Skip to content

Commit 9f89e31

Browse files
committed
added some good talks and notes
1 parent b7cacc7 commit 9f89e31

File tree

6 files changed

+49
-1
lines changed

6 files changed

+49
-1
lines changed

.gitignore

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +0,0 @@
1-
parity/

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@
99

1010
*Deeper Focus*
1111
* [Libp2p](./rust-libp2p)
12+
* [Sponge Constructions](./sponge)
13+
* [End to End Encryption](./e2e)
14+
* [Metadata Resistance](./metadata-resistance)
1215
* [Peer Discovery](./peer-discovery)
1316
* [Incentive Models](./incentives.md)
1417
* [QUIC](./QUIC.md)

e2e/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# End-To-End Encryption
2+
3+
cabal: https://cabal.chat/
4+
5+
signal (anonymous credential scheme and e2e encryption): https://www.signal.org/docs/ ([recent talk](https://peertube.co.uk/videos/watch/12be5396-2a25-4ec8-a92a-674b1cb6b270))
6+
7+
https://github.com/w3f/messaging

metadata-resistance/README.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
# Metadata Resistance
2+
3+
* https://github.com/w3f/messaging
4+
5+
## mixnets
6+
7+
*[Mixnet Academy by Katzenpost](https://katzenpost.mixnetworks.org/docs/mixnet_academy/syllabus.html)*
8+
* [katzenpost/docs](https://github.com/katzenpost/docs)
9+
* [uprising](https://github.com/katzenpost/mixnet_uprising)
10+
11+
## metdata-resistant dhts
12+
13+
* [hashmatter/pm](https://github.com/hashmatter/pm)
14+
* [hashmatter](https://github.com/hashmatter)

newsletter/mpc/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
[HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication](https://eprint.iacr.org/2019/883.pdf)

sponge/README.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# strobe
2+
> [Fed Up Getting Shattered and Log Jammed? A New Generation of Crypto Is Coming](https://www.youtube.com/watch?v=bTGLO4obxco)
3+
4+
Recent paper by JP Aumasson discusses retroactively reducing the round requirements for block ciphers, [Too Much Crypto](https://eprint.iacr.org/2019/1492)
5+
6+
Team Keccak released a [paper on Sponge Constructions](https://keccak.team/sponge_duplex.html), which consist of a mode of operation, based on a fixed-length permutation (or transformation) and on a padding rule, which builds a function mapping variable-length input to variable-length output...It operates on a finite state by iteratively applying the inner permutation to it, interleaved with the entry of input or the retrieval of output.
7+
8+
Applying the sponge construction with a random permutation results in a so-called random sponge. It turns out that a random sponge is as strong as a random oracle, except for the effects induced by the finite memory. Random sponges are thus well suited to replace random oracles for expressing security claims.
9+
10+
Additionally, the sponge construction and its sister construction, called the duplex construction, can be used to implement a wide spectrum of symmetric cryptography functions. This includes hashing, reseedable pseudo random bit sequence generation, key derivation, encryption, message authentication code (MAC) computation and authenticated encryption. The fundamental cryptographic primitive underlying all this is a fixed-length permutation. These permutation-based modes form efficient alternatives for the current block-cipher dominated cryptographic practice. On top of its conceptual elegance, a permutation has the advantages that it does not have a key schedule and that its inverse does not need to be implemented or efficient.
11+
12+
## BLINKER
13+
14+
[Beyond Modes: Building a Secure Record Protocol froma Cryptographic Sponge Permutation](https://eprint.iacr.org/2013/772.pdf) introduces BLINKER, a lightweight cryptographic suite and record protocol built from a single permutation.
15+
16+
> * the resulting record protocol is secure against a two-channel synchronization attack while also having a significantly smaller implementation footprint*
17+
18+
examines the SpongeWrap authenticated encryption mode and expand its padding mechanism to offer explicit do-main separation and enhanced security for our specific requirements: shared secret half-duplex keying, encryption, and a MAC-and-continue mode.
19+
20+
## <a href= "https://strobe.sourceforge.io/">Strobe</a>
21+
22+
## <a href = "http://noiseprotocol.org/">Noise</a>
23+
24+
## <a href = "https://cryptologie.net/article/408/noisestrobedisco/">Noise + Strobe = Disco</a>

0 commit comments

Comments
 (0)