Fwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSourceFwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
quic
None
/arch/msg/quic/rFXhoiWxw2QvOLFYKhy1epmL_-Y/
3278748
2052409
[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/A7nAAz6RbhAhKcxB7moWVQc1VCQ/
3278747
2052408
[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/dk-IC39Ey8OczrpKj9d4QbK1Bzw/
3278714
2052394
[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS
Duke Abbaddon
2023-02-09
pqc
None
/arch/msg/pqc/CsdKQ9T93WcnGnQ66lTQlr5avvo/
3274186
2050675
Re: [TLS] TLS Digest, Vol 223, Issue 7Re: [TLS] TLS Digest, Vol 223, Issue 7
Duke Abbaddon
2023-02-09
tls
None
/arch/msg/tls/IxEjNAboIQ2qxmmTkEJt2H7UZ1w/
3274182
2050674
Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Achim Kraus
2023-02-06
tls
None
/arch/msg/tls/f2Vtfry1Vg9zz0WCsPFTYK2hOiY/
3273015
2050160
[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Duke Abbaddon
2023-02-06
tls
None
/arch/msg/tls/QBPcA3b5yACurxidVbr2AF0RRdo/
3272992
2050160
[Pqc] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes[Pqc] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes
Duke Abbaddon
2023-02-05
pqc
None
/arch/msg/pqc/VqUnKVCpNKZ1AevvZUl_D3Y7EAE/
3272966
2050141
[TLS] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes[TLS] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes
Duke Abbaddon
2023-02-05
tls
None
/arch/msg/tls/b4BDiIrg50T6kj_Pho0j7FIXblM/
3272965
2050140
Re: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RSRe: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Christopher Wood
2023-01-29
tls
None
/arch/msg/tls/If8nyjv41FntIgztbCjBUAd9yCI/
3270316
2049121
[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/XhMK39eWrCECKwKuk7XxlGLZu40/
3270262
2049121
[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/gmjkOcHuI_r_uRcyBHHK1zOHYow/
3270140
2049064
[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
pqc
None
/arch/msg/pqc/hhXQ7U8-EctgZlaUXLHuZmpnYHg/
3270139
2049063
[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/bnIEoTlaViXuLNzny4Fkzf0Nlsg/
3269584
2048823
[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/JckXlssJHzofg_eqfzSWabwHVBk/
3269583
2048822
[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/k_YCvNQrvOlACpIvwNwiA1UEQvw/
3269488
2048768
[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/XxtTT40YRJ1z_oBkcOa9inDVzbk/
3269487
2048767
[Pqc] tls key sharing agreement : RS[Pqc] tls key sharing agreement : RS
Duke Abbaddon
2023-01-25
pqc
None
/arch/msg/pqc/dD6jzs3ggbiJiBHjuxfVnPrRt8Y/
3269476
2048760
[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S
Duke Abbaddon
2023-01-25
tls
None
/arch/msg/tls/B5hmH3zlpCmBmRqjXmzy-IEZXy8/
3269531
2048796
[Ntp] PSK Data Priorities (c)RS[Ntp] PSK Data Priorities (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/KjxyAIeFbWMOxvImy8IOx0uA0Rk/
3265846
2047269
[Ntp] Rotating PSK Script & NTP. (c)RS[Ntp] Rotating PSK Script & NTP. (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/u4W4MGKp0uA52NV7sQ04vHHAL38/
3265845
2047268
[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/XVLIvWlgA2W6FIjz7xfGtfUSyrM/
3265844
2047267
