HKDF has poorly-understood subtleties. Let’s explore them in detail.| Dhole Moments
There seems to be a lot of interest among software developers in the various cryptographic building blocks (block ciphers, hash functions, etc.), and more specifically how they stack up against eac…| Dhole Moments
When it comes to AES-GCM, I am not a fan. Most of my gripes fall into one of two categories: Gripes with AES itself Gripes with AES-GCM as a construction However, one of my gripes technically belon…| Dhole Moments
Canonicalization Attacks occur when a protocol that feeds data into a hash function used in a Message Authentication Code (MAC) or Digital Signature calculation fails to ensure some property that&#…| Dhole Moments
If you’ve never heard of NIST SP 800-108 before, or NIST Special Publications in general, here’s a quick primer: Special Publications are a type of publication issued by NIST. Specifica…| Semantically Secure