Fwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSourceFwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
quic
None
/arch/msg/quic/rFXhoiWxw2QvOLFYKhy1epmL_-Y/
3278748
2052409
[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/A7nAAz6RbhAhKcxB7moWVQc1VCQ/
3278747
2052408
[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/dk-IC39Ey8OczrpKj9d4QbK1Bzw/
3278714
2052394
[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS
Duke Abbaddon
2023-02-09
pqc
None
/arch/msg/pqc/CsdKQ9T93WcnGnQ66lTQlr5avvo/
3274186
2050675
Re: [TLS] TLS Digest, Vol 223, Issue 7Re: [TLS] TLS Digest, Vol 223, Issue 7
Duke Abbaddon
2023-02-09
tls
None
/arch/msg/tls/IxEjNAboIQ2qxmmTkEJt2H7UZ1w/
3274182
2050674
Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Achim Kraus
2023-02-06
tls
None
/arch/msg/tls/f2Vtfry1Vg9zz0WCsPFTYK2hOiY/
3273015
2050160
[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Duke Abbaddon
2023-02-06
tls
None
/arch/msg/tls/QBPcA3b5yACurxidVbr2AF0RRdo/
3272992
2050160
Re: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RSRe: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Christopher Wood
2023-01-29
tls
None
/arch/msg/tls/If8nyjv41FntIgztbCjBUAd9yCI/
3270316
2049121
[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/XhMK39eWrCECKwKuk7XxlGLZu40/
3270262
2049121
[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/gmjkOcHuI_r_uRcyBHHK1zOHYow/
3270140
2049064
[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
pqc
None
/arch/msg/pqc/hhXQ7U8-EctgZlaUXLHuZmpnYHg/
3270139
2049063
[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/bnIEoTlaViXuLNzny4Fkzf0Nlsg/
3269584
2048823
[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/JckXlssJHzofg_eqfzSWabwHVBk/
3269583
2048822
[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/k_YCvNQrvOlACpIvwNwiA1UEQvw/
3269488
2048768
[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/XxtTT40YRJ1z_oBkcOa9inDVzbk/
3269487
2048767
[Pqc] tls key sharing agreement : RS[Pqc] tls key sharing agreement : RS
Duke Abbaddon
2023-01-25
pqc
None
/arch/msg/pqc/dD6jzs3ggbiJiBHjuxfVnPrRt8Y/
3269476
2048760
[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S
Duke Abbaddon
2023-01-25
tls
None
/arch/msg/tls/B5hmH3zlpCmBmRqjXmzy-IEZXy8/
3269531
2048796
[Ntp] Antw: [EXT] full doc ntp (because of nonce OSCP & TLS & NTP4+[Ntp] Antw: [EXT] full doc ntp (because of nonce OSCP & TLS & NTP4+
Ulrich Windl
2023-01-16
ntp
None
/arch/msg/ntp/DYTeQTneuXAUhYfvOYML9yDx6QA/
3265909
2047263
[Ntp] PSK Data Priorities (c)RS[Ntp] PSK Data Priorities (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/KjxyAIeFbWMOxvImy8IOx0uA0Rk/
3265846
2047269
[Ntp] Rotating PSK Script & NTP. (c)RS[Ntp] Rotating PSK Script & NTP. (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/u4W4MGKp0uA52NV7sQ04vHHAL38/
3265845
2047268
[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/XVLIvWlgA2W6FIjz7xfGtfUSyrM/
3265844
2047267
[Ntp] (good for telecommunications networks) (TLS) My files are all verified by virustotal & are signed anyway! https://is.gd/SecurityHSM https://is.gd/WebPKI[Ntp] (good for telecommunications networks) (TLS) My files are all verified by virustotal & are signed anyway! https://is.gd/SecurityHSM https://is.gd/WebPKI
Duke Abbaddon
2023-01-12
ntp
None
/arch/msg/ntp/CGLOe8CHHOWfpEKK-lW34nj7Lrc/
