by nyan4 on 1/15/16, 8:33 PM with 38 comments
by timmclean on 1/15/16, 11:33 PM
[1] https://github.com/FedericoCeratto/owefs/blob/master/pycrypt...
by Scaevolus on 1/15/16, 11:54 PM
> Some files may need to be written while the device is locked. A good example of this is a mail attachment downloading in the background. This behavior is achieved by using asymmetric elliptic curve cryptography (ECDH over Curve25519). The usual per-file key is protected by a key derived using One-Pass Diffie-Hellman Key Agreement as described in NIST SP 800-56A.
> The ephemeral public key for the agreement is stored alongside the wrapped per-file key. The KDF is Concatenation Key Derivation Function (Approved Alternative 1) as described in 5.8.1 of NIST SP 800-56A. AlgorithmID is omitted. PartyUInfo and PartyVInfo are the ephemeral and static public keys, respectively. SHA-256 is used as the hashing function. As soon as the file is closed, the per-file key is wiped from memory. To open the file again, the shared secret is re-created using the Protected Unless Open class’s private key and the file’s ephemeral public key; its hash is used to unwrap the per-file key, which is then used to decrypt the file.
by detaro on 1/15/16, 10:49 PM
by ziedaniel1 on 1/15/16, 11:25 PM
by ipsin on 1/15/16, 11:22 PM
The two applications that caught my eye were "home security cameras" (which the docs allude to) and secure telemetry.
You have a device (say, a drone) that logs telemetry data, but if the drone is lost, the data cannot be recovered by a third party without the private key.
by vive-la-liberte on 1/16/16, 12:10 AM
by gkya on 1/16/16, 12:18 AM
by doomrobo on 1/15/16, 10:58 PM
by johnhenry on 1/16/16, 1:24 AM
by res0nat0r on 1/15/16, 11:03 PM
http://www.techrepublic.com/blog/linux-and-open-source/creat...
by ausjke on 1/15/16, 11:33 PM
why not use the asymmetric keypair to guard an AES key, and use AES to do the encryption instead, something like what https is doing.
by zhenjl on 1/15/16, 11:41 PM