek Kratochvil
594e3c0ebc algos_enc: clarify padding checks 2013-10-06 09:18:08 +02:00
Mirek Kratochvil
3deffb0ebe build: crypto++ support is now optional
possibly also evading "traditional" hash functions. Cubehash is good.
2013-09-30 11:49:42 +02:00
Mirek Kratochvil
c65557724e algos_enc: new cubehash-based algorithms 2013-09-29 20:48:59 +02:00
Mirek Kratochvil
47ccc8dcf0 algos_enc: forgotten stdint include 2013-09-15 15:33:47 +02:00
Mirek Kratochvil
93dee89a4a algos_enc: do not collide with library min() macro 2013-09-15 15:09:01 +02:00
Mirek Kratochvil
66d7d84b13 fix CXXFLAGS="-Wall" warnings 2013-07-23 15:58:02 +02:00
Mirek Kratochvil
18449bdc8a arcfour: greatly increase discard parameters
Okay, this thing got public so it's time to make the RC4 rugged. Not
that I'd know about something that would break current implementation,
but it's nice to at least do the recommended discard correctly.

We'll probably be adding better symmetric ciphers anyway.

Note that this is an incompatible change (again). FMTSeq private keys
will need to be replaced. Existing signature validity doesn't change.
Encrypted messages will not be possible to decrypt.
2013-05-25 17:13:33 +02:00
Mirek Kratochvil
3f73ba54c4 algos_enc: use faster unranking for decryption 2013-05-17 15:16:42 +02:00
Mirek Kratochvil
63d51911f9 algos_enc: also pad beginning of the message
to avoid possible known plaintext attacks on the symmetric cipher when
beginning of the ciphertext is known (which is a common situation, e.g.
when sign+encrypting)
2013-05-03 14:26:00 +02:00
Mirek Kratochvil
1553c09d20 algos_enc: mceqd192 variant to match fmtseq192 2013-05-01 16:44:31 +02:00
Mirek Kratochvil
e19ba185b7 algos_enc: padding for hiding message length 2013-04-22 14:56:20 +02:00
Mirek Kratochvil
805df12176 algos_enc: works 2013-01-26 22:55:56 +01:00
Mirek Kratochvil
7a48eff37a algos_enc: f-o decryption 2013-01-18 11:38:37 +01:00
Mirek Kratochvil
0f2db0b62c algos_enc: work, fujisaki-okamoto encryption 2013-01-17 16:31:34 +01:00
Mirek Kratochvil
0b487201ff algos_enc: padding fix
I have indeed heard that everyone always fucks this up and therefore
kindof hoped to make an exception. Lasted two minutes.
2013-01-17 12:08:40 +01:00
Mirek Kratochvil
c345408cc8 algos_enc: padding 2013-01-17 12:05:01 +01:00
Mirek Kratochvil
5f49e3aa39 algorithms: encryption algs work 2013-01-16 22:30:03 +01:00