[Ntp] Fwd: Performance Evaluation Comparison LIGHTWEIGHT CIPHERS NIST LightWeight Cryptography Requirements : RS[Ntp] Fwd: Performance Evaluation Comparison LIGHTWEIGHT CIPHERS NIST LightWeight Cryptography Requirements : RS
Duke Abbaddon
2023-01-12
ntp
None
/arch/msg/ntp/VkYSGELY7medowvoM-cXo16oDWo/
3265843
2047266
Re: [saag] feeding in crypto resultsRe: [saag] feeding in crypto results
Yoav Nir
2015-06-03
saag
None
/arch/msg/saag/vedRh1lDHwwDkvLxHpMB0qAuKoM/
2028985
1589768
[Cfrg] tentative agenda for CFRG at IETF 89[Cfrg] tentative agenda for CFRG at IETF 89
David McGrew
2014-02-28
cfrg
None
/arch/msg/cfrg/oeJOPRX_NLnIePUG1idx3LJ6q1A/
291982
1101614
[Cfrg] NSA sabotaging crypto standards[Cfrg] NSA sabotaging crypto standards
Manger, James
2014-02-06
cfrg
None
/arch/msg/cfrg/vA6_WIGo8gLiAP8d4nKarfMaDOQ/
291893
1101632
Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01
Sean Turner
2014-01-03
cfrg
None
/arch/msg/cfrg/KCEdePSDlIsqAgmJz7p7XRQ--ak/
291379
1101684
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
David McGrew
2014-01-02
cfrg
None
/arch/msg/cfrg/1340PwAnZIGRH0ZpK5yw11mJmYw/
291369
1101686
Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01
Robert Ransom
2013-12-28
cfrg
None
/arch/msg/cfrg/VNq4tCcAH96hxaOGOoY0CEqdgzQ/
291340
1101684
Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01Re: [Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01
David McGrew
2013-12-27
cfrg
None
/arch/msg/cfrg/0dlRpeEw1_AZUJNZ27aY0ms5lk8/
291334
1101684
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
Trevor Perrin
2013-12-27
cfrg
None
/arch/msg/cfrg/fXe5dkedX4Itt__J_d8qHlvHxjo/
291321
1101686
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
David McGrew
2013-12-24
cfrg
None
/arch/msg/cfrg/EHBuBCm1Lx1iYNgJeJuAapX_Jvw/
291302
1101686
[Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01[Cfrg] Comments on draft-mcgrew-standby-cipher-00/draft-irtf-cfrg-cipher-catalog-01
Watson Ladd
2013-12-24
cfrg
None
/arch/msg/cfrg/d5xYrTQZsUyaAA_RhBZCO8JO0a4/
291298
1101684
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
Trevor Perrin
2013-12-24
cfrg
None
/arch/msg/cfrg/MrJuQocm1iSYHD8ahFDXvp71GWk/
291297
1101686
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
David McGrew
2013-12-24
cfrg
None
/arch/msg/cfrg/ctsTtiWlsN4-th-H0B4sqd_YV7Q/
291294
1101686
Re: [Cfrg] Requesting removal of CFRG co-chairRe: [Cfrg] Requesting removal of CFRG co-chair
David McGrew
2013-12-24
cfrg
None
/arch/msg/cfrg/uQ_VBx-4nGTdm4tapqXRRTqFN2Y/
291292
1101686
Re: [Cfrg] CFRG meeting at IETF 87Re: [Cfrg] CFRG meeting at IETF 87
David McGrew
2013-07-29
cfrg
None
/arch/msg/cfrg/wmrcxiJkw0tKmJNvnGBeTDpbHP8/
291161
1101706
[Tools-discuss] change which stream an ID is on[Tools-discuss] change which stream an ID is on
Eggert, Lars
2013-01-07
tools-discuss
None
/arch/msg/tools-discuss/5Cg0W4F-r6clwp_E1JJ1XbTAO0Q/
1442472
1644459
Re: [IPsec] updating ESP and AH requirementsRe: [IPsec] updating ESP and AH requirements
David McGrew (mcgrew)
2012-11-05
ipsec
None
/arch/msg/ipsec/fQciMNrxTdsM3CNTAP0F4CKjjtc/
783477
1433635
Re: [IPsec] updating ESP and AH requirementsRe: [IPsec] updating ESP and AH requirements
Yoav Nir
2012-11-05
ipsec
None
/arch/msg/ipsec/xPQg0fCs1xcll-rbARGZmzV15O4/
783474
1433635
57 Messages