-
June 1st, 2025, 10:32 PM
#1
Junior Member
Any cryptographers out there willing to do some cryptanalysis on my data protection?
Here's a link to the README.md that has the high level design.
Are there weaknesses in the scheme? For example, if the user got enough data after one bad guess to brute-force guesses on their own afterwards, the scheme would be useless. It defends vs that attack by hashing the user ID, device ID, and pin to a point on the curve before blinding the point and sending it to the distributed pseudo-random function servers.
Similar Threads
-
By BlackHatHunter in forum Web Development
Replies: 6
Last Post: September 16th, 2005, 05:18 PM
-
By OkIDaN in forum Cryptography, Steganography, etc.
Replies: 2
Last Post: June 20th, 2004, 09:18 PM
-
By DragonK in forum Cryptography, Steganography, etc.
Replies: 8
Last Post: April 9th, 2003, 03:00 PM
-
By WiSe-OnE in forum AntiOnline's General Chit Chat
Replies: 40
Last Post: June 7th, 2002, 03:49 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|