Timeline for Designing a cryptographic file-sharing protocol
Current License: CC BY-SA 3.0
15 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Mar 17, 2017 at 13:14 | history | edited | CommunityBot | replaced http://security.stackexchange.com/ with https://security.stackexchange.com/ | |
| Aug 28, 2013 at 16:14 | vote | accept | ro_m | ||
| Aug 28, 2013 at 16:14 | comment | added | ro_m | no, I am not a cryptographer, but a very paraoid and very interested individual. unfortunatelly my original post has been heavily censored by some mod (I think) - originaly there was some background information. also: why do I have to be a cryptographer for wanting to implement cryptography? and further... in your eyes, how does one become a cryptographer, so far I haven't found any cryptography bachelor or master teaching me how to implement sth, only theoretical mathematics. | |
| Aug 23, 2013 at 1:18 | comment | added | atk | Are you a cryptographer working to earn your degree in crypto? Have you read any books about common crypto protocol errors? If not, then you really shouldn't be attempting this... it's just way too hard to get right, and literally multiple books have been written on what goes wrong. It's waaaaay too broad for stack exchange | |
| Aug 22, 2013 at 23:36 | answer | added | nolies | timeline score: 0 | |
| Aug 22, 2013 at 9:45 | history | edited | AviD♦ | CC BY-SA 3.0 | deleted 2 characters in body; edited title |
| Aug 22, 2013 at 9:32 | history | edited | AviD♦ | CC BY-SA 3.0 | cleaned up grammar and rambling |
| Aug 22, 2013 at 6:34 | comment | added | Stolas | A university professor in Math once told me, "doing cryptography right is not doing it yourself". He meant you always make a mistake, and crypto works as a LOT of mathematicians, crypto-analysts and security researchers have checked the work. Great to try if you are learning though. | |
| Aug 22, 2013 at 5:26 | comment | added | user22208 | You may find the cryptography Stack Exchange site useful. | |
| Aug 22, 2013 at 3:11 | history | tweeted | twitter.com/#!/StackSecurity/status/370382785162530816 | ||
| Aug 22, 2013 at 2:44 | answer | added | Thomas Pornin | timeline score: 25 | |
| Aug 22, 2013 at 0:40 | comment | added | Chris S | Aerovistae: bcrypt is for password hashing/key derivation, not encryption. And in any case PBKDF2 (which he is using for key derivation) is perfectly fine. | |
| Aug 21, 2013 at 22:48 | review | First posts | |||
| Aug 21, 2013 at 22:50 | |||||
| Aug 21, 2013 at 22:37 | comment | added | temporary_user_name | bcrypt bcrypt bcrypt bcrypt bcrypt | |
| Aug 21, 2013 at 22:29 | history | asked | ro_m | CC BY-SA 3.0 |