3265841
2047264
[Ntp] full doc ntp (because of nonce OSCP & TLS & NTP4+[Ntp] full doc ntp (because of nonce OSCP & TLS & NTP4+
Duke Abbaddon
2023-01-12
ntp
None
/arch/msg/ntp/0g_6FRZh6_eQ3qBCpeW7XOe38O8/
3265840
2047263
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
tuexen
2022-11-05
tsvwg
None
/arch/msg/tsvwg/tz727tq-OjdXcv_TgZhBUg5syu8/
3244623
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
John Mattsson
2022-11-05
tsvwg
None
/arch/msg/tsvwg/7kk5Bq5Ue32VyHmxuBw-FH3Dj8A/
3244600
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
Michael Tuexen
2022-11-05
tsvwg
None
/arch/msg/tsvwg/wgFNti2HzeA_bJm90O8qAttLFao/
3244572
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
Michael Tuexen
2022-11-05
tsvwg
None
/arch/msg/tsvwg/k0juwlPCsSWULuHUsyVnOdab6F0/
3244571
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
tuexen
2022-11-05
tsvwg
None
/arch/msg/tsvwg/lkPFpNHaxg7oM0N-VM4g7P-mOis/
3244565
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
John Mattsson
2022-11-03
tsvwg
None
/arch/msg/tsvwg/TQZ3Zde6JFS6HPC7GEjwyqhAfGw/
3243842
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
John Mattsson
2022-10-29
tsvwg
None
/arch/msg/tsvwg/hxSO9XXwFWW_xs2wiQLuQ6ArCX4/
3242302
2033527
Re: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and InsecureRe: [tsvwg] SCTP-AUTH (RFC 4895) is Broken and Insecure
Magnus Westerlund
2022-10-17
tsvwg
None
/arch/msg/tsvwg/fcJuhT7ebn6cszhSjhF03oxPY_k/
3235963
2033527
Re: [art] [Last-Call] Artart last call review of draft-ietf-tsvwg-rfc4960-bis-15Re: [art] [Last-Call] Artart last call review of draft-ietf-tsvwg-rfc4960-bis-15
Francesca Palombini
2021-12-16
art
None
/arch/msg/art/IHBJB0YtcRHKKHYHK6kEhNOKtnQ/
3104714
1973890
Re: [Last-Call] Artart last call review of draft-ietf-tsvwg-rfc4960-bis-15Re: [Last-Call] Artart last call review of draft-ietf-tsvwg-rfc4960-bis-15
Francesca Palombini
2021-12-16
last-call
None
/arch/msg/last-call/Rx9v2gmikF-r7CNvY44GKchttOI/
3104715
1973889
Re: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txtRe: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txt
Marc Petit-Huguenin
2021-10-20
tram
None
/arch/msg/tram/L3qZk_UXuUwumJ8CYLGPyYl9hYI/
3085469
1946247
Re: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txtRe: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txt
Gonzalo Camarillo
2021-10-20
tram
None
/arch/msg/tram/ceNsQFYTyfEMFBL7mYWb5kpW2s8/
3085371
1946247
Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15
Martin Duke
2021-10-14
secdir
None
/arch/msg/secdir/0fmzx-HTcsK36NC6WkBvDrmWcls/
3083525
1974971
Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15
tuexen
2021-10-14
secdir
None
/arch/msg/secdir/nH4kONY-rRMZh_m8A6ZZ_0m4y9M/
3083513
1974971
Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15
David Mandelberg
2021-10-14
secdir
None
/arch/msg/secdir/Xu3rxOOOhX0zP4858uvnhr4Lg0g/
3083491
1974971
Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15Re: [secdir] secdir review of draft-ietf-tsvwg-rfc4960-bis-15
tuexen
2021-10-14
secdir
None
/arch/msg/secdir/JhrygR_zbS7-OHSjKGld-zzoIBQ/
3083406
1974971
Re: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txtRe: [tram] I-D Action: draft-ietf-tram-stun-pmtud-20.txt
Marc Petit-Huguenin
2021-10-12
tram
None
/arch/msg/tram/T6rqGNugaJgL2Y8xHzYV1j-gX14/
3082516
1946247
218 Messages